| /* |
| * Licensed to the Apache Software Foundation (ASF) under one or more |
| * contributor license agreements. See the NOTICE file distributed with |
| * this work for additional information regarding copyright ownership. |
| * The ASF licenses this file to You under the Apache License, Version 2.0 |
| * (the "License"); you may not use this file except in compliance with |
| * the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| /* |
| * Copyright (C) 2008 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| package java.lang; |
| |
| import java.io.FileDescriptor; |
| import java.io.FileInputStream; |
| import java.io.FileOutputStream; |
| import java.io.IOException; |
| import java.io.InputStream; |
| import java.io.PrintStream; |
| import java.nio.channels.Channel; |
| import java.nio.channels.spi.SelectorProvider; |
| import java.security.SecurityPermission; |
| import java.util.Collection; |
| import java.util.HashMap; |
| import java.util.Map; |
| import java.util.Properties; |
| import java.util.PropertyPermission; |
| import java.util.Set; |
| |
| import dalvik.system.VMStack; |
| |
| /** |
| * Provides access to system-related information and resources including |
| * standard input and output. Enables clients to dynamically load native |
| * libraries. All methods of this class are accessed in a static way and the |
| * class itself can not be instantiated. |
| * |
| * @see Runtime |
| * |
| * @since Android 1.0 |
| */ |
| public final class System { |
| |
| /** |
| * Default input stream. |
| * |
| * @since Android 1.0 |
| */ |
| public static final InputStream in; |
| |
| /** |
| * Default output stream. |
| * |
| * @since Android 1.0 |
| */ |
| public static final PrintStream out; |
| |
| /** |
| * Default error output stream. |
| * |
| * @since Android 1.0 |
| */ |
| public static final PrintStream err; |
| |
| /** |
| * The System Properties table. |
| */ |
| private static Properties systemProperties; |
| |
| /** |
| * The System default SecurityManager. |
| */ |
| private static SecurityManager securityManager; |
| |
| /** |
| * Initialize all the slots in System on first use. |
| */ |
| static { |
| /* |
| * Set up standard in, out, and err. TODO err and out are |
| * String.ConsolePrintStream. All three are buffered in Harmony. Check |
| * and possibly change this later. |
| */ |
| err = new PrintStream(new FileOutputStream(FileDescriptor.err)); |
| out = new PrintStream(new FileOutputStream(FileDescriptor.out)); |
| in = new FileInputStream(FileDescriptor.in); |
| } |
| |
| /** |
| * Sets the standard input stream to the given user defined input stream. |
| * |
| * @param newIn |
| * the user defined input stream to set as the standard input |
| * stream. |
| * @throws SecurityException |
| * if a {@link SecurityManager} is installed and its {@code |
| * checkPermission()} method does not allow the change of the |
| * stream. |
| * @since Android 1.0 |
| */ |
| public static void setIn(InputStream newIn) { |
| SecurityManager secMgr = System.getSecurityManager(); |
| if(secMgr != null) { |
| secMgr.checkPermission(RuntimePermission.permissionToSetIO); |
| } |
| setFieldImpl("in", "Ljava/io/InputStream;", newIn); |
| } |
| |
| /** |
| * Sets the standard output stream to the given user defined output stream. |
| * |
| * @param newOut |
| * the user defined output stream to set as the standard output |
| * stream. |
| * @throws SecurityException |
| * if a {@link SecurityManager} is installed and its {@code |
| * checkPermission()} method does not allow the change of the |
| * stream. |
| * @since Android 1.0 |
| */ |
| public static void setOut(java.io.PrintStream newOut) { |
| SecurityManager secMgr = System.getSecurityManager(); |
| if(secMgr != null) { |
| secMgr.checkPermission(RuntimePermission.permissionToSetIO); |
| } |
| setFieldImpl("out", "Ljava/io/PrintStream;", newOut); |
| } |
| |
| /** |
| * Sets the standard error output stream to the given user defined output |
| * stream. |
| * |
| * @param newErr |
| * the user defined output stream to set as the standard error |
| * output stream. |
| * @throws SecurityException |
| * if a {@link SecurityManager} is installed and its {@code |
| * checkPermission()} method does not allow the change of the |
| * stream. |
| * @since Android 1.0 |
| */ |
| public static void setErr(java.io.PrintStream newErr) { |
| SecurityManager secMgr = System.getSecurityManager(); |
| if(secMgr != null) { |
