blob: cce30ca545403b53f2e6fc04a0f8deb98324046e [file] [log] [blame]
Gilad Arnoldd7b513d2012-05-10 14:25:27 -07001// Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
adlr@google.com3defe6a2009-12-04 20:57:17 +00002// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#ifndef CHROMEOS_PLATFORM_UPDATE_ENGINE_UTILS_H__
6#define CHROMEOS_PLATFORM_UPDATE_ENGINE_UTILS_H__
7
Andrew de los Reyes09e56d62010-04-23 13:45:53 -07008#include <errno.h>
Darin Petkovc6c135c2010-08-11 13:36:18 -07009
Andrew de los Reyes81ebcd82010-03-09 15:56:18 -080010#include <algorithm>
adlr@google.com3defe6a2009-12-04 20:57:17 +000011#include <set>
12#include <string>
13#include <vector>
Darin Petkovc6c135c2010-08-11 13:36:18 -070014
Gilad Arnoldf9609112012-02-29 11:38:47 -080015#include <base/eintr_wrapper.h>
Gilad Arnoldd7b513d2012-05-10 14:25:27 -070016#include <base/time.h>
Thieu Le5c7d9752010-12-15 16:09:28 -080017#include <ext2fs/ext2fs.h>
Andrew de los Reyesc7020782010-04-28 10:46:04 -070018#include <glib.h>
Darin Petkovc6c135c2010-08-11 13:36:18 -070019
adlr@google.com3defe6a2009-12-04 20:57:17 +000020#include "update_engine/action.h"
21#include "update_engine/action_processor.h"
22
23namespace chromeos_update_engine {
24
25namespace utils {
26
Darin Petkova07586b2010-10-20 13:41:15 -070027// Returns true if this is an official Chrome OS build, false otherwise.
Darin Petkov33d30642010-08-04 10:18:57 -070028bool IsOfficialBuild();
29
Darin Petkov2a0e6332010-09-24 14:43:41 -070030// Returns true if the OOBE process has been completed and EULA accepted, false
31// otherwise.
32bool IsOOBEComplete();
33
Darin Petkov44d98d92011-03-21 16:08:11 -070034// Returns true if the boot mode is normal or if it's unable to determine the
35// boot mode. Returns false if the boot mode is developer.
Darin Petkovc91dd6b2011-01-10 12:31:34 -080036bool IsNormalBootMode();
37
Darin Petkovf2065b42011-05-17 16:36:27 -070038// Returns the HWID or an empty string on error.
39std::string GetHardwareClass();
40
Andrew de los Reyes970bb282009-12-09 16:34:04 -080041// Writes the data passed to path. The file at path will be overwritten if it
42// exists. Returns true on success, false otherwise.
43bool WriteFile(const char* path, const char* data, int data_len);
44
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070045// Calls write() or pwrite() repeatedly until all count bytes at buf are
46// written to fd or an error occurs. Returns true on success.
47bool WriteAll(int fd, const void* buf, size_t count);
48bool PWriteAll(int fd, const void* buf, size_t count, off_t offset);
49
50// Calls pread() repeatedly until count bytes are read, or EOF is reached.
51// Returns number of bytes read in *bytes_read. Returns true on success.
52bool PReadAll(int fd, void* buf, size_t count, off_t offset,
53 ssize_t* out_bytes_read);
Andrew de los Reyesb10320d2010-03-31 16:44:44 -070054
adlr@google.com3defe6a2009-12-04 20:57:17 +000055// Returns the entire contents of the file at path. Returns true on success.
56bool ReadFile(const std::string& path, std::vector<char>* out);
57bool ReadFileToString(const std::string& path, std::string* out);
58
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -070059// Returns the size of the file at path. If the file doesn't exist or some
60// error occurrs, -1 is returned.
61off_t FileSize(const std::string& path);
62
adlr@google.com3defe6a2009-12-04 20:57:17 +000063std::string ErrnoNumberAsString(int err);
64
65// Strips duplicate slashes, and optionally removes all trailing slashes.
