1 /* 2 * Copyright (C) 2006 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 package android.os; 18 19 import static android.os.ParcelFileDescriptor.MODE_APPEND; 20 import static android.os.ParcelFileDescriptor.MODE_CREATE; 21 import static android.os.ParcelFileDescriptor.MODE_READ_ONLY; 22 import static android.os.ParcelFileDescriptor.MODE_READ_WRITE; 23 import static android.os.ParcelFileDescriptor.MODE_TRUNCATE; 24 import static android.os.ParcelFileDescriptor.MODE_WRITE_ONLY; 25 import static android.system.OsConstants.EINVAL; 26 import static android.system.OsConstants.ENOSYS; 27 import static android.system.OsConstants.F_OK; 28 import static android.system.OsConstants.O_ACCMODE; 29 import static android.system.OsConstants.O_APPEND; 30 import static android.system.OsConstants.O_CREAT; 31 import static android.system.OsConstants.O_RDONLY; 32 import static android.system.OsConstants.O_RDWR; 33 import static android.system.OsConstants.O_TRUNC; 34 import static android.system.OsConstants.O_WRONLY; 35 import static android.system.OsConstants.R_OK; 36 import static android.system.OsConstants.SPLICE_F_MORE; 37 import static android.system.OsConstants.SPLICE_F_MOVE; 38 import static android.system.OsConstants.S_ISFIFO; 39 import static android.system.OsConstants.S_ISREG; 40 import static android.system.OsConstants.W_OK; 41 42 import android.annotation.NonNull; 43 import android.annotation.Nullable; 44 import android.annotation.TestApi; 45 import android.app.AppGlobals; 46 import android.compat.annotation.UnsupportedAppUsage; 47 import android.content.ContentResolver; 48 import android.content.Context; 49 import android.content.pm.PackageManager; 50 import android.content.pm.ProviderInfo; 51 import android.provider.DocumentsContract.Document; 52 import android.provider.MediaStore; 53 import android.system.ErrnoException; 54 import android.system.Os; 55 import android.system.StructStat; 56 import android.text.TextUtils; 57 import android.util.DataUnit; 58 import android.util.Log; 59 import android.util.Slog; 60 import android.webkit.MimeTypeMap; 61 62 import com.android.internal.annotations.VisibleForTesting; 63 import com.android.internal.util.ArrayUtils; 64 import com.android.internal.util.SizedInputStream; 65 66 import libcore.io.IoUtils; 67 import libcore.util.EmptyArray; 68 69 import java.io.BufferedInputStream; 70 import java.io.ByteArrayOutputStream; 71 import java.io.File; 72 import java.io.FileDescriptor; 73 import java.io.FileInputStream; 74 import java.io.FileNotFoundException; 75 import java.io.FileOutputStream; 76 import java.io.FilenameFilter; 77 import java.io.IOException; 78 import java.io.InputStream; 79 import java.io.OutputStream; 80 import java.nio.charset.StandardCharsets; 81 import java.security.DigestInputStream; 82 import java.security.MessageDigest; 83 import java.security.NoSuchAlgorithmException; 84 import java.util.Arrays; 85 import java.util.Collection; 86 import java.util.Comparator; 87 import java.util.Objects; 88 import java.util.concurrent.Executor; 89 import java.util.concurrent.TimeUnit; 90 import java.util.regex.Pattern; 91 import java.util.zip.CRC32; 92 import java.util.zip.CheckedInputStream; 93 94 /** 95 * Utility methods useful for working with files. 96 */ 97 public final class FileUtils { 98 private static final String TAG = "FileUtils"; 99 100 /** {@hide} */ public static final int S_IRWXU = 00700; 101 /** {@hide} */ public static final int S_IRUSR = 00400; 102 /** {@hide} */ public static final int S_IWUSR = 00200; 103 /** {@hide} */ public static final int S_IXUSR = 00100; 104 105 /** {@hide} */ public static final int S_IRWXG = 00070; 106 /** {@hide} */ public static final int S_IRGRP = 00040; 107 /** {@hide} */ public static final int S_IWGRP = 00020; 108 /** {@hide} */ public static final int S_IXGRP = 00010; 109 110 /** {@hide} */ public static final int S_IRWXO = 00007; 111 /** {@hide} */ public static final int S_IROTH = 00004; 112 /** {@hide} */ public static final int S_IWOTH = 00002; 113 /** {@hide} */ public static final int S_IXOTH = 00001; 114 115 @UnsupportedAppUsage FileUtils()116 private FileUtils() { 117 } 118 119 private static final String CAMERA_DIR_LOWER_CASE = "/storage/emulated/" + UserHandle.myUserId() 120 + "/dcim/camera"; 121 122 /** Regular expression for safe filenames: no spaces or metacharacters. 123 * 124 * Use a preload holder so that FileUtils can be compile-time initialized. 125 */ 126 private static class NoImagePreloadHolder { 127 public static final Pattern SAFE_FILENAME_PATTERN = Pattern.compile("[\\w%+,./=_-]+"); 128 } 129 130 // non-final so it can be toggled by Robolectric's ShadowFileUtils 131 private static boolean sEnableCopyOptimizations = true; 132 private static volatile int sMediaProviderAppId = -1; 133 134 private static final long COPY_CHECKPOINT_BYTES = 524288; 135 136 /** 137 * Listener that is called periodically as progress is made. 138 */ 139 public interface ProgressListener { onProgress(long progress)140 public void onProgress(long progress); 141 } 142 143 /** 144 * Set owner and mode of of given {@link File}. 145 * 146 * @param mode to apply through {@code chmod} 147 * @param uid to apply through {@code chown}, or -1 to leave unchanged 148 * @param gid to apply through {@code chown}, or -1 to leave unchanged 149 * @return 0 on success, otherwise errno. 150 * @hide 151 */ 152 @UnsupportedAppUsage setPermissions(File path, int mode, int uid, int gid)153 public static int setPermissions(File path, int mode, int uid, int gid) { 154 return setPermissions(path.getAbsolutePath(), mode, uid, gid); 155 } 156 157 /** 158 * Set owner and mode of of given path. 159 * 160 * @param mode to apply through {@code chmod} 161 * @param uid to apply through {@code chown}, or -1 to leave unchanged 162 * @param gid to apply through {@code chown}, or -1 to leave unchanged 163 * @return 0 on success, otherwise errno. 164 * @hide 165 */ 166 @UnsupportedAppUsage setPermissions(String path, int mode, int uid, int gid)167 public static int setPermissions(String path, int mode, int uid, int gid) { 168 try { 169 Os.chmod(path, mode); 170 } catch (ErrnoException e) { 171 Slog.w(TAG, "Failed to chmod(" + path + "): " + e); 172 return e.errno; 173 } 174 175 if (uid >= 0 || gid >= 0) { 176 try { 177 Os.chown(path, uid, gid); 178 } catch (ErrnoException e) { 179 Slog.w(TAG, "Failed to chown(" + path + "): " + e); 180 return e.errno; 181 } 182 } 183 184 return 0; 185 } 186 187 /** 188 * Set owner and mode of of given {@link FileDescriptor}. 189 * 190 * @param mode to apply through {@code chmod} 191 * @param uid to apply through {@code chown}, or -1 to leave unchanged 192 * @param gid to apply through {@code chown}, or -1 to leave unchanged 193 * @return 0 on success, otherwise errno. 