blob: 67e8062b202ae9ce3609d42fabcda355bdf02137 [file] [log] [blame]
Gilad Arnoldd7b513d2012-05-10 14:25:27 -07001// Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
adlr@google.com3defe6a2009-12-04 20:57:17 +00002// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#ifndef CHROMEOS_PLATFORM_UPDATE_ENGINE_UTILS_H__
6#define CHROMEOS_PLATFORM_UPDATE_ENGINE_UTILS_H__
7
Andrew de los Reyes81ebcd82010-03-09 15:56:18 -08008#include <algorithm>
Han Shen2643cb72012-06-26 14:45:33 -07009#include <errno.h>
adlr@google.com3defe6a2009-12-04 20:57:17 +000010#include <set>
11#include <string>
Han Shen2643cb72012-06-26 14:45:33 -070012#include <unistd.h>
adlr@google.com3defe6a2009-12-04 20:57:17 +000013#include <vector>
Darin Petkovc6c135c2010-08-11 13:36:18 -070014
Gilad Arnoldf9609112012-02-29 11:38:47 -080015#include <base/eintr_wrapper.h>
Gilad Arnoldd7b513d2012-05-10 14:25:27 -070016#include <base/time.h>
Thieu Le5c7d9752010-12-15 16:09:28 -080017#include <ext2fs/ext2fs.h>
Andrew de los Reyesc7020782010-04-28 10:46:04 -070018#include <glib.h>
Darin Petkovc6c135c2010-08-11 13:36:18 -070019
adlr@google.com3defe6a2009-12-04 20:57:17 +000020#include "update_engine/action.h"
21#include "update_engine/action_processor.h"
22
23namespace chromeos_update_engine {
24
25namespace utils {
26
Darin Petkova07586b2010-10-20 13:41:15 -070027// Returns true if this is an official Chrome OS build, false otherwise.
Darin Petkov33d30642010-08-04 10:18:57 -070028bool IsOfficialBuild();
29
Darin Petkov44d98d92011-03-21 16:08:11 -070030// Returns true if the boot mode is normal or if it's unable to determine the
31// boot mode. Returns false if the boot mode is developer.
Darin Petkovc91dd6b2011-01-10 12:31:34 -080032bool IsNormalBootMode();
33
Darin Petkovf2065b42011-05-17 16:36:27 -070034// Returns the HWID or an empty string on error.
35std::string GetHardwareClass();
36
Andrew de los Reyes970bb282009-12-09 16:34:04 -080037// Writes the data passed to path. The file at path will be overwritten if it
38// exists. Returns true on success, false otherwise.
39bool WriteFile(const char* path, const char* data, int data_len);
40
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070041// Calls write() or pwrite() repeatedly until all count bytes at buf are
42// written to fd or an error occurs. Returns true on success.
43bool WriteAll(int fd, const void* buf, size_t count);
44bool PWriteAll(int fd, const void* buf, size_t count, off_t offset);
45
46// Calls pread() repeatedly until count bytes are read, or EOF is reached.
47// Returns number of bytes read in *bytes_read. Returns true on success.
48bool PReadAll(int fd, void* buf, size_t count, off_t offset,
49 ssize_t* out_bytes_read);
Andrew de los Reyesb10320d2010-03-31 16:44:44 -070050
adlr@google.com3defe6a2009-12-04 20:57:17 +000051// Returns the entire contents of the file at path. Returns true on success.
52bool ReadFile(const std::string& path, std::vector<char>* out);
53bool ReadFileToString(const std::string& path, std::string* out);
54
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -070055// Returns the size of the file at path. If the file doesn't exist or some
56// error occurrs, -1 is returned.
57off_t FileSize(const std::string& path);
58
adlr@google.com3defe6a2009-12-04 20:57:17 +000059std::string ErrnoNumberAsString(int err);
60
61// Strips duplicate slashes, and optionally removes all trailing slashes.
62// Does not compact /./ or /../.