66// Does not compact /./ or /../.
67std::string NormalizePath(const std::string& path, bool strip_trailing_slash);
68
69// Returns true if the file exists for sure. Returns false if it doesn't exist,
70// or an error occurs.
71bool FileExists(const char* path);
72
Darin Petkov30291ed2010-11-12 10:23:06 -080073// Returns true if |path| exists and is a symbolic link.
74bool IsSymlink(const char* path);
75
adlr@google.com3defe6a2009-12-04 20:57:17 +000076// The last 6 chars of path must be XXXXXX. They will be randomly changed
77// and a non-existent path will be returned. Intentionally makes a copy
78// of the string passed in.
79// NEVER CALL THIS FUNCTION UNLESS YOU ARE SURE
80// THAT YOUR PROCESS WILL BE THE ONLY THING WRITING FILES IN THIS DIRECTORY.
Andrew de los Reyes4fe15d02009-12-10 19:01:36 -080081std::string TempFilename(std::string path);
adlr@google.com3defe6a2009-12-04 20:57:17 +000082
Andrew de los Reyesb10320d2010-03-31 16:44:44 -070083// Calls mkstemp() with the template passed. Returns the filename in the
84// out param filename. If fd is non-NULL, the file fd returned by mkstemp
85// is not close()d and is returned in the out param 'fd'. However, if
86// fd is NULL, the fd from mkstemp() will be closed.
87// The last six chars of the template must be XXXXXX.
88// Returns true on success.
89bool MakeTempFile(const std::string& filename_template,
90 std::string* filename,
91 int* fd);
92
Jay Srinivasan480ddfa2012-06-01 19:15:26 -070093// Calls mkdtemp() with the template passed. Returns the generated dirname
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070094// in the dirname param. Returns TRUE on success. dirname must not be NULL.
95bool MakeTempDirectory(const std::string& dirname_template,
96 std::string* dirname);
97
adlr@google.com3defe6a2009-12-04 20:57:17 +000098// Deletes a directory and all its contents synchronously. Returns true
99// on success. This may be called with a regular file--it will just unlink it.
100// This WILL cross filesystem boundaries.
101bool RecursiveUnlinkDir(const std::string& path);
102
Andrew de los Reyesf9714432010-05-04 10:21:23 -0700103// Returns the root device for a partition. For example,
Darin Petkovf74eb652010-08-04 12:08:38 -0700104// RootDevice("/dev/sda3") returns "/dev/sda". Returns an empty string
105// if the input device is not of the "/dev/xyz" form.
Andrew de los Reyesf9714432010-05-04 10:21:23 -0700106std::string RootDevice(const std::string& partition_device);
107
108// Returns the partition number, as a string, of partition_device. For example,
Darin Petkovf74eb652010-08-04 12:08:38 -0700109// PartitionNumber("/dev/sda3") returns "3".
Andrew de los Reyesf9714432010-05-04 10:21:23 -0700110std::string PartitionNumber(const std::string& partition_device);
111
Darin Petkovf74eb652010-08-04 12:08:38 -0700112// Returns the sysfs block device for a root block device. For
113// example, SysfsBlockDevice("/dev/sda") returns
114// "/sys/block/sda". Returns an empty string if the input device is
115// not of the "/dev/xyz" form.
116std::string SysfsBlockDevice(const std::string& device);
117
118// Returns true if the root |device| (e.g., "/dev/sdb") is known to be
119// removable, false otherwise.
120bool IsRemovableDevice(const std::string& device);
121
adlr@google.com3defe6a2009-12-04 20:57:17 +0000122// Synchronously mount or unmount a filesystem. Return true on success.
123// Mounts as ext3 with default options.