| secMgr.checkPermission(RuntimePermission.permissionToSetIO); |
| } |
| setFieldImpl("err", "Ljava/io/PrintStream;", newErr); |
| } |
| |
| /** |
| * Prevents this class from being instantiated. |
| */ |
| private System() { |
| } |
| |
| /** |
| * Copies the number of {@code length} elements of the Array {@code src} |
| * starting at the offset {@code srcPos} into the Array {@code dest} at |
| * the position {@code destPos}. |
| * |
| * @param src |
| * the source array to copy the content. |
| * @param srcPos |
| * the starting index of the content in {@code src}. |
| * @param dest |
| * the destination array to copy the data into. |
| * @param destPos |
| * the starting index for the copied content in {@code dest}. |
| * @param length |
| * the number of elements of the {@code array1} content they have |
| * to be copied. |
| * @since Android 1.0 |
| */ |
| public static native void arraycopy(Object src, int srcPos, Object dest, |
| int destPos, int length); |
| |
| /** |
| * Returns the current system time in milliseconds since January 1, 1970 |
| * 00:00:00 UTC. This method shouldn't be used for measuring timeouts or |
| * other elapsed time measurements, as changing the system time can affect |
| * the results. |
| * |
| * @return the local system time in milliseconds. |
| * @since Android 1.0 |
| */ |
| public static native long currentTimeMillis(); |
| |
| /** |
| * Returns the current timestamp of the most precise timer available on the |
| * local system. This timestamp can only be used to measure an elapsed |
| * period by comparing it against another timestamp. It cannot be used as a |
| * very exact system time expression. |
| * |
| * @return the current timestamp in nanoseconds. |
| * @since Android 1.0 |
| */ |
| public static native long nanoTime(); |
| |
| /** |
| * Causes the virtual machine to stop running and the program to exit. If |
| * {@link #runFinalizersOnExit(boolean)} has been previously invoked with a |
| * {@code true} argument, then all all objects will be properly |
| * garbage-collected and finalized first. |
| * |
| * @param code |
| * the return code. |
| * @throws SecurityException |
| * if the running thread has not enough permission to exit the |
| * virtual machine. |
| * @see SecurityManager#checkExit |
| * @since Android 1.0 |
| */ |
| public static void exit(int code) { |
| Runtime.getRuntime().exit(code); |
| } |
| |
| /** |
| * Indicates to the virtual machine that it would be a good time to run the |
| * garbage collector. Note that this is a hint only. There is no guarantee |
| * that the garbage collector will actually be run. |
| * |
| * @since Android 1.0 |
| */ |
| public static void gc() { |
| Runtime.getRuntime().gc(); |
| } |
| |
| /** |
| * Returns the value of the environment variable with the given name {@code |
| * var}. |
| * |
| * @param name |
| * the name of the environment variable. |
| * @return the value of the specified environment variable or {@code null} |
| * if no variable exists with the given name. |
| * @throws SecurityException |
| * if a {@link SecurityManager} is installed and its {@code |
| * checkPermission()} method does not allow the querying of |
| * single environment variables. |
| * |
| * @since Android 1.0 |
| */ |
| public static String getenv(String name) { |
| if (name == null) { |
| throw new NullPointerException(); |
| } |
| SecurityManager secMgr = System.getSecurityManager(); |
| if (secMgr != null) { |
| secMgr.checkPermission(new RuntimePermission("getenv." + name)); |
| } |
| |
| return getEnvByName(name); |
| } |
| |
| /* |
| * Returns an environment variable. No security checks are performed. |
| * @param var the name of the environment variable |
| * @return the value of the specified environment variable |
| */ |
| private static native String getEnvByName(String name); |
| |
| /** |
| * Returns an unmodifiable map of all available environment variables. |
| * |
| * @return the map representing all environment variables. |
| * @throws SecurityException |
| * if a {@link SecurityManager} is installed and its {@code |
| * checkPermission()} method does not allow the querying of |
| * all environment variables. |
| * @since Android 1.0 |
| */ |
| public static Map<String, String> getenv() { |
| SecurityManager secMgr = System.getSecurityManager(); |
| if (secMgr != null) { |
| secMgr.checkPermission(new RuntimePermission("getenv.*")); |
| } |
| |
| Map<String, String> map = new HashMap<String, String>(); |