194 * @hide 195 */ 196 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) setPermissions(FileDescriptor fd, int mode, int uid, int gid)197 public static int setPermissions(FileDescriptor fd, int mode, int uid, int gid) { 198 try { 199 Os.fchmod(fd, mode); 200 } catch (ErrnoException e) { 201 Slog.w(TAG, "Failed to fchmod(): " + e); 202 return e.errno; 203 } 204 205 if (uid >= 0 || gid >= 0) { 206 try { 207 Os.fchown(fd, uid, gid); 208 } catch (ErrnoException e) { 209 Slog.w(TAG, "Failed to fchown(): " + e); 210 return e.errno; 211 } 212 } 213 214 return 0; 215 } 216 217 /** 218 * Copy the owner UID, owner GID, and mode bits from one file to another. 219 * 220 * @param from File where attributes should be copied from. 221 * @param to File where attributes should be copied to. 222 * @hide 223 */ copyPermissions(@onNull File from, @NonNull File to)224 public static void copyPermissions(@NonNull File from, @NonNull File to) throws IOException { 225 try { 226 final StructStat stat = Os.stat(from.getAbsolutePath()); 227 Os.chmod(to.getAbsolutePath(), stat.st_mode); 228 Os.chown(to.getAbsolutePath(), stat.st_uid, stat.st_gid); 229 } catch (ErrnoException e) { 230 throw e.rethrowAsIOException(); 231 } 232 } 233 234 /** 235 * @deprecated use {@link Os#stat(String)} instead. 236 * @hide 237 */ 238 @Deprecated getUid(String path)239 public static int getUid(String path) { 240 try { 241 return Os.stat(path).st_uid; 242 } catch (ErrnoException e) { 243 return -1; 244 } 245 } 246 247 /** 248 * Perform an fsync on the given FileOutputStream. The stream at this 249 * point must be flushed but not yet closed. 250 * 251 * @hide 252 */ 253 @UnsupportedAppUsage sync(FileOutputStream stream)254 public static boolean sync(FileOutputStream stream) { 255 try { 256 if (stream != null) { 257 stream.getFD().sync(); 258 } 259 return true; 260 } catch (IOException e) { 261 } 262 return false; 263 } 264 265 /** 266 * @deprecated use {@link #copy(File, File)} instead. 267 * @hide 268 */ 269 @UnsupportedAppUsage 270 @Deprecated copyFile(File srcFile, File destFile)271 public static boolean copyFile(File srcFile, File destFile) { 272 try { 273 copyFileOrThrow(srcFile, destFile); 274 return true; 275 } catch (IOException e) { 276 return false; 277 } 278 } 279 280 /** 281 * @deprecated use {@link #copy(File, File)} instead. 282 * @hide 283 */ 284 @Deprecated copyFileOrThrow(File srcFile, File destFile)285 public static void copyFileOrThrow(File srcFile, File destFile) throws IOException { 286 try (InputStream in = new FileInputStream(srcFile)) { 287 copyToFileOrThrow(in, destFile); 288 } 289 } 290 291 /** 292 * @deprecated use {@link #copy(InputStream, OutputStream)} instead. 293 * @hide 294 */ 295 @UnsupportedAppUsage 296 @Deprecated copyToFile(InputStream inputStream, File destFile)297 public static boolean copyToFile(InputStream inputStream, File destFile) { 298 try { 299 copyToFileOrThrow(inputStream, destFile); 300 return true; 301 } catch (IOException e) { 302 return false; 303 } 304 } 305 306 /** 307 * @deprecated use {@link #copy(InputStream, OutputStream)} instead. 308 * @hide 309 */ 310 @Deprecated copyToFileOrThrow(InputStream in, File destFile)311 public static void copyToFileOrThrow(InputStream in, File destFile) throws IOException { 312 if (destFile.exists()) { 313 destFile.delete(); 314 } 315 try (FileOutputStream out = new FileOutputStream(destFile)) { 316 copy(in, out); 317 try { 318 Os.fsync(out.getFD()); 319 } catch (ErrnoException e) { 320 throw e.rethrowAsIOException(); 321 } 322 } 323 } 324 325 /** 326 * Copy the contents of one file to another, replacing any existing content. 327 * <p> 328 * Attempts to use several optimization strategies to copy the data in the 329 * kernel before falling back to a userspace copy as a last resort. 330 * 331 * @return number of bytes copied. 332 * @hide 333 */ copy(@onNull File from, @NonNull File to)334 public static long copy(@NonNull File from, @NonNull File to) throws IOException { 335 return copy(from, to, null, null, null); 336 } 337 338 /** 339 * Copy the contents of one file to another, replacing any existing content. 340 * <p> 341 * Attempts to use several optimization strategies to copy the data in the 342 * kernel before falling back to a userspace copy as a last resort. 343 * 344 * @param signal to signal if the copy should be cancelled early. 345 * @param executor that listener events should be delivered via. 346 * @param listener to be periodically notified as the copy progresses. 347 * @return number of bytes copied. 348 * @hide 349 */ copy(@onNull File from, @NonNull File to, @Nullable CancellationSignal signal, @Nullable Executor executor, @Nullable ProgressListener listener)350 public static long copy(@NonNull File from, @NonNull File to, 351 @Nullable CancellationSignal signal, @Nullable Executor executor, 352 @Nullable ProgressListener listener) throws IOException { 353 try (FileInputStream in = new FileInputStream(from); 354 FileOutputStream out = new FileOutputStream(to)) { 355 return copy(in, out, signal, executor, listener); 356 } 357 } 358 359 /** 360 * Copy the contents of one stream to another. 361 * <p> 362 * Attempts to use several optimization strategies to copy the data in the 363 * kernel before falling back to a userspace copy as a last resort. 364 * 365 * @return number of bytes copied. 366 */ copy(@onNull InputStream in, @NonNull OutputStream out)367 public static long copy(@NonNull InputStream in, @NonNull OutputStream out) throws IOException { 368 return copy(in, out, null, null, null); 369 } 370 371 /** 372 * Copy the contents of one stream to another. 373 * <p> 374 * Attempts to use several optimization strategies to copy the data in the 375 * kernel before falling back to a userspace copy as a last resort. 376 * 377 * @param signal to signal if the copy should be cancelled early. 378 * @param executor that listener events should be delivered via. 379 * @param listener to be periodically notified as the copy progresses. 380 * @return number of bytes copied. 381 */ copy(@onNull InputStream in, @NonNull OutputStream out, @Nullable CancellationSignal signal, @Nullable Executor executor, @Nullable ProgressListener listener)382 public static long copy(@NonNull InputStream in, @NonNull OutputStream out, 383 @Nullable CancellationSignal signal, @Nullable Executor executor, 384 @Nullable ProgressListener listener) throws IOException { 385 if (sEnableCopyOptimizations) { 386 if (in instanceof FileInputStream && out instanceof FileOutputStream) { 387 return copy(((FileInputStream) in).getFD(), ((FileOutputStream) out).getFD(), 388 signal, executor, listener); 389 } 390 } 391 392 // Worse case fallback to userspace 393 return copyInternalUserspace(in, out, signal, executor, listener); 394 } 395 396 /** 397 * Copy the contents of one FD to another. 398 * <p> 399 * Attempts to use several optimization strategies to copy the data in the 400 * kernel before falling back to a userspace copy as a last resort. 401 * 402 * @return number of bytes copied. 