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700124bool MountFilesystem(const std::string& device, const std::string& mountpoint,
125 unsigned long flags);
Andrew de los Reyes4fe15d02009-12-10 19:01:36 -0800126bool UnmountFilesystem(const std::string& mountpoint);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000127
Darin Petkovd3f8c892010-10-12 21:38:45 -0700128// Returns the block count and the block byte size of the ext3 file system on
129// |device| (which may be a real device or a path to a filesystem image) or on
130// an opened file descriptor |fd|. The actual file-system size is |block_count|
131// * |block_size| bytes. Returns true on success, false otherwise.
132bool GetFilesystemSize(const std::string& device,
133 int* out_block_count,
134 int* out_block_size);
135bool GetFilesystemSizeFromFD(int fd,
136 int* out_block_count,
137 int* out_block_size);
138
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700139// Returns the string representation of the given UTC time.
140// such as "11/14/2011 14:05:30 GMT".
141std::string ToString(const base::Time utc_time);
142
Andrew de los Reyesf9714432010-05-04 10:21:23 -0700143enum BootLoader {
144 BootLoader_SYSLINUX = 0,
145 BootLoader_CHROME_FIRMWARE = 1
146};
147// Detects which bootloader this system uses and returns it via the out
148// param. Returns true on success.
149bool GetBootloader(BootLoader* out_bootloader);
150
Darin Petkova0b9e772011-10-06 05:05:56 -0700151// Returns the error message, if any, from a GError pointer. Frees the GError
152// object and resets error to NULL.
153std::string GetAndFreeGError(GError** error);
Andrew de los Reyesc7020782010-04-28 10:46:04 -0700154
Darin Petkov296889c2010-07-23 16:20:54 -0700155// Initiates a system reboot. Returns true on success, false otherwise.
156bool Reboot();
157
Andrew de los Reyes712b3ac2011-01-07 13:47:52 -0800158// Schedules a Main Loop callback to trigger the crash reporter to perform an
159// upload as if this process had crashed.
160void ScheduleCrashReporterUpload();
161
Darin Petkov5c0a8af2010-08-24 13:39:13 -0700162// Fuzzes an integer |value| randomly in the range:
163// [value - range / 2, value + range - range / 2]
164int FuzzInt(int value, unsigned int range);
165
adlr@google.com3defe6a2009-12-04 20:57:17 +0000166// Log a string in hex to LOG(INFO). Useful for debugging.
167void HexDumpArray(const unsigned char* const arr, const size_t length);
168inline void HexDumpString(const std::string& str) {
169 HexDumpArray(reinterpret_cast<const unsigned char*>(str.data()), str.size());
170}
171inline void HexDumpVector(const std::vector<char>& vect) {
172 HexDumpArray(reinterpret_cast<const unsigned char*>(&vect[0]), vect.size());
173}
174
Andrew de los Reyes4fe15d02009-12-10 19:01:36 -0800175extern const char* const kStatefulPartition;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000176
177bool StringHasSuffix(const std::string& str, const std::string& suffix);
178bool StringHasPrefix(const std::string& str, const std::string& prefix);
179
180template<typename KeyType, typename ValueType>
181bool MapContainsKey(const std::map<KeyType, ValueType>& m, const KeyType& k) {
182 return m.find(k) != m.end();
183}
Andrew de los Reyes4fe15d02009-12-10 19:01:36 -0800184template<typename KeyType>
185bool SetContainsKey(const std::set<KeyType>& s, const KeyType& k) {
186 return s.find(k) != s.end();
187}
adlr@google.com3defe6a2009-12-04 20:57:17 +0000188
189template<typename ValueType>
190std::set<ValueType> SetWithValue(const ValueType& value) {
191 std::set<ValueType> ret;
192 ret.insert(value);
193 return ret;
194}
195
Andrew de los Reyes0ce161b2010-02-22 15:27:01 -0800196template<typename T>
197bool VectorContainsValue(const std::vector<T>& vect, const T& value) {
Darin Petkovc1a8b422010-07-19 11:34:49 -0700198 return std::find(vect.begin(), vect.end(), value) != vect.end();
Andrew de los Reyes0ce161b2010-02-22 15:27:01 -0800199}
200
Andrew de los Reyesb10320d2010-03-31 16:44:44 -0700201template<typename T>
202bool VectorIndexOf(const std::vector<T>& vect, const T& value,
203 typename std::vector<T>::size_type* out_index) {
204 typename std::vector<T>::const_iterator it = std::find(vect.begin(),
205 vect.end(),
206 value);
207 if (it == vect.end()) {
208 return false;
209 } else {
210 *out_index = it - vect.begin();
211 return true;
212 }
213}
214
Andrew de los Reyescc92cd32010-10-05 16:56:14 -0700215template<typename ValueType>
216void ApplyMap(std::vector<ValueType>* collection,
217 const std::map<ValueType, ValueType>& the_map) {
218 for (typename std::vector<ValueType>::iterator it = collection->begin();
219 it != collection->end(); ++it) {
220 typename std::map<ValueType, ValueType>::const_iterator map_it =
221 the_map.find(*it);
222 if (map_it != the_map.end()) {
223 *it = map_it->second;
224 }
225 }
226}
227
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700228// Returns the currently booted device. "/dev/sda3", for example.