| |
| int index = 0; |
| String entry = getEnvByIndex(index++); |
| while (entry != null) { |
| int pos = entry.indexOf('='); |
| if (pos != -1) { |
| map.put(entry.substring(0, pos), entry.substring(pos + 1)); |
| } |
| |
| entry = getEnvByIndex(index++); |
| } |
| |
| return new SystemEnvironment(map); |
| } |
| |
| /* |
| * Returns an environment variable. No security checks are performed. The |
| * safe way of traversing the environment is to start at index zero and |
| * count upwards until a null pointer is encountered. This marks the end of |
| * the Unix environment. |
| * @param index the index of the environment variable |
| * @return the value of the specified environment variable |
| */ |
| private static native String getEnvByIndex(int index); |
| |
| /** |
| * Returns the inherited channel from the creator of the current virtual |
| * machine. |
| * |
| * @return the inherited {@link Channel} or {@code null} if none exists. |
| * @throws IOException |
| * if an I/O error occurred. |
| * @see SelectorProvider |
| * @see SelectorProvider#inheritedChannel() |
| * @since Android 1.0 |
| */ |
| public static Channel inheritedChannel() throws IOException { |
| return SelectorProvider.provider().inheritedChannel(); |
| } |
| |
| /** |
| * Returns the system properties. Note that this is not a copy, so that |
| * changes made to the returned Properties object will be reflected in |
| * subsequent calls to getProperty and getProperties. |
| * |
| * @return the system properties. |
| * @throws SecurityException |
| * if a {@link SecurityManager} is installed and its {@code |
| * checkPropertiesAccess()} method does not allow the operation. |
| * @since Android 1.0 |
| */ |
| public static Properties getProperties() { |
| SecurityManager secMgr = System.getSecurityManager(); |
| if (secMgr != null) { |
| secMgr.checkPropertiesAccess(); |
| } |
| |
| return internalGetProperties(); |
| } |
| |
| /** |
| * Returns the system properties without any security checks. This is used |
| * for access from within java.lang. |
| * |
| * @return the system properties |
| */ |
| static Properties internalGetProperties() { |
| if (System.systemProperties == null) { |
| SystemProperties props = new SystemProperties(); |
| props.preInit(); |
| props.postInit(); |
| System.systemProperties = props; |
| } |
| |
| return systemProperties; |
| } |
| |
| /** |
| * Returns the value of a particular system property or {@code null} if no |
| * such property exists. |
| * <p> |
| * The properties currently provided by the virtual machine are: |
| * |
| * <pre> |
| * java.vendor.url |
| * java.class.path |
| * user.home |
| * java.class.version |
| * os.version |
| * java.vendor |
| * user.dir |
| * user.timezone |
| * path.separator |
| * os.name |
| * os.arch |
| * line.separator |
| * file.separator |
| * user.name |
| * java.version |
| * java.home |
| * </pre> |
| * |
| * @param prop |
| * the name of the system property to look up. |
| * @return the value of the specified system property or {@code null} if the |
| * property doesn't exist. |
| * @throws SecurityException |
| * if a {@link SecurityManager} is installed and its {@code |
| * checkPropertyAccess()} method does not allow the operation. |
| * @since Android 1.0 |
| */ |
| public static String getProperty(String prop) { |
| return getProperty(prop, null); |
| } |
| |
| /** |
| * Returns the value of a particular system property. The {@code |
| * defaultValue} will be returned if no such property has been found. |
| * |
| * @param prop |
| * the name of the system property to look up. |
| * @param defaultValue |
| * the return value if the system property with the given name |
| * does not exist. |
| * @return the value of the specified system property or the {@code |
| * defaultValue} if the property does not exist. |
| * @throws SecurityException |
| * if a {@link SecurityManager} is installed and its {@code |
| * checkPropertyAccess()} method does not allow the operation. |
| * @since Android 1.0 |
| */ |
| public static String getProperty(String prop, String defaultValue) { |
| if (prop.length() == 0) { |
| throw new IllegalArgumentException(); |
| } |
| SecurityManager secMgr = System.getSecurityManager(); |
| if (secMgr != null) { |
| secMgr.checkPropertyAccess(prop); |
| } |
| |
| return internalGetProperties().getProperty(prop, defaultValue); |
| } |
| |
| /** |
| * Sets the value of a particular system property. |