403 */ copy(@onNull FileDescriptor in, @NonNull FileDescriptor out)404 public static long copy(@NonNull FileDescriptor in, @NonNull FileDescriptor out) 405 throws IOException { 406 return copy(in, out, null, null, null); 407 } 408 409 /** 410 * Copy the contents of one FD to another. 411 * <p> 412 * Attempts to use several optimization strategies to copy the data in the 413 * kernel before falling back to a userspace copy as a last resort. 414 * 415 * @param signal to signal if the copy should be cancelled early. 416 * @param executor that listener events should be delivered via. 417 * @param listener to be periodically notified as the copy progresses. 418 * @return number of bytes copied. 419 */ copy(@onNull FileDescriptor in, @NonNull FileDescriptor out, @Nullable CancellationSignal signal, @Nullable Executor executor, @Nullable ProgressListener listener)420 public static long copy(@NonNull FileDescriptor in, @NonNull FileDescriptor out, 421 @Nullable CancellationSignal signal, @Nullable Executor executor, 422 @Nullable ProgressListener listener) throws IOException { 423 return copy(in, out, Long.MAX_VALUE, signal, executor, listener); 424 } 425 426 /** 427 * Copy the contents of one FD to another. 428 * <p> 429 * Attempts to use several optimization strategies to copy the data in the 430 * kernel before falling back to a userspace copy as a last resort. 431 * 432 * @param count the number of bytes to copy. 433 * @param signal to signal if the copy should be cancelled early. 434 * @param executor that listener events should be delivered via. 435 * @param listener to be periodically notified as the copy progresses. 436 * @return number of bytes copied. 437 * @hide 438 */ copy(@onNull FileDescriptor in, @NonNull FileDescriptor out, long count, @Nullable CancellationSignal signal, @Nullable Executor executor, @Nullable ProgressListener listener)439 public static long copy(@NonNull FileDescriptor in, @NonNull FileDescriptor out, long count, 440 @Nullable CancellationSignal signal, @Nullable Executor executor, 441 @Nullable ProgressListener listener) throws IOException { 442 if (sEnableCopyOptimizations) { 443 try { 444 final StructStat st_in = Os.fstat(in); 445 final StructStat st_out = Os.fstat(out); 446 if (S_ISREG(st_in.st_mode) && S_ISREG(st_out.st_mode)) { 447 try { 448 return copyInternalSendfile(in, out, count, signal, executor, listener); 449 } catch (ErrnoException e) { 450 if (e.errno == EINVAL || e.errno == ENOSYS) { 451 // sendfile(2) will fail in at least any of the following conditions: 452 // 1. |in| doesn't support mmap(2) 453 // 2. |out| was opened with O_APPEND 454 // We fallback to userspace copy if that fails 455 return copyInternalUserspace(in, out, count, signal, executor, 456 listener); 457 } 458 throw e; 459 } 460 } else if (S_ISFIFO(st_in.st_mode) || S_ISFIFO(st_out.st_mode)) { 461 return copyInternalSplice(in, out, count, signal, executor, listener); 462 } 463 } catch (ErrnoException e) { 464 throw e.rethrowAsIOException(); 465 } 466 } 467 468 // Worse case fallback to userspace 469 return copyInternalUserspace(in, out, count, signal, executor, listener); 470 } 471 472 /** 473 * Requires one of input or output to be a pipe. 474 * 475 * @hide 476 */ 477 @VisibleForTesting copyInternalSplice(FileDescriptor in, FileDescriptor out, long count, CancellationSignal signal, Executor executor, ProgressListener listener)478 public static long copyInternalSplice(FileDescriptor in, FileDescriptor out, long count, 479 CancellationSignal signal, Executor executor, ProgressListener listener) 480 throws ErrnoException { 481 long progress = 0; 482 long checkpoint = 0; 483 484 long t; 485 while ((t = Os.splice(in, null, out, null, Math.min(count, COPY_CHECKPOINT_BYTES), 486 SPLICE_F_MOVE | SPLICE_F_MORE)) != 0) { 487 progress += t; 488 checkpoint += t; 489 count -= t; 490 491 if (checkpoint >= COPY_CHECKPOINT_BYTES) { 492 if (signal != null) { 493 signal.throwIfCanceled(); 494 } 495 if (executor != null && listener != null) { 496 final long progressSnapshot = progress; 497 executor.execute(() -> { 498 listener.onProgress(progressSnapshot); 499 }); 500 } 501 checkpoint = 0; 502 } 503 } 504 if (executor != null && listener != null) { 505 final long progressSnapshot = progress; 506 executor.execute(() -> { 507 listener.onProgress(progressSnapshot); 508 }); 509 } 510 return progress; 511 } 512 513 /** 514 * Requires both input and output to be a regular file. 515 * 516 * @hide 517 */ 518 @VisibleForTesting copyInternalSendfile(FileDescriptor in, FileDescriptor out, long count, CancellationSignal signal, Executor executor, ProgressListener listener)519 public static long copyInternalSendfile(FileDescriptor in, FileDescriptor out, long count, 520 CancellationSignal signal, Executor executor, ProgressListener listener) 521 throws ErrnoException { 522 long progress = 0; 523 long checkpoint = 0; 524 525 long t; 526 while ((t = Os.sendfile(out, in, null, Math.min(count, COPY_CHECKPOINT_BYTES))) != 0) { 527 progress += t; 528 checkpoint += t; 529 count -= t; 530 531 if (checkpoint >= COPY_CHECKPOINT_BYTES) { 532 if (signal != null) { 533 signal.throwIfCanceled(); 534 } 535 if (executor != null && listener != null) { 536 final long progressSnapshot = progress; 537 executor.execute(() -> { 538 listener.onProgress(progressSnapshot); 539 }); 540 } 541 checkpoint = 0; 542 } 543 } 544 if (executor != null && listener != null) { 545 final long progressSnapshot = progress; 546 executor.execute(() -> { 547 listener.onProgress(progressSnapshot); 548 }); 549 } 550 return progress; 551 } 552 553 /** {@hide} */ 554 @Deprecated 555 @VisibleForTesting copyInternalUserspace(FileDescriptor in, FileDescriptor out, ProgressListener listener, CancellationSignal signal, long count)556 public static long copyInternalUserspace(FileDescriptor in, FileDescriptor out, 557 ProgressListener listener, CancellationSignal signal, long count) 558 throws IOException { 559 return copyInternalUserspace(in, out, count, signal, Runnable::run, listener); 560 } 561 562 /** {@hide} */ 563 @VisibleForTesting copyInternalUserspace(FileDescriptor in, FileDescriptor out, long count, CancellationSignal signal, Executor executor, ProgressListener listener)564 public static long copyInternalUserspace(FileDescriptor in, FileDescriptor out, long count, 565 CancellationSignal signal, Executor executor, ProgressListener listener) 566 throws IOException { 567 if (count != Long.MAX_VALUE) { 568 return copyInternalUserspace(new SizedInputStream(new FileInputStream(in), count), 569 new FileOutputStream(out), signal, executor, listener); 570 } else { 571 return copyInternalUserspace(new FileInputStream(in), 572 new FileOutputStream(out), signal, executor, listener); 573 } 574 } 575 576 /** {@hide} */ 577 @VisibleForTesting copyInternalUserspace(InputStream in, OutputStream out, CancellationSignal signal, Executor executor, ProgressListener listener)578 public static long copyInternalUserspace(InputStream in, OutputStream out, 579 CancellationSignal signal, Executor executor, ProgressListener listener) 580 throws IOException { 581 long progress = 0; 582 long checkpoint = 0; 583 byte[] buffer = new byte[8192]; 584 585 int t; 586 while ((t = in.read(buffer)) != -1) { 587 out.write(buffer, 0, t); 588 589 progress += t; 590 checkpoint += t; 591 592 if (checkpoint >= COPY_CHECKPOINT_BYTES) { 593 if (signal != null) { 594 signal.throwIfCanceled(); 595 } 596 if (executor != null && listener != null) { 597 final long progressSnapshot = progress; 598 executor.execute(() -> { 599 listener.onProgress(progressSnapshot); 600 }); 601 } 602 checkpoint = 0; 603 } 604 } 605 if (executor != null && listener != null) { 606 final long progressSnapshot = progress; 607 executor.execute(() -> { 608 listener.onProgress(progressSnapshot); 609 }); 610 } 611 return progress; 612 } 613 614 /** 615 * Check if a filename is "safe" (no metacharacters or spaces). 