adlr@google.com3defe6a2009-12-04 20:57:17 +0000229// This will not interpret LABEL= or UUID=. You'll need to use findfs
230// or something with equivalent funcionality to interpret those.
231const std::string BootDevice();
232
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700233// Returns the currently booted kernel device, "dev/sda2", for example.
234// Client must pass in the boot device. The suggested calling convention
235// is: BootKernelDevice(BootDevice()).
236// This function works by doing string modification on boot_device.
237// Returns empty string on failure.
238const std::string BootKernelDevice(const std::string& boot_device);
239
Darin Petkovc6c135c2010-08-11 13:36:18 -0700240enum ProcessPriority {
241 kProcessPriorityHigh = -10,
242 kProcessPriorityNormal = 0,
243 kProcessPriorityLow = 10,
244};
245
246// Compares process priorities and returns an integer that is less
247// than, equal to or greater than 0 if |priority_lhs| is,
248// respectively, lower than, same as or higher than |priority_rhs|.
249int ComparePriorities(ProcessPriority priority_lhs,
250 ProcessPriority priority_rhs);
251
252// Sets the current process priority to |priority|. Returns true on
253// success, false otherwise.
254bool SetProcessPriority(ProcessPriority priority);
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700255
Andrew de los Reyesf3ed8e72011-02-16 10:35:46 -0800256// Assumes data points to a Closure. Runs it and returns FALSE;
257gboolean GlibRunClosure(gpointer data);
258
Gilad Arnoldd7b513d2012-05-10 14:25:27 -0700259// Converts seconds into human readable notation including days, hours, minutes
260// and seconds. For example, 185 will yield 3m5s, 4300 will yield 1h11m40s, and
261// 360000 will yield 4d4h0m0s. Zero padding not applied. Seconds are always
262// shown in the result.
263std::string FormatSecs(unsigned secs);
264
265// Converts a TimeDelta into human readable notation including days, hours,
266// minutes, seconds and fractions of a second down to microsecond granularity,
267// as necessary; for example, an output of 5d2h0m15.053s means that the input
268// time was precise to the milliseconds only. Zero padding not applied, except
269// for fractions. Seconds are always shown, but fractions thereof are only shown
270// when applicable.