63std::string NormalizePath(const std::string& path, bool strip_trailing_slash);
64
65// Returns true if the file exists for sure. Returns false if it doesn't exist,
66// or an error occurs.
67bool FileExists(const char* path);
68
Darin Petkov30291ed2010-11-12 10:23:06 -080069// Returns true if |path| exists and is a symbolic link.
70bool IsSymlink(const char* path);
71
adlr@google.com3defe6a2009-12-04 20:57:17 +000072// The last 6 chars of path must be XXXXXX. They will be randomly changed
73// and a non-existent path will be returned. Intentionally makes a copy
74// of the string passed in.
75// NEVER CALL THIS FUNCTION UNLESS YOU ARE SURE
76// THAT YOUR PROCESS WILL BE THE ONLY THING WRITING FILES IN THIS DIRECTORY.
Andrew de los Reyes4fe15d02009-12-10 19:01:36 -080077std::string TempFilename(std::string path);
adlr@google.com3defe6a2009-12-04 20:57:17 +000078
Andrew de los Reyesb10320d2010-03-31 16:44:44 -070079// Calls mkstemp() with the template passed. Returns the filename in the
80// out param filename. If fd is non-NULL, the file fd returned by mkstemp
81// is not close()d and is returned in the out param 'fd'. However, if
82// fd is NULL, the fd from mkstemp() will be closed.
83// The last six chars of the template must be XXXXXX.
84// Returns true on success.
85bool MakeTempFile(const std::string& filename_template,
86 std::string* filename,
87 int* fd);
88
Jay Srinivasan480ddfa2012-06-01 19:15:26 -070089// Calls mkdtemp() with the template passed. Returns the generated dirname
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070090// in the dirname param. Returns TRUE on success. dirname must not be NULL.
91bool MakeTempDirectory(const std::string& dirname_template,
92 std::string* dirname);
93
adlr@google.com3defe6a2009-12-04 20:57:17 +000094// Deletes a directory and all its contents synchronously. Returns true
95// on success. This may be called with a regular file--it will just unlink it.
96// This WILL cross filesystem boundaries.
97bool RecursiveUnlinkDir(const std::string& path);
98
Andrew de los Reyesf9714432010-05-04 10:21:23 -070099// Returns the root device for a partition. For example,
Darin Petkovf74eb652010-08-04 12:08:38 -0700100// RootDevice("/dev/sda3") returns "/dev/sda". Returns an empty string
101// if the input device is not of the "/dev/xyz" form.
Andrew de los Reyesf9714432010-05-04 10:21:23 -0700102std::string RootDevice(const std::string& partition_device);
103
104// Returns the partition number, as a string, of partition_device. For example,
Darin Petkovf74eb652010-08-04 12:08:38 -0700105// PartitionNumber("/dev/sda3") returns "3".
Andrew de los Reyesf9714432010-05-04 10:21:23 -0700106std::string PartitionNumber(const std::string& partition_device);
107
Darin Petkovf74eb652010-08-04 12:08:38 -0700108// Returns the sysfs block device for a root block device. For
109// example, SysfsBlockDevice("/dev/sda") returns
110// "/sys/block/sda". Returns an empty string if the input device is
111// not of the "/dev/xyz" form.
112std::string SysfsBlockDevice(const std::string& device);
113
114// Returns true if the root |device| (e.g., "/dev/sdb") is known to be
115// removable, false otherwise.
116bool IsRemovableDevice(const std::string& device);
117
adlr@google.com3defe6a2009-12-04 20:57:17 +0000118// Synchronously mount or unmount a filesystem. Return true on success.
119// Mounts as ext3 with default options.
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700120bool MountFilesystem(const std::string& device, const std::string& mountpoint,
121 unsigned long flags);
Andrew de los Reyes4fe15d02009-12-10 19:01:36 -0800122bool UnmountFilesystem(const std::string& mountpoint);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000123
Darin Petkovd3f8c892010-10-12 21:38:45 -0700124// Returns the block count and the block byte size of the ext3 file system on
125// |device| (which may be a real device or a path to a filesystem image) or on
126// an opened file descriptor |fd|. The actual file-system size is |block_count|
127// * |block_size| bytes. Returns true on success, false otherwise.