616 * @param file The file to check 617 * @hide 618 */ 619 @UnsupportedAppUsage isFilenameSafe(File file)620 public static boolean isFilenameSafe(File file) { 621 // Note, we check whether it matches what's known to be safe, 622 // rather than what's known to be unsafe. Non-ASCII, control 623 // characters, etc. are all unsafe by default. 624 return NoImagePreloadHolder.SAFE_FILENAME_PATTERN.matcher(file.getPath()).matches(); 625 } 626 627 /** 628 * Read a text file into a String, optionally limiting the length. 629 * @param file to read (will not seek, so things like /proc files are OK) 630 * @param max length (positive for head, negative of tail, 0 for no limit) 631 * @param ellipsis to add of the file was truncated (can be null) 632 * @return the contents of the file, possibly truncated 633 * @throws IOException if something goes wrong reading the file 634 * @hide 635 */ 636 @UnsupportedAppUsage readTextFile(File file, int max, String ellipsis)637 public static String readTextFile(File file, int max, String ellipsis) throws IOException { 638 InputStream input = new FileInputStream(file); 639 // wrapping a BufferedInputStream around it because when reading /proc with unbuffered 640 // input stream, bytes read not equal to buffer size is not necessarily the correct 641 // indication for EOF; but it is true for BufferedInputStream due to its implementation. 642 BufferedInputStream bis = new BufferedInputStream(input); 643 try { 644 long size = file.length(); 645 if (max > 0 || (size > 0 && max == 0)) { // "head" mode: read the first N bytes 646 if (size > 0 && (max == 0 || size < max)) max = (int) size; 647 byte[] data = new byte[max + 1]; 648 int length = bis.read(data); 649 if (length <= 0) return ""; 650 if (length <= max) return new String(data, 0, length); 651 if (ellipsis == null) return new String(data, 0, max); 652 return new String(data, 0, max) + ellipsis; 653 } else if (max < 0) { // "tail" mode: keep the last N 654 int len; 655 boolean rolled = false; 656 byte[] last = null; 657 byte[] data = null; 658 do { 659 if (last != null) rolled = true; 660 byte[] tmp = last; last = data; data = tmp; 661 if (data == null) data = new byte[-max]; 662 len = bis.read(data); 663 } while (len == data.length); 664 665 if (last == null && len <= 0) return ""; 666 if (last == null) return new String(data, 0, len); 667 if (len > 0) { 668 rolled = true; 669 System.arraycopy(last, len, last, 0, last.length - len); 670 System.arraycopy(data, 0, last, last.length - len, len); 671 } 672 if (ellipsis == null || !rolled) return new String(last); 673 return ellipsis + new String(last); 674 } else { // "cat" mode: size unknown, read it all in streaming fashion 675 ByteArrayOutputStream contents = new ByteArrayOutputStream(); 676 int len; 677 byte[] data = new byte[1024]; 678 do { 679 len = bis.read(data); 680 if (len > 0) contents.write(data, 0, len); 681 } while (len == data.length); 682 return contents.toString(); 683 } 684 } finally { 685 bis.close(); 686 input.close(); 687 } 688 } 689 690 /** {@hide} */ 691 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) stringToFile(File file, String string)692 public static void stringToFile(File file, String string) throws IOException { 693 stringToFile(file.getAbsolutePath(), string); 694 } 695 696 /** 697 * Writes the bytes given in {@code content} to the file whose absolute path 698 * is {@code filename}. 699 * 700 * @hide 701 */ bytesToFile(String filename, byte[] content)702 public static void bytesToFile(String filename, byte[] content) throws IOException { 703 if (filename.startsWith("/proc/")) { 704 final int oldMask = StrictMode.allowThreadDiskWritesMask(); 705 try (FileOutputStream fos = new FileOutputStream(filename)) { 706 fos.write(content); 707 } finally { 708 StrictMode.setThreadPolicyMask(oldMask); 709 } 710 } else { 711 try (FileOutputStream fos = new FileOutputStream(filename)) { 712 fos.write(content); 713 } 714 } 715 } 716 717 /** 718 * Writes string to file. Basically same as "echo -n $string > $filename" 719 * 720 * @param filename 721 * @param string 722 * @throws IOException 723 * @hide 724 */ 725 @UnsupportedAppUsage stringToFile(String filename, String string)726 public static void stringToFile(String filename, String string) throws IOException { 727 bytesToFile(filename, string.getBytes(StandardCharsets.UTF_8)); 728 } 729 730 /** 731 * Computes the checksum of a file using the CRC32 checksum routine. The 732 * value of the checksum is returned. 733 * 734 * @param file the file to checksum, must not be null 735 * @return the checksum value or an exception is thrown. 736 * @deprecated this is a weak hashing algorithm, and should not be used due 737 * to its potential for collision. 738 * @hide 739 */ 740 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) 741 @Deprecated checksumCrc32(File file)742 public static long checksumCrc32(File file) throws FileNotFoundException, IOException { 743 CRC32 checkSummer = new CRC32(); 744 CheckedInputStream cis = null; 745 746 try { 747 cis = new CheckedInputStream( new FileInputStream(file), checkSummer); 748 byte[] buf = new byte[128]; 749 while(cis.read(buf) >= 0) { 750 // Just read for checksum to get calculated. 751 } 752 return checkSummer.getValue(); 753 } finally { 754 if (cis != null) { 755 try { 756 cis.close(); 757 } catch (IOException e) { 758 } 759 } 760 } 761 } 762 763 /** 764 * Compute the digest of the given file using the requested algorithm. 765 * 766 * @param algorithm Any valid algorithm accepted by 767 * {@link MessageDigest#getInstance(String)}. 768 * @hide 769 */ 770 @TestApi 771 @NonNull digest(@onNull File file, @NonNull String algorithm)772 public static byte[] digest(@NonNull File file, @NonNull String algorithm) 773 throws IOException, NoSuchAlgorithmException { 774 try (FileInputStream in = new FileInputStream(file)) { 775 return digest(in, algorithm); 776 } 777 } 778 779 /** 780 * Compute the digest of the given file using the requested algorithm. 