1 //
2 // Copyright (C) 2012 The Android Open Source Project
3 //
4 // Licensed under the Apache License, Version 2.0 (the "License");
5 // you may not use this file except in compliance with the License.
6 // You may obtain a copy of the License at
7 //
8 // http://www.apache.org/licenses/LICENSE-2.0
9 //
10 // Unless required by applicable law or agreed to in writing, software
11 // distributed under the License is distributed on an "AS IS" BASIS,
12 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 // See the License for the specific language governing permissions and
14 // limitations under the License.
15 //
16
17 #ifndef UPDATE_ENGINE_COMMON_UTILS_H_
18 #define UPDATE_ENGINE_COMMON_UTILS_H_
19
20 #include <errno.h>
21 #include <sys/types.h>
22 #include <time.h>
23 #include <unistd.h>
24
25 #include <algorithm>
26 #include <limits>
27 #include <map>
28 #include <memory>
29 #include <set>
30 #include <string>
31 #include <vector>
32
33 #include <android-base/strings.h>
34 #include <android-base/mapped_file.h>
35 #include <android-base/scopeguard.h>
36 #include <base/files/file_path.h>
37 #include <base/posix/eintr_wrapper.h>
38 #include <base/strings/string_number_conversions.h>
39 #include <base/time/time.h>
40 #include <brillo/key_value_store.h>
41 #include <brillo/secure_blob.h>
42
43 #include "update_engine/common/action.h"
44 #include "update_engine/common/action_processor.h"
45 #include "update_engine/common/constants.h"
46 #include "update_engine/payload_consumer/file_descriptor.h"
47 #include "update_engine/update_metadata.pb.h"
48
49 namespace chromeos_update_engine {
50
51 namespace utils {
52
53 // Formats |vec_str| as a string of the form ["<elem1>", "<elem2>"].
54 // Does no escaping, only use this for presentation in error messages.
55 std::string StringVectorToString(const std::vector<std::string>& vec_str);
56
57 // Calculates the p2p file id from payload hash and size
58 std::string CalculateP2PFileId(const brillo::Blob& payload_hash,
59 size_t payload_size);
60
61 // Writes the data passed to path. The file at path will be overwritten if it
62 // exists. Returns true on success, false otherwise.
63 bool WriteFile(const char* path, const void* data, size_t data_len);
64
65 // Calls write() or pwrite() repeatedly until all count bytes at buf are
66 // written to fd or an error occurs. Returns true on success.
67 bool WriteAll(int fd, const void* buf, size_t count);
68 bool PWriteAll(int fd, const void* buf, size_t count, off_t offset);
69
70 bool WriteAll(FileDescriptor* fd, const void* buf, size_t count);
71
WriteAll(const FileDescriptorPtr & fd,const void * buf,size_t count)72 constexpr bool WriteAll(const FileDescriptorPtr& fd,
73 const void* buf,
74 size_t count) {
75 return WriteAll(fd.get(), buf, count);
76 }
77 // WriteAll writes data at specified offset, but it modifies file position.
78 bool WriteAll(FileDescriptorPtr* fd, const void* buf, size_t count, off_t off);
79
80 // https://man7.org/linux/man-pages/man2/pread.2.html
81 // PWriteAll writes data at specified offset, but it DOES NOT modify file
82 // position. Behaves similar to linux' pwrite syscall.
83 bool PWriteAll(const FileDescriptorPtr& fd,
84 const void* buf,
85 size_t count,
86 off_t offset);
87
88 // Calls read() repeatedly until |count| bytes are read or EOF or EWOULDBLOCK
89 // is reached. Returns whether all read() calls succeeded (including EWOULDBLOCK
90 // as a success case), sets |eof| to whether the eof was reached and sets
91 // |out_bytes_read| to the actual number of bytes read regardless of the return
92 // value.
93 bool ReadAll(
94 int fd, void* buf, size_t count, size_t* out_bytes_read, bool* eof);
95
96 // Calls pread() repeatedly until count bytes are read, or EOF is reached.