128bool GetFilesystemSize(const std::string& device,
129 int* out_block_count,
130 int* out_block_size);
131bool GetFilesystemSizeFromFD(int fd,
132 int* out_block_count,
133 int* out_block_size);
134
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700135// Returns the string representation of the given UTC time.
136// such as "11/14/2011 14:05:30 GMT".
137std::string ToString(const base::Time utc_time);
138
Andrew de los Reyesf9714432010-05-04 10:21:23 -0700139enum BootLoader {
140 BootLoader_SYSLINUX = 0,
141 BootLoader_CHROME_FIRMWARE = 1
142};
143// Detects which bootloader this system uses and returns it via the out
144// param. Returns true on success.
145bool GetBootloader(BootLoader* out_bootloader);
146
Darin Petkova0b9e772011-10-06 05:05:56 -0700147// Returns the error message, if any, from a GError pointer. Frees the GError
148// object and resets error to NULL.
149std::string GetAndFreeGError(GError** error);
Andrew de los Reyesc7020782010-04-28 10:46:04 -0700150
Darin Petkov296889c2010-07-23 16:20:54 -0700151// Initiates a system reboot. Returns true on success, false otherwise.
152bool Reboot();
153
Andrew de los Reyes712b3ac2011-01-07 13:47:52 -0800154// Schedules a Main Loop callback to trigger the crash reporter to perform an
155// upload as if this process had crashed.
156void ScheduleCrashReporterUpload();
157
Darin Petkov5c0a8af2010-08-24 13:39:13 -0700158// Fuzzes an integer |value| randomly in the range:
159// [value - range / 2, value + range - range / 2]
160int FuzzInt(int value, unsigned int range);
161
adlr@google.com3defe6a2009-12-04 20:57:17 +0000162// Log a string in hex to LOG(INFO). Useful for debugging.
163void HexDumpArray(const unsigned char* const arr, const size_t length);
164inline void HexDumpString(const std::string& str) {
165 HexDumpArray(reinterpret_cast<const unsigned char*>(str.data()), str.size());
166}
167inline void HexDumpVector(const std::vector<char>& vect) {
168 HexDumpArray(reinterpret_cast<const unsigned char*>(&vect[0]), vect.size());
169}
170
Andrew de los Reyes4fe15d02009-12-10 19:01:36 -0800171extern const char* const kStatefulPartition;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000172
173bool StringHasSuffix(const std::string& str, const std::string& suffix);
174bool StringHasPrefix(const std::string& str, const std::string& prefix);
175
176template<typename KeyType, typename ValueType>
177bool MapContainsKey(const std::map<KeyType, ValueType>& m, const KeyType& k) {
178 return m.find(k) != m.end();
179}
Andrew de los Reyes4fe15d02009-12-10 19:01:36 -0800180template<typename KeyType>
181bool SetContainsKey(const std::set<KeyType>& s, const KeyType& k) {
182 return s.find(k) != s.end();
183}
adlr@google.com3defe6a2009-12-04 20:57:17 +0000184
185template<typename ValueType>
186std::set<ValueType> SetWithValue(const ValueType& value) {
187 std::set<ValueType> ret;
188 ret.insert(value);
189 return ret;
190}
191
Andrew de los Reyes0ce161b2010-02-22 15:27:01 -0800192template<typename T>
193bool VectorContainsValue(const std::vector<T>& vect, const T& value) {
Darin Petkovc1a8b422010-07-19 11:34:49 -0700194 return std::find(vect.begin(), vect.end(), value) != vect.end();
Andrew de los Reyes0ce161b2010-02-22 15:27:01 -0800195}
196
Andrew de los Reyesb10320d2010-03-31 16:44:44 -0700197template<typename T>
198bool VectorIndexOf(const std::vector<T>& vect, const T& value,
199 typename std::vector<T>::size_type* out_index) {
200 typename std::vector<T>::const_iterator it = std::find(vect.begin(),
201 vect.end(),
202 value);
203 if (it == vect.end()) {
204 return false;
205 } else {
206 *out_index = it - vect.begin();
207 return true;
208 }
209}
210
Andrew de los Reyescc92cd32010-10-05 16:56:14 -0700211template<typename ValueType>
212void ApplyMap(std::vector<ValueType>* collection,
213 const std::map<ValueType, ValueType>& the_map) {
214 for (typename std::vector<ValueType>::iterator it = collection->begin();
215 it != collection->end(); ++it) {
216 typename std::map<ValueType, ValueType>::const_iterator map_it =
217 the_map.find(*it);
218 if (map_it != the_map.end()) {
219 *it = map_it->second;
220 }
221 }
222}
223
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700224// Returns the currently booted device. "/dev/sda3", for example.