781 * 782 * @param algorithm Any valid algorithm accepted by 783 * {@link MessageDigest#getInstance(String)}. 784 * @hide 785 */ 786 @TestApi 787 @NonNull digest(@onNull InputStream in, @NonNull String algorithm)788 public static byte[] digest(@NonNull InputStream in, @NonNull String algorithm) 789 throws IOException, NoSuchAlgorithmException { 790 // TODO: implement kernel optimizations 791 return digestInternalUserspace(in, algorithm); 792 } 793 794 /** 795 * Compute the digest of the given file using the requested algorithm. 796 * 797 * @param algorithm Any valid algorithm accepted by 798 * {@link MessageDigest#getInstance(String)}. 799 * @hide 800 */ digest(FileDescriptor fd, String algorithm)801 public static byte[] digest(FileDescriptor fd, String algorithm) 802 throws IOException, NoSuchAlgorithmException { 803 // TODO: implement kernel optimizations 804 return digestInternalUserspace(new FileInputStream(fd), algorithm); 805 } 806 digestInternalUserspace(InputStream in, String algorithm)807 private static byte[] digestInternalUserspace(InputStream in, String algorithm) 808 throws IOException, NoSuchAlgorithmException { 809 final MessageDigest digest = MessageDigest.getInstance(algorithm); 810 try (DigestInputStream digestStream = new DigestInputStream(in, digest)) { 811 final byte[] buffer = new byte[8192]; 812 while (digestStream.read(buffer) != -1) { 813 } 814 } 815 return digest.digest(); 816 } 817 818 /** 819 * Delete older files in a directory until only those matching the given 820 * constraints remain. 821 * 822 * @param minCount Always keep at least this many files. 823 * @param minAgeMs Always keep files younger than this age, in milliseconds. 824 * @return if any files were deleted. 825 * @hide 826 */ 827 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) deleteOlderFiles(File dir, int minCount, long minAgeMs)828 public static boolean deleteOlderFiles(File dir, int minCount, long minAgeMs) { 829 if (minCount < 0 || minAgeMs < 0) { 830 throw new IllegalArgumentException("Constraints must be positive or 0"); 831 } 832 833 final File[] files = dir.listFiles(); 834 if (files == null) return false; 835 836 // Sort with newest files first 837 Arrays.sort(files, new Comparator<File>() { 838 @Override 839 public int compare(File lhs, File rhs) { 840 return Long.compare(rhs.lastModified(), lhs.lastModified()); 841 } 842 }); 843 844 // Keep at least minCount files 845 boolean deleted = false; 846 for (int i = minCount; i < files.length; i++) { 847 final File file = files[i]; 848 849 // Keep files newer than minAgeMs 850 final long age = System.currentTimeMillis() - file.lastModified(); 851 if (age > minAgeMs) { 852 if (file.delete()) { 853 Log.d(TAG, "Deleted old file " + file); 854 deleted = true; 855 } 856 } 857 } 858 return deleted; 859 } 860 861 /** 862 * Test if a file lives under the given directory, either as a direct child 863 * or a distant grandchild. 864 * <p> 865 * Both files <em>must</em> have been resolved using 866 * {@link File#getCanonicalFile()} to avoid symlink or path traversal 867 * attacks. 868 * 869 * @hide 870 */ contains(File[] dirs, File file)871 public static boolean contains(File[] dirs, File file) { 872 for (File dir : dirs) { 873 if (contains(dir, file)) { 874 return true; 875 } 876 } 877 return false; 878 } 879 880 /** {@hide} */ contains(Collection<File> dirs, File file)881 public static boolean contains(Collection<File> dirs, File file) { 882 for (File dir : dirs) { 883 if (contains(dir, file)) { 884 return true; 885 } 886 } 887 return false; 888 } 889 890 /** 891 * Test if a file lives under the given directory, either as a direct child 892 * or a distant grandchild. 893 * <p> 894 * Both files <em>must</em> have been resolved using 895 * {@link File#getCanonicalFile()} to avoid symlink or path traversal 896 * attacks. 897 * 898 * @hide 899 */ 900 @TestApi contains(File dir, File file)901 public static boolean contains(File dir, File file) { 902 if (dir == null || file == null) return false; 903 return contains(dir.getAbsolutePath(), file.getAbsolutePath()); 904 } 905 906 /** 907 * Test if a file lives under the given directory, either as a direct child 908 * or a distant grandchild. 909 * <p> 910 * Both files <em>must</em> have been resolved using 911 * {@link File#getCanonicalFile()} to avoid symlink or path traversal 912 * attacks. 913 * 914 * @hide 915 */ contains(String dirPath, String filePath)916 public static boolean contains(String dirPath, String filePath) { 917 if (dirPath.equals(filePath)) { 918 return true; 919 } 920 if (!dirPath.endsWith("/")) { 921 dirPath += "/"; 922 } 923 return filePath.startsWith(dirPath); 924 } 925 926 /** {@hide} */ deleteContentsAndDir(File dir)927 public static boolean deleteContentsAndDir(File dir) { 928 if (deleteContents(dir)) { 929 return dir.delete(); 930 } else { 931 return false; 932 } 933 } 934 935 /** {@hide} */ 936 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) deleteContents(File dir)937 public static boolean deleteContents(File dir) { 938 File[] files = dir.listFiles(); 939 boolean success = true; 940 if (files != null) { 941 for (File file : files) { 942 if (file.isDirectory()) { 943 success &= deleteContents(file); 944 } 945 if (!file.delete()) { 946 Log.w(TAG, "Failed to delete " + file); 947 success = false; 948 } 949 } 950 } 951 return success; 952 } 953 isValidExtFilenameChar(char c)954 private static boolean isValidExtFilenameChar(char c) { 955 switch (c) { 956 case '\0': 957 case '/': 958 return false; 959 default: 960 return true; 961 } 962 } 963 964 /** 965 * Check if given filename is valid for an ext4 filesystem. 966 * 967 * @hide 968 */ isValidExtFilename(String name)969 public static boolean isValidExtFilename(String name) { 970 return (name != null) && name.equals(buildValidExtFilename(name)); 971 } 972 973 /** 974 * Mutate the given filename to make it valid for an ext4 filesystem, 975 * replacing any invalid characters with "_". 976 * 977 * @hide 978 */ buildValidExtFilename(String name)979 public static String buildValidExtFilename(String name) { 980 if (TextUtils.isEmpty(name) || ".".equals(name) || "..".equals(name)) { 981 return "(invalid)"; 982 } 983 final StringBuilder res = new StringBuilder(name.length()); 984 for (int i = 0; i < name.length(); i++) { 985 final char c = name.charAt(i); 986 if (isValidExtFilenameChar(c)) { 987 res.append(c); 988 } else { 989 res.append('_'); 990 } 991 } 992 trimFilename(res, 255); 993 return res.toString(); 994 } 995 isValidFatFilenameChar(char c)996 private static boolean isValidFatFilenameChar(char c) { 997 if ((0x00 <= c && c <= 0x1f)) { 998 return false; 999 } 1000 switch (c) { 1001 case '"': 1002 case '*': 1003 case '/': 1004 case ':': 1005 case '<': 1006 case '>': 1007 case '?': 1008 case '\\': 1009 case '|': 1010 case 0x7F: 1011 return false; 1012 default: 1013 return true; 1014 } 1015 } 1016 1017 /** 1018 * Check if given filename is valid for a FAT filesystem. 