97 // Returns number of bytes read in *bytes_read. Returns true on success.
98 bool PReadAll(
99 int fd, void* buf, size_t count, off_t offset, ssize_t* out_bytes_read);
100
101 // Reads data at specified offset, this function does change file position.
102
103 bool ReadAll(FileDescriptor* fd,
104 void* buf,
105 size_t count,
106 off_t offset,
107 ssize_t* out_bytes_read);
108
ReadAll(const FileDescriptorPtr & fd,void * buf,size_t count,off_t offset,ssize_t * out_bytes_read)109 constexpr bool ReadAll(const FileDescriptorPtr& fd,
110 void* buf,
111 size_t count,
112 off_t offset,
113 ssize_t* out_bytes_read) {
114 return ReadAll(fd.get(), buf, count, offset, out_bytes_read);
115 }
116
117 // https://man7.org/linux/man-pages/man2/pread.2.html
118 // Reads data at specified offset, this function DOES NOT change file position.
119 // Behavior is similar to linux's pread syscall.
120 bool PReadAll(FileDescriptor* fd,
121 void* buf,
122 size_t count,
123 off_t offset,
124 ssize_t* out_bytes_read);
125
PReadAll(const FileDescriptorPtr & fd,void * buf,size_t count,off_t offset,ssize_t * out_bytes_read)126 constexpr bool PReadAll(const FileDescriptorPtr& fd,
127 void* buf,
128 size_t count,
129 off_t offset,
130 ssize_t* out_bytes_read) {
131 return PReadAll(fd.get(), buf, count, offset, out_bytes_read);
132 }
133
134 // Opens |path| for reading and appends its entire content to the container
135 // pointed to by |out_p|. Returns true upon successfully reading all of the
136 // file's content, false otherwise, in which case the state of the output
137 // container is unknown. ReadFileChunk starts reading the file from |offset|; if
138 // |size| is not -1, only up to |size| bytes are read in.
139 bool ReadFile(const std::string& path, brillo::Blob* out_p);
140 bool ReadFile(const std::string& path, std::string* out_p);
141 bool ReadFileChunk(const std::string& path,
142 off_t offset,
143 off_t size,
144 brillo::Blob* out_p);
145
146 // Invokes |cmd| in a pipe and appends its stdout to the container pointed to by
147 // |out_p|. Returns true upon successfully reading all of the output, false
148 // otherwise, in which case the state of the output container is unknown.
149 bool ReadPipe(const std::string& cmd, std::string* out_p);
150
151 // Returns the size of the block device at the file descriptor fd. If an error
152 // occurs, -1 is returned.
153 off_t BlockDevSize(int fd);
154
155 // Returns the size of the file at path, or the file descriptor fd. If the file
156 // is actually a block device, this function will automatically call
157 // BlockDevSize. If the file doesn't exist or some error occurrs, -1 is
158 // returned.
159 off_t FileSize(const std::string& path);
160 off_t FileSize(int fd);
161
162 bool SendFile(int out_fd, int in_fd, size_t count);
163
164 bool FsyncDirectoryContents(const char* dirname);
165 bool FsyncDirectory(const char* dirname);
166 bool DeleteDirectory(const char* dirname);
167 bool WriteStringToFileAtomic(const std::string& path, std::string_view content);
168
169 // Returns true if the file exists for sure. Returns false if it doesn't exist,
170 // or an error occurs.
171 bool FileExists(const char* path);
172
173 // Returns true if |path| exists and is a symbolic link.
174 bool IsSymlink(const char* path);
175
176 // Return true iff |path| exists and is a regular file
177 bool IsRegFile(const char* path);
178
179 // If |base_filename_template| is neither absolute (starts with "/") nor
180 // explicitly relative to the current working directory (starts with "./" or
181 // "../"), then it is prepended the system's temporary directory. On success,
182 // stores the name of the new temporary file in |filename|. If |fd| is
183 // non-null, the file descriptor returned by mkstemp is written to it and
184 // kept open; otherwise, it is closed. The template must end with "XXXXXX".