adlr@google.com3defe6a2009-12-04 20:57:17 +0000225// This will not interpret LABEL= or UUID=. You'll need to use findfs
226// or something with equivalent funcionality to interpret those.
227const std::string BootDevice();
228
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700229// Returns the currently booted kernel device, "dev/sda2", for example.
230// Client must pass in the boot device. The suggested calling convention
231// is: BootKernelDevice(BootDevice()).
232// This function works by doing string modification on boot_device.
233// Returns empty string on failure.
234const std::string BootKernelDevice(const std::string& boot_device);
235
Darin Petkovc6c135c2010-08-11 13:36:18 -0700236enum ProcessPriority {
237 kProcessPriorityHigh = -10,
238 kProcessPriorityNormal = 0,
239 kProcessPriorityLow = 10,
240};
241
242// Compares process priorities and returns an integer that is less
243// than, equal to or greater than 0 if |priority_lhs| is,
244// respectively, lower than, same as or higher than |priority_rhs|.
245int ComparePriorities(ProcessPriority priority_lhs,
246 ProcessPriority priority_rhs);
247
248// Sets the current process priority to |priority|. Returns true on
249// success, false otherwise.
250bool SetProcessPriority(ProcessPriority priority);
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700251
Andrew de los Reyesf3ed8e72011-02-16 10:35:46 -0800252// Assumes data points to a Closure. Runs it and returns FALSE;
253gboolean GlibRunClosure(gpointer data);
254
Gilad Arnoldd7b513d2012-05-10 14:25:27 -0700255// Converts seconds into human readable notation including days, hours, minutes
256// and seconds. For example, 185 will yield 3m5s, 4300 will yield 1h11m40s, and
257// 360000 will yield 4d4h0m0s. Zero padding not applied. Seconds are always
258// shown in the result.
259std::string FormatSecs(unsigned secs);
260
261// Converts a TimeDelta into human readable notation including days, hours,
262// minutes, seconds and fractions of a second down to microsecond granularity,
263// as necessary; for example, an output of 5d2h0m15.053s means that the input
264// time was precise to the milliseconds only. Zero padding not applied, except
265// for fractions. Seconds are always shown, but fractions thereof are only shown
266// when applicable.