1019 * 1020 * @hide 1021 */ isValidFatFilename(String name)1022 public static boolean isValidFatFilename(String name) { 1023 return (name != null) && name.equals(buildValidFatFilename(name)); 1024 } 1025 1026 /** 1027 * Mutate the given filename to make it valid for a FAT filesystem, 1028 * replacing any invalid characters with "_". 1029 * 1030 * @hide 1031 */ buildValidFatFilename(String name)1032 public static String buildValidFatFilename(String name) { 1033 if (TextUtils.isEmpty(name) || ".".equals(name) || "..".equals(name)) { 1034 return "(invalid)"; 1035 } 1036 final StringBuilder res = new StringBuilder(name.length()); 1037 for (int i = 0; i < name.length(); i++) { 1038 final char c = name.charAt(i); 1039 if (isValidFatFilenameChar(c)) { 1040 res.append(c); 1041 } else { 1042 res.append('_'); 1043 } 1044 } 1045 // Even though vfat allows 255 UCS-2 chars, we might eventually write to 1046 // ext4 through a FUSE layer, so use that limit. 1047 trimFilename(res, 255); 1048 return res.toString(); 1049 } 1050 1051 /** {@hide} */ 1052 @VisibleForTesting trimFilename(String str, int maxBytes)1053 public static String trimFilename(String str, int maxBytes) { 1054 final StringBuilder res = new StringBuilder(str); 1055 trimFilename(res, maxBytes); 1056 return res.toString(); 1057 } 1058 1059 /** {@hide} */ trimFilename(StringBuilder res, int maxBytes)1060 private static void trimFilename(StringBuilder res, int maxBytes) { 1061 byte[] raw = res.toString().getBytes(StandardCharsets.UTF_8); 1062 if (raw.length > maxBytes) { 1063 maxBytes -= 3; 1064 while (raw.length > maxBytes) { 1065 res.deleteCharAt(res.length() / 2); 1066 raw = res.toString().getBytes(StandardCharsets.UTF_8); 1067 } 1068 res.insert(res.length() / 2, "..."); 1069 } 1070 } 1071 1072 /** {@hide} */ rewriteAfterRename(File beforeDir, File afterDir, String path)1073 public static String rewriteAfterRename(File beforeDir, File afterDir, String path) { 1074 if (path == null) return null; 1075 final File result = rewriteAfterRename(beforeDir, afterDir, new File(path)); 1076 return (result != null) ? result.getAbsolutePath() : null; 1077 } 1078 1079 /** {@hide} */ rewriteAfterRename(File beforeDir, File afterDir, String[] paths)1080 public static String[] rewriteAfterRename(File beforeDir, File afterDir, String[] paths) { 1081 if (paths == null) return null; 1082 final String[] result = new String[paths.length]; 1083 for (int i = 0; i < paths.length; i++) { 1084 result[i] = rewriteAfterRename(beforeDir, afterDir, paths[i]); 1085 } 1086 return result; 1087 } 1088 1089 /** 1090 * Given a path under the "before" directory, rewrite it to live under the 1091 * "after" directory. For example, {@code /before/foo/bar.txt} would become 1092 * {@code /after/foo/bar.txt}. 1093 * 1094 * @hide 1095 */ rewriteAfterRename(File beforeDir, File afterDir, File file)1096 public static File rewriteAfterRename(File beforeDir, File afterDir, File file) { 1097 if (file == null || beforeDir == null || afterDir == null) return null; 1098 if (contains(beforeDir, file)) { 1099 final String splice = file.getAbsolutePath().substring( 1100 beforeDir.getAbsolutePath().length()); 1101 return new File(afterDir, splice); 1102 } 1103 return null; 1104 } 1105 1106 /** {@hide} */ buildUniqueFileWithExtension(File parent, String name, String ext)1107 private static File buildUniqueFileWithExtension(File parent, String name, String ext) 1108 throws FileNotFoundException { 1109 File file = buildFile(parent, name, ext); 1110 1111 // If conflicting file, try adding counter suffix 1112 int n = 0; 1113 while (file.exists()) { 1114 if (n++ >= 32) { 1115 throw new FileNotFoundException("Failed to create unique file"); 1116 } 1117 file = buildFile(parent, name + " (" + n + ")", ext); 1118 } 1119 1120 return file; 1121 } 1122 1123 /** 1124 * Generates a unique file name under the given parent directory. If the display name doesn't 1125 * have an extension that matches the requested MIME type, the default extension for that MIME 1126 * type is appended. If a file already exists, the name is appended with a numerical value to 1127 * make it unique. 1128 * 1129 * For example, the display name 'example' with 'text/plain' MIME might produce 1130 * 'example.txt' or 'example (1).txt', etc. 1131 * 1132 * @throws FileNotFoundException 1133 * @hide 1134 */ buildUniqueFile(File parent, String mimeType, String displayName)1135 public static File buildUniqueFile(File parent, String mimeType, String displayName) 1136 throws FileNotFoundException { 1137 final String[] parts = splitFileName(mimeType, displayName); 1138 return buildUniqueFileWithExtension(parent, parts[0], parts[1]); 1139 } 1140 1141 /** {@hide} */ buildNonUniqueFile(File parent, String mimeType, String displayName)1142 public static File buildNonUniqueFile(File parent, String mimeType, String displayName) { 1143 final String[] parts = splitFileName(mimeType, displayName); 1144 return buildFile(parent, parts[0], parts[1]); 1145 } 1146 1147 /** 1148 * Generates a unique file name under the given parent directory, keeping 1149 * any extension intact. 1150 * 1151 * @hide 1152 */ buildUniqueFile(File parent, String displayName)1153 public static File buildUniqueFile(File parent, String displayName) 1154 throws FileNotFoundException { 1155 final String name; 1156 final String ext; 1157 1158 // Extract requested extension from display name 1159 final int lastDot = displayName.lastIndexOf('.'); 1160 if (lastDot >= 0) { 1161 name = displayName.substring(0, lastDot); 1162 ext = displayName.substring(lastDot + 1); 1163 } else { 1164 name = displayName; 1165 ext = null; 1166 } 1167 1168 return buildUniqueFileWithExtension(parent, name, ext); 1169 } 1170 1171 /** 1172 * Splits file name into base name and extension. 1173 * If the display name doesn't have an extension that matches the requested MIME type, the 1174 * extension is regarded as a part of filename and default extension for that MIME type is 1175 * appended. 