185 // Returns true on success.
186 bool MakeTempFile(const std::string& base_filename_template,
187 std::string* filename,
188 int* fd);
189
190 // Splits the partition device name into the block device name and partition
191 // number. For example, "/dev/sda3" will be split into {"/dev/sda", 3} and
192 // "/dev/mmcblk0p2" into {"/dev/mmcblk0", 2}
193 // Returns false when malformed device name is passed in.
194 // If both output parameters are omitted (null), can be used
195 // just to test the validity of the device name. Note that the function
196 // simply checks if the device name looks like a valid device, no other
197 // checks are performed (i.e. it doesn't check if the device actually exists).
198 bool SplitPartitionName(const std::string& partition_name,
199 std::string* out_disk_name,
200 int* out_partition_num);
201
202 // Builds a partition device name from the block device name and partition
203 // number. For example:
204 // {"/dev/sda", 1} => "/dev/sda1"
205 // {"/dev/mmcblk2", 12} => "/dev/mmcblk2p12"
206 // Returns empty string when invalid parameters are passed in
207 std::string MakePartitionName(const std::string& disk_name, int partition_num);
208
209 // Set the read-only attribute on the block device |device| to the value passed
210 // in |read_only|. Return whether the operation succeeded.
211 bool SetBlockDeviceReadOnly(const std::string& device, bool read_only);
212
213 // Synchronously mount or unmount a filesystem. Return true on success.
214 // When mounting, it will attempt to mount the device as the passed filesystem
215 // type |type|, with the passed |flags| options. If |type| is empty, "ext2",
216 // "ext3", "ext4" and "squashfs" will be tried.
217 bool MountFilesystem(const std::string& device,
218 const std::string& mountpoint,
219 unsigned long flags, // NOLINT(runtime/int)
220 const std::string& type,
221 const std::string& fs_mount_options);
222 bool UnmountFilesystem(const std::string& mountpoint);
223
224 // Return whether the passed |mountpoint| path is a directory where a filesystem
225 // is mounted. Due to detection mechanism limitations, when used on directories
226 // where another part of the tree was bind mounted returns true only if bind
227 // mounted on top of a different filesystem (not inside the same filesystem).
228 bool IsMountpoint(const std::string& mountpoint);
229
230 // Returns a human-readable string with the file format based on magic constants
231 // on the header of the file.
232 std::string GetFileFormat(const std::string& path);
233
234 // Returns the string representation of the given UTC time.
235 // such as "11/14/2011 14:05:30 GMT".
236 std::string ToString(const base::Time utc_time);
237
238 // Returns true or false depending on the value of b.
239 std::string ToString(bool b);
240
241 // Returns a string representation of the given enum.
242 std::string ToString(DownloadSource source);
243
244 // Returns a string representation of the given enum.
245 std::string ToString(PayloadType payload_type);
246
247 // Fuzzes an integer |value| randomly in the range:
248 // [value - range / 2, value + range - range / 2]
249 int FuzzInt(int value, unsigned int range);
250
251 // Log a string in hex to LOG(INFO). Useful for debugging.
252 void HexDumpArray(const uint8_t* const arr, const size_t length);
HexDumpString(const std::string & str)253 inline void HexDumpString(const std::string& str) {
254 HexDumpArray(reinterpret_cast<const uint8_t*>(str.data()), str.size());
255 }
HexDumpVector(const brillo::Blob & vect)256 inline void HexDumpVector(const brillo::Blob& vect) {
257 HexDumpArray(vect.data(), vect.size());
258 }
259
260 template <typename T>
VectorIndexOf(const std::vector<T> & vect,const T & value,typename std::vector<T>::size_type * out_index)261 bool VectorIndexOf(const std::vector<T>& vect,
262 const T& value,
263 typename std::vector<T>::size_type* out_index) {
264 typename std::vector<T>::const_iterator it =
265 std::find(vect.begin(), vect.end(), value);
266 if (it == vect.end()) {
267 return false;
268 } else {
269 *out_index = it - vect.begin();
270 return true;
271 }
272 }
273
274 // Return the total number of blocks in the passed |extents| collection.