271std::string FormatTimeDelta(base::TimeDelta delta);
Gilad Arnold1ebd8132012-03-05 10:19:29 -0800272
adlr@google.com3defe6a2009-12-04 20:57:17 +0000273} // namespace utils
274
275// Class to unmount FS when object goes out of scope
276class ScopedFilesystemUnmounter {
277 public:
278 explicit ScopedFilesystemUnmounter(const std::string& mountpoint)
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800279 : mountpoint_(mountpoint),
280 should_unmount_(true) {}
adlr@google.com3defe6a2009-12-04 20:57:17 +0000281 ~ScopedFilesystemUnmounter() {
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800282 if (should_unmount_) {
283 utils::UnmountFilesystem(mountpoint_);
284 }
adlr@google.com3defe6a2009-12-04 20:57:17 +0000285 }
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800286 void set_should_unmount(bool unmount) { should_unmount_ = unmount; }
adlr@google.com3defe6a2009-12-04 20:57:17 +0000287 private:
288 const std::string mountpoint_;
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800289 bool should_unmount_;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700290 DISALLOW_COPY_AND_ASSIGN(ScopedFilesystemUnmounter);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000291};
292
293// Utility class to close a file descriptor
294class ScopedFdCloser {
295 public:
296 explicit ScopedFdCloser(int* fd) : fd_(fd), should_close_(true) {}
adlr@google.com3defe6a2009-12-04 20:57:17 +0000297 ~ScopedFdCloser() {
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800298 if (should_close_ && fd_ && (*fd_ >= 0)) {
Gilad Arnoldf9609112012-02-29 11:38:47 -0800299 if (!close(*fd_))
300 *fd_ = -1;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000301 }
302 }
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800303 void set_should_close(bool should_close) { should_close_ = should_close; }
adlr@google.com3defe6a2009-12-04 20:57:17 +0000304 private:
305 int* fd_;
306 bool should_close_;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700307 DISALLOW_COPY_AND_ASSIGN(ScopedFdCloser);
308};
309
Gilad Arnoldf9609112012-02-29 11:38:47 -0800310// An EINTR-immune file descriptor closer.
311class ScopedEintrSafeFdCloser {
312 public:
313 explicit ScopedEintrSafeFdCloser(int* fd) : fd_(fd), should_close_(true) {}
314 ~ScopedEintrSafeFdCloser() {
315 if (should_close_ && fd_ && (*fd_ >= 0)) {
316 if (!HANDLE_EINTR(close(*fd_)))
317 *fd_ = -1;
318 }
319 }
320 void set_should_close(bool should_close) { should_close_ = should_close; }
321 private:
322 int* fd_;
323 bool should_close_;
324 DISALLOW_COPY_AND_ASSIGN(ScopedEintrSafeFdCloser);
325};
326
Thieu Le5c7d9752010-12-15 16:09:28 -0800327// Utility class to close a file system
328class ScopedExt2fsCloser {
329 public:
330 explicit ScopedExt2fsCloser(ext2_filsys filsys) : filsys_(filsys) {}
331 ~ScopedExt2fsCloser() { ext2fs_close(filsys_); }
332
333 private:
334 ext2_filsys filsys_;
335 DISALLOW_COPY_AND_ASSIGN(ScopedExt2fsCloser);
336};
337
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700338// Utility class to delete a file when it goes out of scope.
339class ScopedPathUnlinker {
340 public:
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800341 explicit ScopedPathUnlinker(const std::string& path)
342 : path_(path),
343 should_remove_(true) {}
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700344 ~ScopedPathUnlinker() {
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800345 if (should_remove_ && unlink(path_.c_str()) < 0) {
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700346 std::string err_message = strerror(errno);
347 LOG(ERROR) << "Unable to unlink path " << path_ << ": " << err_message;
348 }
349 }
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800350 void set_should_remove(bool should_remove) { should_remove_ = should_remove; }
351
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700352 private:
353 const std::string path_;
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800354 bool should_remove_;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700355 DISALLOW_COPY_AND_ASSIGN(ScopedPathUnlinker);
356};
357
358// Utility class to delete an empty directory when it goes out of scope.
359class ScopedDirRemover {
360 public:
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800361 explicit ScopedDirRemover(const std::string& path)
362 : path_(path),
363 should_remove_(true) {}
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700364 ~ScopedDirRemover() {
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800365 if (should_remove_ && (rmdir(path_.c_str()) < 0)) {
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700366 PLOG(ERROR) << "Unable to remove dir " << path_;
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800367 }
368 }
369 void set_should_remove(bool should_remove) { should_remove_ = should_remove; }
370
371 protected:
372 const std::string path_;
373
374 private:
375 bool should_remove_;
376 DISALLOW_COPY_AND_ASSIGN(ScopedDirRemover);
377};
378
379// Utility class to unmount a filesystem mounted on a temporary directory and
380// delete the temporary directory when it goes out of scope.