1176 * 1177 * @hide 1178 */ splitFileName(String mimeType, String displayName)1179 public static String[] splitFileName(String mimeType, String displayName) { 1180 String name; 1181 String ext; 1182 1183 if (Document.MIME_TYPE_DIR.equals(mimeType)) { 1184 name = displayName; 1185 ext = null; 1186 } else { 1187 String mimeTypeFromExt; 1188 1189 // Extract requested extension from display name 1190 final int lastDot = displayName.lastIndexOf('.'); 1191 if (lastDot >= 0) { 1192 name = displayName.substring(0, lastDot); 1193 ext = displayName.substring(lastDot + 1); 1194 mimeTypeFromExt = MimeTypeMap.getSingleton().getMimeTypeFromExtension( 1195 ext.toLowerCase()); 1196 } else { 1197 name = displayName; 1198 ext = null; 1199 mimeTypeFromExt = null; 1200 } 1201 1202 if (mimeTypeFromExt == null) { 1203 mimeTypeFromExt = ContentResolver.MIME_TYPE_DEFAULT; 1204 } 1205 1206 final String extFromMimeType; 1207 if (ContentResolver.MIME_TYPE_DEFAULT.equals(mimeType)) { 1208 extFromMimeType = null; 1209 } else { 1210 extFromMimeType = MimeTypeMap.getSingleton().getExtensionFromMimeType(mimeType); 1211 } 1212 1213 if (Objects.equals(mimeType, mimeTypeFromExt) || Objects.equals(ext, extFromMimeType)) { 1214 // Extension maps back to requested MIME type; allow it 1215 } else { 1216 // No match; insist that create file matches requested MIME 1217 name = displayName; 1218 ext = extFromMimeType; 1219 } 1220 } 1221 1222 if (ext == null) { 1223 ext = ""; 1224 } 1225 1226 return new String[] { name, ext }; 1227 } 1228 1229 /** {@hide} */ buildFile(File parent, String name, String ext)1230 private static File buildFile(File parent, String name, String ext) { 1231 if (TextUtils.isEmpty(ext)) { 1232 return new File(parent, name); 1233 } else { 1234 return new File(parent, name + "." + ext); 1235 } 1236 } 1237 1238 /** {@hide} */ listOrEmpty(@ullable File dir)1239 public static @NonNull String[] listOrEmpty(@Nullable File dir) { 1240 return (dir != null) ? ArrayUtils.defeatNullable(dir.list()) 1241 : EmptyArray.STRING; 1242 } 1243 1244 /** {@hide} */ listFilesOrEmpty(@ullable File dir)1245 public static @NonNull File[] listFilesOrEmpty(@Nullable File dir) { 1246 return (dir != null) ? ArrayUtils.defeatNullable(dir.listFiles()) 1247 : ArrayUtils.EMPTY_FILE; 1248 } 1249 1250 /** {@hide} */ listFilesOrEmpty(@ullable File dir, FilenameFilter filter)1251 public static @NonNull File[] listFilesOrEmpty(@Nullable File dir, FilenameFilter filter) { 1252 return (dir != null) ? ArrayUtils.defeatNullable(dir.listFiles(filter)) 1253 : ArrayUtils.EMPTY_FILE; 1254 } 1255 1256 /** {@hide} */ newFileOrNull(@ullable String path)1257 public static @Nullable File newFileOrNull(@Nullable String path) { 1258 return (path != null) ? new File(path) : null; 1259 } 1260 1261 /** 1262 * Creates a directory with name {@code name} under an existing directory {@code baseDir} if it 1263 * doesn't exist already. Returns a {@code File} object representing the directory if it exists 1264 * and {@code null} if not. 1265 * 1266 * @hide 1267 */ createDir(File baseDir, String name)1268 public static @Nullable File createDir(File baseDir, String name) { 1269 final File dir = new File(baseDir, name); 1270 1271 return createDir(dir) ? dir : null; 1272 } 1273 1274 /** 1275 * Ensure the given directory exists, creating it if needed. This method is threadsafe. 1276 * 1277 * @return false if the directory doesn't exist and couldn't be created 1278 * 1279 * @hide 1280 */ createDir(File dir)1281 public static boolean createDir(File dir) { 1282 if (dir.mkdir()) { 1283 return true; 1284 } 1285 1286 if (dir.exists()) { 1287 return dir.isDirectory(); 1288 } 1289 1290 return false; 1291 } 1292 1293 /** 1294 * Round the given size of a storage device to a nice round power-of-two 1295 * value, such as 256MB or 32GB. This avoids showing weird values like 1296 * "29.5GB" in UI. 1297 * Round ranges: 1298 * ... 1299 * (128 GB; 256 GB] -> 256 GB 1300 * (256 GB; 512 GB] -> 512 GB 1301 * (512 GB; 1000 GB] -> 1000 GB 1302 * (1000 GB; 2000 GB] -> 2000 GB 1303 * ... 1304 * etc 1305 * 1306 * @hide 1307 */ roundStorageSize(long size)1308 public static long roundStorageSize(long size) { 1309 long val = 1; 1310 long pow = 1; 1311 while ((val * pow) < size) { 1312 val <<= 1; 1313 if (val > 512) { 1314 val = 1; 1315 pow *= 1000; 1316 } 1317 } 1318 1319 Log.d(TAG, String.format("Rounded bytes from %d to %d", size, val * pow)); 1320 return val * pow; 1321 } 1322 toBytes(long value, String unit)1323 private static long toBytes(long value, String unit) { 1324 unit = unit.toUpperCase(); 1325 1326 if ("B".equals(unit)) { 1327 return value; 1328 } 1329 1330 if ("K".equals(unit) || "KB".equals(unit)) { 1331 return DataUnit.KILOBYTES.toBytes(value); 1332 } 1333 1334 if ("M".equals(unit) || "MB".equals(unit)) { 1335 return DataUnit.MEGABYTES.toBytes(value); 1336 } 1337 1338 if ("G".equals(unit) || "GB".equals(unit)) { 1339 return DataUnit.GIGABYTES.toBytes(value); 1340 } 1341 1342 if ("KI".equals(unit) || "KIB".equals(unit)) { 1343 return DataUnit.KIBIBYTES.toBytes(value); 1344 } 1345 1346 if ("MI".equals(unit) || "MIB".equals(unit)) { 1347 return DataUnit.MEBIBYTES.toBytes(value); 1348 } 1349 1350 if ("GI".equals(unit) || "GIB".equals(unit)) { 1351 return DataUnit.GIBIBYTES.toBytes(value); 1352 } 1353 1354 return Long.MIN_VALUE; 1355 } 1356 1357 /** 1358 * @param fmtSize The string that contains the size to be parsed. The 1359 * expected format is: 1360 * 1361 * <p>"^((\\s*[-+]?[0-9]+)\\s*(B|K|KB|M|MB|G|GB|Ki|KiB|Mi|MiB|Gi|GiB)\\s*)$" 1362 * 1363 * <p>For example: 10Kb, 500GiB, 100mb. The unit is not case sensitive. 1364 * 1365 * @return the size in bytes. If {@code fmtSize} has invalid format, it 1366 * returns {@link Long#MIN_VALUE}. 1367 * @hide 1368 */ parseSize(@ullable String fmtSize)1369 public static long parseSize(@Nullable String fmtSize) { 1370 if (fmtSize == null || fmtSize.isBlank()) { 1371 return Long.MIN_VALUE; 1372 } 1373 1374 int sign = 1; 1375 fmtSize = fmtSize.trim(); 1376 char first = fmtSize.charAt(0); 1377 if (first == '-' || first == '+') { 1378 if (first == '-') { 1379 sign = -1; 1380 } 1381 1382 fmtSize = fmtSize.substring(1); 1383 } 1384 1385 int index = 0; 1386 // Find the last index of the value in fmtSize. 1387 while (index < fmtSize.length() && Character.isDigit(fmtSize.charAt(index))) { 1388 index++; 1389 } 1390 1391 // Check if number and units are present. 1392 if (index == 0 || index == fmtSize.length()) { 1393 return Long.MIN_VALUE; 1394 } 1395 1396 long value = sign * Long.valueOf(fmtSize.substring(0, index)); 1397 String unit = fmtSize.substring(index).trim(); 1398 1399 return toBytes(value, unit); 1400 } 1401 1402 /** 1403 * Closes the given object quietly, ignoring any checked exceptions. Does 1404 * nothing if the given object is {@code null}. 1405 * 1406 * @deprecated This method may suppress potentially significant exceptions, particularly when 1407 * closing writable resources. With a writable resource, a failure thrown from {@code close()} 1408 * should be considered as significant as a failure thrown from a write method because it may 1409 * indicate a failure to flush bytes to the underlying resource. 1410 */ 1411 @Deprecated closeQuietly(@ullable AutoCloseable closeable)1412 public static void closeQuietly(@Nullable AutoCloseable closeable) { 1413 IoUtils.closeQuietly(closeable); 1414 } 1415 1416 /** 1417 * Closes the given object quietly, ignoring any checked exceptions. Does 1418 * nothing if the given object is {@code null}. 1419 * 1420 * @deprecated This method may suppress potentially significant exceptions, particularly when 1421 * closing writable resources. With a writable resource, a failure thrown from {@code close()} 1422 * should be considered as significant as a failure thrown from a write method because it may 1423 * indicate a failure to flush bytes to the underlying resource. 