275 template <class T>
BlocksInExtents(const T & extents)276 uint64_t BlocksInExtents(const T& extents) {
277 uint64_t sum = 0;
278 for (const auto& ext : extents) {
279 sum += ext.num_blocks();
280 }
281 return sum;
282 }
283
284 // Converts seconds into human readable notation including days, hours, minutes
285 // and seconds. For example, 185 will yield 3m5s, 4300 will yield 1h11m40s, and
286 // 360000 will yield 4d4h0m0s. Zero padding not applied. Seconds are always
287 // shown in the result.
288 std::string FormatSecs(unsigned secs);
289
290 // Converts a TimeDelta into human readable notation including days, hours,
291 // minutes, seconds and fractions of a second down to microsecond granularity,
292 // as necessary; for example, an output of 5d2h0m15.053s means that the input
293 // time was precise to the milliseconds only. Zero padding not applied, except
294 // for fractions. Seconds are always shown, but fractions thereof are only shown
295 // when applicable. If |delta| is negative, the output will have a leading '-'
296 // followed by the absolute duration.
297 std::string FormatTimeDelta(base::TimeDelta delta);
298
299 // This method transforms the given error code to be suitable for UMA and
300 // for error classification purposes by removing the higher order bits and
301 // aggregating error codes beyond the enum range, etc. This method is
302 // idempotent, i.e. if called with a value previously returned by this method,
303 // it'll return the same value again.
304 ErrorCode GetBaseErrorCode(ErrorCode code);
305
306 // Converts |time| to an Omaha InstallDate which is defined as "the
307 // number of PST8PDT calendar weeks since Jan 1st 2007 0:00 PST, times
308 // seven" with PST8PDT defined as "Pacific Time" (e.g. UTC-07:00 if
309 // daylight savings is observed and UTC-08:00 otherwise.)
310 //
311 // If the passed in |time| variable is before Monday January 1st 2007
312 // 0:00 PST, False is returned and the value returned in
313 // |out_num_days| is undefined. Otherwise the number of PST8PDT
314 // calendar weeks since that date times seven is returned in
315 // |out_num_days| and the function returns True.
316 //
317 // (NOTE: This function does not currently take daylight savings time
318 // into account so the result may up to one hour off. This is because
319 // the glibc date and timezone routines depend on the TZ environment
320 // variable and changing environment variables is not thread-safe.
321 bool ConvertToOmahaInstallDate(base::Time time, int* out_num_days);
322
323 // Look for the minor version value in the passed |store| and set
324 // |minor_version| to that value. Return whether the value was found and valid.
325 bool GetMinorVersion(const brillo::KeyValueStore& store,
326 uint32_t* minor_version);
327
328 // This function reads the specified data in |extents| into |out_data|. The
329 // extents are read from the file at |path|. |out_data_size| is the size of
330 // |out_data|. Returns false if the number of bytes to read given in
331 // |extents| does not equal |out_data_size|.
332 bool ReadExtents(const std::string& path,
333 const std::vector<Extent>& extents,
334 brillo::Blob* out_data,
335 ssize_t out_data_size,
336 size_t block_size);
337
338 bool ReadExtents(FileDescriptorPtr path,
339 const std::vector<Extent>& extents,
340 brillo::Blob* out_data,
341 ssize_t out_data_size,
342 size_t block_size);
343
344 bool WriteExtents(const std::string& path,
345 const google::protobuf::RepeatedPtrField<Extent>& extents,
346 const brillo::Blob& data,
347 size_t block_size);
348
ReadExtents(const std::string & path,const std::vector<Extent> & extents,brillo::Blob * out_data,size_t block_size)349 constexpr bool ReadExtents(const std::string& path,
350 const std::vector<Extent>& extents,
351 brillo::Blob* out_data,
352 size_t block_size) {
353 return ReadExtents(path,
354 extents,
355 out_data,
356 utils::BlocksInExtents(extents) * block_size,
357 block_size);
358 }
359
360 bool ReadExtents(const std::string& path,
361 const google::protobuf::RepeatedPtrField<Extent>& extents,
362 brillo::Blob* out_data,
363 size_t block_size);
364
365 bool ReadExtents(FileDescriptorPtr path,
366 const google::protobuf::RepeatedPtrField<Extent>& extents,
367 brillo::Blob* out_data,
368 size_t block_size);
369
370 // Read the current boot identifier and store it in |boot_id|. This identifier
371 // is constants during the same boot of the kernel and is regenerated after
372 // reboot. Returns whether it succeeded getting the boot_id.