381class ScopedTempUnmounter : public ScopedDirRemover {
382 public:
383 explicit ScopedTempUnmounter(const std::string& path) :
384 ScopedDirRemover(path) {}
385 ~ScopedTempUnmounter() {
386 utils::UnmountFilesystem(path_);
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700387 }
388 private:
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800389 DISALLOW_COPY_AND_ASSIGN(ScopedTempUnmounter);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000390};
391
392// A little object to call ActionComplete on the ActionProcessor when
393// it's destructed.
394class ScopedActionCompleter {
395 public:
396 explicit ScopedActionCompleter(ActionProcessor* processor,
397 AbstractAction* action)
398 : processor_(processor),
399 action_(action),
Darin Petkovc1a8b422010-07-19 11:34:49 -0700400 code_(kActionCodeError),
adlr@google.com3defe6a2009-12-04 20:57:17 +0000401 should_complete_(true) {}
402 ~ScopedActionCompleter() {
403 if (should_complete_)
Darin Petkovc1a8b422010-07-19 11:34:49 -0700404 processor_->ActionComplete(action_, code_);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000405 }
Darin Petkovc1a8b422010-07-19 11:34:49 -0700406 void set_code(ActionExitCode code) { code_ = code; }
adlr@google.com3defe6a2009-12-04 20:57:17 +0000407 void set_should_complete(bool should_complete) {
408 should_complete_ = should_complete;
409 }
Darin Petkovc1a8b422010-07-19 11:34:49 -0700410
adlr@google.com3defe6a2009-12-04 20:57:17 +0000411 private:
412 ActionProcessor* processor_;
413 AbstractAction* action_;
Darin Petkovc1a8b422010-07-19 11:34:49 -0700414 ActionExitCode code_;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000415 bool should_complete_;
416 DISALLOW_COPY_AND_ASSIGN(ScopedActionCompleter);
417};
418
419} // namespace chromeos_update_engine
420
421#define TEST_AND_RETURN_FALSE_ERRNO(_x) \
422 do { \
423 bool _success = (_x); \
424 if (!_success) { \
425 std::string _msg = \
426 chromeos_update_engine::utils::ErrnoNumberAsString(errno); \
427 LOG(ERROR) << #_x " failed: " << _msg; \
428 return false; \
429 } \
430 } while (0)
431
432#define TEST_AND_RETURN_FALSE(_x) \
433 do { \
434 bool _success = (_x); \
435 if (!_success) { \
436 LOG(ERROR) << #_x " failed."; \
437 return false; \
438 } \
439 } while (0)
440
441#define TEST_AND_RETURN_ERRNO(_x) \
442 do { \
443 bool _success = (_x); \
444 if (!_success) { \
445 std::string _msg = \
446 chromeos_update_engine::utils::ErrnoNumberAsString(errno); \
447 LOG(ERROR) << #_x " failed: " << _msg; \
448 return; \
449 } \
450 } while (0)
451
452#define TEST_AND_RETURN(_x) \
453 do { \
454 bool _success = (_x); \
455 if (!_success) { \
456 LOG(ERROR) << #_x " failed."; \
457 return; \
458 } \
459 } while (0)
460
Thieu Le5c7d9752010-12-15 16:09:28 -0800461#define TEST_AND_RETURN_FALSE_ERRCODE(_x) \
462 do { \
463 errcode_t _error = (_x); \
464 if (_error) { \
465 errno = _error; \
466 LOG(ERROR) << #_x " failed: " << _error; \
467 return false; \
468 } \
469 } while (0)
470
adlr@google.com3defe6a2009-12-04 20:57:17 +0000471
472
473#endif // CHROMEOS_PLATFORM_UPDATE_ENGINE_UTILS_H__