1424 */ 1425 @Deprecated closeQuietly(@ullable FileDescriptor fd)1426 public static void closeQuietly(@Nullable FileDescriptor fd) { 1427 IoUtils.closeQuietly(fd); 1428 } 1429 1430 /** {@hide} */ translateModeStringToPosix(String mode)1431 public static int translateModeStringToPosix(String mode) { 1432 // Quick check for invalid chars 1433 for (int i = 0; i < mode.length(); i++) { 1434 switch (mode.charAt(i)) { 1435 case 'r': 1436 case 'w': 1437 case 't': 1438 case 'a': 1439 break; 1440 default: 1441 throw new IllegalArgumentException("Bad mode: " + mode); 1442 } 1443 } 1444 1445 int res = 0; 1446 if (mode.startsWith("rw")) { 1447 res = O_RDWR | O_CREAT; 1448 } else if (mode.startsWith("w")) { 1449 res = O_WRONLY | O_CREAT; 1450 } else if (mode.startsWith("r")) { 1451 res = O_RDONLY; 1452 } else { 1453 throw new IllegalArgumentException("Bad mode: " + mode); 1454 } 1455 if (mode.indexOf('t') != -1) { 1456 res |= O_TRUNC; 1457 } 1458 if (mode.indexOf('a') != -1) { 1459 res |= O_APPEND; 1460 } 1461 return res; 1462 } 1463 1464 /** {@hide} */ translateModePosixToString(int mode)1465 public static String translateModePosixToString(int mode) { 1466 String res = ""; 1467 if ((mode & O_ACCMODE) == O_RDWR) { 1468 res = "rw"; 1469 } else if ((mode & O_ACCMODE) == O_WRONLY) { 1470 res = "w"; 1471 } else if ((mode & O_ACCMODE) == O_RDONLY) { 1472 res = "r"; 1473 } else { 1474 throw new IllegalArgumentException("Bad mode: " + mode); 1475 } 1476 if ((mode & O_TRUNC) == O_TRUNC) { 1477 res += "t"; 1478 } 1479 if ((mode & O_APPEND) == O_APPEND) { 1480 res += "a"; 1481 } 1482 return res; 1483 } 1484 1485 /** {@hide} */ translateModePosixToPfd(int mode)1486 public static int translateModePosixToPfd(int mode) { 1487 int res = 0; 1488 if ((mode & O_ACCMODE) == O_RDWR) { 1489 res = MODE_READ_WRITE; 1490 } else if ((mode & O_ACCMODE) == O_WRONLY) { 1491 res = MODE_WRITE_ONLY; 1492 } else if ((mode & O_ACCMODE) == O_RDONLY) { 1493 res = MODE_READ_ONLY; 1494 } else { 1495 throw new IllegalArgumentException("Bad mode: " + mode); 1496 } 1497 if ((mode & O_CREAT) == O_CREAT) { 1498 res |= MODE_CREATE; 1499 } 1500 if ((mode & O_TRUNC) == O_TRUNC) { 1501 res |= MODE_TRUNCATE; 1502 } 1503 if ((mode & O_APPEND) == O_APPEND) { 1504 res |= MODE_APPEND; 1505 } 1506 return res; 1507 } 1508 1509 /** {@hide} */ translateModePfdToPosix(int mode)1510 public static int translateModePfdToPosix(int mode) { 1511 int res = 0; 1512 if ((mode & MODE_READ_WRITE) == MODE_READ_WRITE) { 1513 res = O_RDWR; 1514 } else if ((mode & MODE_WRITE_ONLY) == MODE_WRITE_ONLY) { 1515 res = O_WRONLY; 1516 } else if ((mode & MODE_READ_ONLY) == MODE_READ_ONLY) { 1517 res = O_RDONLY; 1518 } else { 1519 throw new IllegalArgumentException("Bad mode: " + mode); 1520 } 1521 if ((mode & MODE_CREATE) == MODE_CREATE) { 1522 res |= O_CREAT; 1523 } 1524 if ((mode & MODE_TRUNCATE) == MODE_TRUNCATE) { 1525 res |= O_TRUNC; 1526 } 1527 if ((mode & MODE_APPEND) == MODE_APPEND) { 1528 res |= O_APPEND; 1529 } 1530 return res; 1531 } 1532 1533 /** {@hide} */ translateModeAccessToPosix(int mode)1534 public static int translateModeAccessToPosix(int mode) { 1535 if (mode == F_OK) { 1536 // There's not an exact mapping, so we attempt a read-only open to 1537 // determine if a file exists 1538 return O_RDONLY; 1539 } else if ((mode & (R_OK | W_OK)) == (R_OK | W_OK)) { 1540 return O_RDWR; 1541 } else if ((mode & R_OK) == R_OK) { 1542 return O_RDONLY; 1543 } else if ((mode & W_OK) == W_OK) { 1544 return O_WRONLY; 1545 } else { 1546 throw new IllegalArgumentException("Bad mode: " + mode); 1547 } 1548 } 1549 1550 /** {@hide} */ 1551 @VisibleForTesting convertToModernFd(FileDescriptor fd)1552 public static ParcelFileDescriptor convertToModernFd(FileDescriptor fd) { 1553 Context context = AppGlobals.getInitialApplication(); 1554 if (UserHandle.getAppId(Process.myUid()) == getMediaProviderAppId(context)) { 1555 // Never convert modern fd for MediaProvider, because this requires 1556 // MediaStore#scanFile and can cause infinite loops when MediaProvider scans 1557 return null; 1558 } 1559 1560 try (ParcelFileDescriptor dupFd = ParcelFileDescriptor.dup(fd)) { 1561 return MediaStore.getOriginalMediaFormatFileDescriptor(context, dupFd); 1562 } catch (Exception e) { 1563 // Ignore error 1564 return null; 1565 } 1566 } 1567 getMediaProviderAppId(Context context)1568 private static int getMediaProviderAppId(Context context) { 1569 if (sMediaProviderAppId != -1) { 1570 return sMediaProviderAppId; 1571 } 1572 1573 PackageManager pm = context.getPackageManager(); 1574 ProviderInfo provider = context.getPackageManager().resolveContentProvider( 1575 MediaStore.AUTHORITY, PackageManager.MATCH_DIRECT_BOOT_AWARE 1576 | PackageManager.MATCH_DIRECT_BOOT_UNAWARE 1577 | PackageManager.MATCH_SYSTEM_ONLY); 1578 if (provider == null) { 1579 return -1; 1580 } 1581 1582 sMediaProviderAppId = UserHandle.getAppId(provider.applicationInfo.uid); 1583 return sMediaProviderAppId; 1584 } 1585 1586 /** {@hide} */ 1587 @VisibleForTesting 1588 public static class MemoryPipe extends Thread implements AutoCloseable { 1589 private final FileDescriptor[] pipe; 1590 private final byte[] data; 1591 private final boolean sink; 1592 MemoryPipe(byte[] data, boolean sink)1593 private MemoryPipe(byte[] data, boolean sink) throws IOException { 1594 try { 1595 this.pipe = Os.pipe(); 1596 } catch (ErrnoException e) { 1597 throw e.rethrowAsIOException(); 1598 } 1599 this.data = data; 1600 this.sink = sink; 1601 } 1602 startInternal()1603 private MemoryPipe startInternal() { 1604 super.start(); 1605 return this; 1606 } 1607 createSource(byte[] data)1608 public static MemoryPipe createSource(byte[] data) throws IOException { 1609 return new MemoryPipe(data, false).startInternal(); 1610 } 1611 createSink(byte[] data)1612 public static MemoryPipe createSink(byte[] data) throws IOException { 1613 return new MemoryPipe(data, true).startInternal(); 1614 } 1615 getFD()1616 public FileDescriptor getFD() { 1617 return sink ? pipe[1] : pipe[0]; 1618 } 1619 getInternalFD()1620 public FileDescriptor getInternalFD() { 1621 return sink ? pipe[0] : pipe[1]; 1622 } 1623 1624 @Override run()1625 public void run() { 1626 final FileDescriptor fd = getInternalFD(); 1627 try { 1628 int i = 0; 1629 while (i < data.length) { 1630 if (sink) { 1631 i += Os.read(fd, data, i, data.length - i); 1632 } else { 1633 i += Os.write(fd, data, i, data.length - i); 1634 } 1635 } 1636 } catch (IOException | ErrnoException e) { 1637 // Ignored 1638 } finally { 1639 if (sink) { 1640 SystemClock.sleep(TimeUnit.SECONDS.toMillis(1)); 1641 } 1642 IoUtils.closeQuietly(fd); 1643 } 1644 } 1645 1646 @Override close()1647 public void close() throws Exception { 1648 IoUtils.closeQuietly(getFD()); 1649 } 1650 } 1651 } 1652