373 bool GetBootId(std::string* boot_id);
374
375 // Gets a string value from the vpd for a given key using the `vpd_get_value`
376 // shell command. Returns true on success.
377 bool GetVpdValue(std::string key, std::string* result);
378
379 // This function gets the file path of the file pointed to by FileDiscriptor.
380 std::string GetFilePath(int fd);
381
382 // Divide |x| by |y| and round up to the nearest integer.
DivRoundUp(uint64_t x,uint64_t y)383 constexpr uint64_t DivRoundUp(uint64_t x, uint64_t y) {
384 return (x + y - 1) / y;
385 }
386
387 // Round |x| up to be a multiple of |y|.
RoundUp(uint64_t x,uint64_t y)388 constexpr uint64_t RoundUp(uint64_t x, uint64_t y) {
389 return DivRoundUp(x, y) * y;
390 }
391
392 // Returns the integer value of the first section of |version|. E.g. for
393 // "10575.39." returns 10575. Returns 0 if |version| is empty, returns -1 if
394 // first section of |version| is invalid (e.g. not a number).
395 int VersionPrefix(const std::string& version);
396
397 // Parses a string in the form high.low, where high and low are 16 bit unsigned
398 // integers. If there is more than 1 dot, or if either of the two parts are
399 // not valid 16 bit unsigned numbers, then 0xffff is returned for both.
400 void ParseRollbackKeyVersion(const std::string& raw_version,
401 uint16_t* high_version,
402 uint16_t* low_version);
403
404 // Return a string representation of |utime| for log file names.
405 std::string GetTimeAsString(time_t utime);
406 // Returns the string format of the hashed |str_to_convert| that can be used
407 // with |Excluder| as the exclusion name.
408 std::string GetExclusionName(const std::string& str_to_convert);
409
410 // Parse `old_version` and `new_version` as integer timestamps and
411 // Return kSuccess if `new_version` is larger/newer.
412 // Return kSuccess if either one is empty.
413 // Return kError if |old_version| is not empty and not an integer.
414 // Return kDownloadManifestParseError if |new_version| is not empty and not an
415 // integer.
416 // Return kPayloadTimestampError if both are integers but |new_version| <
417 // |old_version|.
418 ErrorCode IsTimestampNewer(const std::string_view old_version,
419 const std::string_view new_version);
420
421 std::unique_ptr<android::base::MappedFile> GetReadonlyZeroBlock(size_t size);
422
423 std::string_view GetReadonlyZeroString(size_t size);
424
425 } // namespace utils
426
427 // Utility class to close a file descriptor
428 class ScopedFdCloser {
429 public:
ScopedFdCloser(int * fd)430 explicit ScopedFdCloser(int* fd) : fd_(fd) {}
~ScopedFdCloser()431 ~ScopedFdCloser() {
432 if (should_close_ && fd_ && (*fd_ >= 0) && !IGNORE_EINTR(close(*fd_)))
433 *fd_ = -1;
434 }
set_should_close(bool should_close)435 void set_should_close(bool should_close) { should_close_ = should_close; }
436
437 private:
438 int* fd_;
439 bool should_close_ = true;
440 DISALLOW_COPY_AND_ASSIGN(ScopedFdCloser);
441 };
442
443 // Utility class to delete a file when it goes out of scope.