267std::string FormatTimeDelta(base::TimeDelta delta);
Gilad Arnold1ebd8132012-03-05 10:19:29 -0800268
adlr@google.com3defe6a2009-12-04 20:57:17 +0000269} // namespace utils
270
Jay Srinivasan08fce042012-06-07 16:31:01 -0700271
adlr@google.com3defe6a2009-12-04 20:57:17 +0000272// Class to unmount FS when object goes out of scope
273class ScopedFilesystemUnmounter {
274 public:
275 explicit ScopedFilesystemUnmounter(const std::string& mountpoint)
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800276 : mountpoint_(mountpoint),
277 should_unmount_(true) {}
adlr@google.com3defe6a2009-12-04 20:57:17 +0000278 ~ScopedFilesystemUnmounter() {
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800279 if (should_unmount_) {
280 utils::UnmountFilesystem(mountpoint_);
281 }
adlr@google.com3defe6a2009-12-04 20:57:17 +0000282 }
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800283 void set_should_unmount(bool unmount) { should_unmount_ = unmount; }
adlr@google.com3defe6a2009-12-04 20:57:17 +0000284 private:
285 const std::string mountpoint_;
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800286 bool should_unmount_;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700287 DISALLOW_COPY_AND_ASSIGN(ScopedFilesystemUnmounter);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000288};
289
290// Utility class to close a file descriptor
291class ScopedFdCloser {
292 public:
293 explicit ScopedFdCloser(int* fd) : fd_(fd), should_close_(true) {}
adlr@google.com3defe6a2009-12-04 20:57:17 +0000294 ~ScopedFdCloser() {
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800295 if (should_close_ && fd_ && (*fd_ >= 0)) {
Gilad Arnoldf9609112012-02-29 11:38:47 -0800296 if (!close(*fd_))
297 *fd_ = -1;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000298 }
299 }
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800300 void set_should_close(bool should_close) { should_close_ = should_close; }
adlr@google.com3defe6a2009-12-04 20:57:17 +0000301 private:
302 int* fd_;
303 bool should_close_;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700304 DISALLOW_COPY_AND_ASSIGN(ScopedFdCloser);
305};
306
Gilad Arnoldf9609112012-02-29 11:38:47 -0800307// An EINTR-immune file descriptor closer.
308class ScopedEintrSafeFdCloser {
309 public:
310 explicit ScopedEintrSafeFdCloser(int* fd) : fd_(fd), should_close_(true) {}
311 ~ScopedEintrSafeFdCloser() {
312 if (should_close_ && fd_ && (*fd_ >= 0)) {
313 if (!HANDLE_EINTR(close(*fd_)))
314 *fd_ = -1;
315 }
316 }
317 void set_should_close(bool should_close) { should_close_ = should_close; }
318 private:
319 int* fd_;
320 bool should_close_;
321 DISALLOW_COPY_AND_ASSIGN(ScopedEintrSafeFdCloser);
322};
323
Thieu Le5c7d9752010-12-15 16:09:28 -0800324// Utility class to close a file system
325class ScopedExt2fsCloser {
326 public:
327 explicit ScopedExt2fsCloser(ext2_filsys filsys) : filsys_(filsys) {}
328 ~ScopedExt2fsCloser() { ext2fs_close(filsys_); }
329
330 private:
331 ext2_filsys filsys_;
332 DISALLOW_COPY_AND_ASSIGN(ScopedExt2fsCloser);
333};
334
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700335// Utility class to delete a file when it goes out of scope.
336class ScopedPathUnlinker {
337 public:
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800338 explicit ScopedPathUnlinker(const std::string& path)
339 : path_(path),
340 should_remove_(true) {}
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700341 ~ScopedPathUnlinker() {
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800342 if (should_remove_ && unlink(path_.c_str()) < 0) {
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700343 std::string err_message = strerror(errno);
344 LOG(ERROR) << "Unable to unlink path " << path_ << ": " << err_message;
345 }
346 }
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800347 void set_should_remove(bool should_remove) { should_remove_ = should_remove; }
348
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700349 private:
350 const std::string path_;
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800351 bool should_remove_;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700352 DISALLOW_COPY_AND_ASSIGN(ScopedPathUnlinker);
353};
354
355// Utility class to delete an empty directory when it goes out of scope.
356class ScopedDirRemover {
357 public:
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800358 explicit ScopedDirRemover(const std::string& path)
359 : path_(path),
360 should_remove_(true) {}
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700361 ~ScopedDirRemover() {
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800362 if (should_remove_ && (rmdir(path_.c_str()) < 0)) {
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700363 PLOG(ERROR) << "Unable to remove dir " << path_;
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800364 }
365 }
366 void set_should_remove(bool should_remove) { should_remove_ = should_remove; }
367
368 protected:
369 const std::string path_;
370
371 private:
372 bool should_remove_;
373 DISALLOW_COPY_AND_ASSIGN(ScopedDirRemover);
374};
375
376// Utility class to unmount a filesystem mounted on a temporary directory and
377// delete the temporary directory when it goes out of scope.