444 class ScopedPathUnlinker {
445 public:
ScopedPathUnlinker(const std::string & path)446 explicit ScopedPathUnlinker(const std::string& path)
447 : path_(path), should_remove_(true) {}
~ScopedPathUnlinker()448 ~ScopedPathUnlinker() {
449 if (should_remove_ && unlink(path_.c_str()) < 0) {
450 PLOG(ERROR) << "Unable to unlink path " << path_;
451 }
452 }
set_should_remove(bool should_remove)453 void set_should_remove(bool should_remove) { should_remove_ = should_remove; }
454
455 private:
456 const std::string path_;
457 bool should_remove_;
458 DISALLOW_COPY_AND_ASSIGN(ScopedPathUnlinker);
459 };
460
461 class ScopedTempFile {
462 public:
ScopedTempFile()463 ScopedTempFile() : ScopedTempFile("update_engine_temp.XXXXXX") {}
464
465 // If |open_fd| is true, a writable file descriptor will be opened for this
466 // file.
467 // If |truncate_size| is non-zero, truncate file to that size on creation.
468 explicit ScopedTempFile(const std::string& pattern,
469 bool open_fd = false,
470 size_t truncate_size = 0) {
471 CHECK(utils::MakeTempFile(pattern, &path_, open_fd ? &fd_ : nullptr));
472 unlinker_.reset(new ScopedPathUnlinker(path_));
473 if (open_fd) {
474 CHECK_GE(fd_, 0);
475 fd_closer_.reset(new ScopedFdCloser(&fd_));
476 }
477 if (truncate_size > 0) {
478 CHECK_EQ(0, truncate(path_.c_str(), truncate_size));
479 }
480 }
481 virtual ~ScopedTempFile() = default;
482
path()483 const std::string& path() const { return path_; }
fd()484 int fd() const {
485 CHECK(fd_closer_);
486 return fd_;
487 }
CloseFd()488 void CloseFd() {
489 CHECK(fd_closer_);
490 fd_closer_.reset();
491 }
492
493 private:
494 std::string path_;
495 std::unique_ptr<ScopedPathUnlinker> unlinker_;
496
497 int fd_{-1};
498 std::unique_ptr<ScopedFdCloser> fd_closer_;
499
500 DISALLOW_COPY_AND_ASSIGN(ScopedTempFile);
501 };
502
503 // A little object to call ActionComplete on the ActionProcessor when
504 // it's destructed.
505 class ScopedActionCompleter {
506 public:
ScopedActionCompleter(ActionProcessor * processor,AbstractAction * action)507 explicit ScopedActionCompleter(ActionProcessor* processor,
508 AbstractAction* action)
509 : processor_(processor),
510 action_(action),
511 code_(ErrorCode::kError),
512 should_complete_(true) {
513 CHECK(processor_);
514 }
~ScopedActionCompleter()515 ~ScopedActionCompleter() {
516 if (should_complete_)
517 processor_->ActionComplete(action_, code_);
518 }
set_code(ErrorCode code)519 void set_code(ErrorCode code) { code_ = code; }
set_should_complete(bool should_complete)520 void set_should_complete(bool should_complete) {
521 should_complete_ = should_complete;
522 }
get_code()523 ErrorCode get_code() const { return code_; }
524
525 private:
526 ActionProcessor* processor_;
527 AbstractAction* action_;
528 ErrorCode code_;
529 bool should_complete_;
530 DISALLOW_COPY_AND_ASSIGN(ScopedActionCompleter);
531 };
532
533 // Simple wrapper for creating a slice of some container,
534 // similar to string_view but for other containers.
535 template <typename T>
536 struct Range {
RangeRange537 Range(T t1, T t2) : t1_(t1), t2_(t2) {}
beginRange538 constexpr auto begin() const noexcept { return t1_; }
endRange539 constexpr auto end() const noexcept { return t2_; }
540 T t1_;
541 T t2_;
542 };
543
544 std::string HexEncode(const brillo::Blob& blob) noexcept;
545 std::string HexEncode(const std::string_view blob) noexcept;
546
547 template <size_t kSize>
HexEncode(const std::array<uint8_t,kSize> blob)548 std::string HexEncode(const std::array<uint8_t, kSize> blob) noexcept {
549 return base::HexEncode(blob.data(), blob.size());
550 }
551
552 [[nodiscard]] std::string_view ToStringView(
553 const std::vector<unsigned char>& blob) noexcept;
554
ToStringView(const std::vector<char> & blob)555 constexpr std::string_view ToStringView(
556 const std::vector<char>& blob) noexcept {
557 return std::string_view{blob.data(), blob.size()};
558 }
559
560 [[nodiscard]] std::string_view ToStringView(const void* data,
561 size_t size) noexcept;
562
563 bool GetTempName(const std::string& path, base::FilePath* template_path);
564
565 } // namespace chromeos_update_engine
566
567 #define TEST_AND_RETURN_FALSE_ERRNO(_x) \
568 do { \
569 bool _success = static_cast<bool>(_x); \
570 if (!_success) { \
571 std::string _msg = android::base::ErrnoNumberAsString(errno); \
572 LOG(ERROR) << #_x " failed: " << _msg; \
573 return false; \
574 } \
575 } while (0)
576
577 #define TEST_AND_RETURN_FALSE(_x) \
578 do { \
579 bool _success = static_cast<bool>(_x); \
580 if (!_success) { \
581 LOG(ERROR) << #_x " failed."; \
582 return false; \
583 } \
584 } while (0)
585
586 #define TEST_AND_RETURN_ERRNO(_x) \
587 do { \
588 bool _success = static_cast<bool>(_x); \
589 if (!_success) { \
590 std::string _msg = android::base::ErrnoNumberAsString(errno); \
591 LOG(ERROR) << #_x " failed: " << _msg; \
592 return; \
593 } \
594 } while (0)
595
596 #define TEST_AND_RETURN(_x) \
597 do { \
598 bool _success = static_cast<bool>(_x); \
599 if (!_success) { \
600 LOG(ERROR) << #_x " failed."; \
601 return; \
602 } \
603 } while (0)
604
605 #define TEST_AND_RETURN_FALSE_ERRCODE(_x) \
606 do { \
607 errcode_t _error = (_x); \
608 if (_error) { \
609 errno = _error; \
610 LOG(ERROR) << #_x " failed: " << _error; \
611 return false; \
612 } \
613 } while (0)
614
615 #define TEST_OP(_x, _y, op) \
616 do { \
617 const auto& x = _x; \
618 const auto& y = _y; \
619 if (!(x op y)) { \
620 LOG(ERROR) << #_x " " #op " " #_y << " failed: " << x << " " #op " " \
621 << y; \
622 return {}; \
623 } \
624 } while (0)
625
626 #define TEST_EQ(_x, _y) TEST_OP(_x, _y, ==)
627 #define TEST_NE(_x, _y) TEST_OP(_x, _y, !=)
628 #define TEST_LE(_x, _y) TEST_OP(_x, _y, <=)
629 #define TEST_GE(_x, _y) TEST_OP(_x, _y, >=)
630 #define TEST_LT(_x, _y) TEST_OP(_x, _y, <)
631 #define TEST_GT(_x, _y) TEST_OP(_x, _y, >)
632
633 // Macro for running a block of code before function exits.
634 // Example:
635 // DEFER {
636 // fclose(hc);
637 // hc = nullptr;
638 // };
639 // It works by creating a new local variable struct holding the lambda, the
640 // destructor of that struct will invoke the lambda.
641
642 constexpr struct {
643 template <typename F>
644 constexpr auto operator<<(F&& f) const noexcept {
645 return android::base::make_scope_guard(std::forward<F>(f));
646 }
647 } deferrer;
648
649 #define TOKENPASTE1(x, y) x##y
650 #define TOKENPASTE2(x, y) TOKENPASTE1(x, y)
651 #define DEFER \
652 auto TOKENPASTE2(_deferred_lambda_call, __COUNTER__) = deferrer \
653 << [&]() mutable
654
655 #endif // UPDATE_ENGINE_COMMON_UTILS_H_
656