378class ScopedTempUnmounter : public ScopedDirRemover {
379 public:
380 explicit ScopedTempUnmounter(const std::string& path) :
381 ScopedDirRemover(path) {}
382 ~ScopedTempUnmounter() {
383 utils::UnmountFilesystem(path_);
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700384 }
385 private:
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800386 DISALLOW_COPY_AND_ASSIGN(ScopedTempUnmounter);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000387};
388
389// A little object to call ActionComplete on the ActionProcessor when
390// it's destructed.
391class ScopedActionCompleter {
392 public:
393 explicit ScopedActionCompleter(ActionProcessor* processor,
394 AbstractAction* action)
395 : processor_(processor),
396 action_(action),
Darin Petkovc1a8b422010-07-19 11:34:49 -0700397 code_(kActionCodeError),
adlr@google.com3defe6a2009-12-04 20:57:17 +0000398 should_complete_(true) {}
399 ~ScopedActionCompleter() {
400 if (should_complete_)
Darin Petkovc1a8b422010-07-19 11:34:49 -0700401 processor_->ActionComplete(action_, code_);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000402 }
Darin Petkovc1a8b422010-07-19 11:34:49 -0700403 void set_code(ActionExitCode code) { code_ = code; }
adlr@google.com3defe6a2009-12-04 20:57:17 +0000404 void set_should_complete(bool should_complete) {
405 should_complete_ = should_complete;
406 }
Darin Petkovc1a8b422010-07-19 11:34:49 -0700407
adlr@google.com3defe6a2009-12-04 20:57:17 +0000408 private:
409 ActionProcessor* processor_;
410 AbstractAction* action_;
Darin Petkovc1a8b422010-07-19 11:34:49 -0700411 ActionExitCode code_;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000412 bool should_complete_;
413 DISALLOW_COPY_AND_ASSIGN(ScopedActionCompleter);
414};
415
416} // namespace chromeos_update_engine
417
418#define TEST_AND_RETURN_FALSE_ERRNO(_x) \
419 do { \
420 bool _success = (_x); \
421 if (!_success) { \
422 std::string _msg = \
423 chromeos_update_engine::utils::ErrnoNumberAsString(errno); \
424 LOG(ERROR) << #_x " failed: " << _msg; \
425 return false; \
426 } \
427 } while (0)
428
429#define TEST_AND_RETURN_FALSE(_x) \
430 do { \
431 bool _success = (_x); \
432 if (!_success) { \
433 LOG(ERROR) << #_x " failed."; \
434 return false; \
435 } \
436 } while (0)
437
438#define TEST_AND_RETURN_ERRNO(_x) \
439 do { \
440 bool _success = (_x); \
441 if (!_success) { \
442 std::string _msg = \
443 chromeos_update_engine::utils::ErrnoNumberAsString(errno); \
444 LOG(ERROR) << #_x " failed: " << _msg; \
445 return; \
446 } \
447 } while (0)
448
449#define TEST_AND_RETURN(_x) \
450 do { \
451 bool _success = (_x); \
452 if (!_success) { \
453 LOG(ERROR) << #_x " failed."; \
454 return; \
455 } \
456 } while (0)
457
Thieu Le5c7d9752010-12-15 16:09:28 -0800458#define TEST_AND_RETURN_FALSE_ERRCODE(_x) \
459 do { \
460 errcode_t _error = (_x); \
461 if (_error) { \
462 errno = _error; \
463 LOG(ERROR) << #_x " failed: " << _error; \
464 return false; \
465 } \
466 } while (0)
467
adlr@google.com3defe6a2009-12-04 20:57:17 +0000468
469
470#endif // CHROMEOS_PLATFORM_UPDATE_ENGINE_UTILS_H__