| * |
| * @param prop |
| * the name of the system property to be changed. |
| * @param value |
| * the value to associate with the given property {@code prop}. |
| * @return the old value of the property or {@code null} if the property |
| * didn't exist. |
| * @throws SecurityException |
| * if a security manager exists and write access to the |
| * specified property is not allowed. |
| * @since Android 1.0 |
| */ |
| public static String setProperty(String prop, String value) { |
| if (prop.length() == 0) { |
| throw new IllegalArgumentException(); |
| } |
| SecurityManager secMgr = System.getSecurityManager(); |
| if (secMgr != null) { |
| secMgr.checkPermission(new PropertyPermission(prop, "write")); |
| } |
| return (String)internalGetProperties().setProperty(prop, value); |
| } |
| |
| /** |
| * Removes a specific system property. |
| * |
| * @param key |
| * the name of the system property to be removed. |
| * @return the property value or {@code null} if the property didn't exist. |
| * @throws NullPointerException |
| * if the argument {@code key} is {@code null}. |
| * @throws IllegalArgumentException |
| * if the argument {@code key} is empty. |
| * @throws SecurityException |
| * if a security manager exists and write access to the |
| * specified property is not allowed. |
| * @since Android 1.0 |
| */ |
| public static String clearProperty(String key) { |
| if (key == null) { |
| throw new NullPointerException(); |
| } |
| if (key.length() == 0) { |
| throw new IllegalArgumentException(); |
| } |
| |
| SecurityManager secMgr = System.getSecurityManager(); |
| if (secMgr != null) { |
| secMgr.checkPermission(new PropertyPermission(key, "write")); |
| } |
| return (String)internalGetProperties().remove(key); |
| } |
| |
| /** |
| * Returns the active security manager. |
| * |
| * @return the system security manager object. |
| * @since Android 1.0 |
| */ |
| public static SecurityManager getSecurityManager() { |
| return securityManager; |
| } |
| |
| /** |
| * Returns an integer hash code for the parameter. The hash code returned is |
| * the same one that would be returned by the method {@code |
| * java.lang.Object.hashCode()}, whether or not the object's class has |
| * overridden hashCode(). The hash code for {@code null} is {@code 0}. |
| * |
| * @param anObject |
| * the object to calculate the hash code. |
| * @return the hash code for the given object. |
| * @see java.lang.Object#hashCode |
| * @since Android 1.0 |
| */ |
| public static native int identityHashCode(Object anObject); |
| |
| /** |
| * Loads the specified file as a dynamic library. |
| * |
| * @param pathName |
| * the path of the file to be loaded. |
| * @throws SecurityException |
| * if the library was not allowed to be loaded. |
| * @since Android 1.0 |
| */ |
| public static void load(String pathName) { |
| SecurityManager smngr = System.getSecurityManager(); |
| if (smngr != null) { |
| smngr.checkLink(pathName); |
| } |
| Runtime.getRuntime().load(pathName, VMStack.getCallingClassLoader()); |
| } |
| |
| /** |
| * Loads and links the shared library with the given name {@code libName}. |
| * The file will be searched in the default directory for shared libraries |
| * of the local system. |
| * |
| * @param libName |
| * the name of the library to load. |
| * @throws UnsatisfiedLinkError |
| * if the library could not be loaded. |
| * @throws SecurityException |
| * if the library was not allowed to be loaded. |
| * @since Android 1.0 |
| */ |
| public static void loadLibrary(String libName) { |
| SecurityManager smngr = System.getSecurityManager(); |
| if (smngr != null) { |
| smngr.checkLink(libName); |
| } |
| Runtime.getRuntime().loadLibrary(libName, VMStack.getCallingClassLoader()); |
| } |
| |
| /** |
| * Provides a hint to the virtual machine that it would be useful to attempt |
| * to perform any outstanding object finalizations. |
| * |
| * @since Android 1.0 |
| */ |
| public static void runFinalization() { |
| Runtime.getRuntime().runFinalization(); |
| } |
| |
| /** |
| * Ensures that, when the virtual machine is about to exit, all objects are |
| * finalized. Note that all finalization which occurs when the system is |
| * exiting is performed after all running threads have been terminated. |
| * |
| * @param flag |
| * the flag determines if finalization on exit is enabled. |
| * @deprecated this method is unsafe. |
| * @since Android 1.0 |
| */ |
| @SuppressWarnings("deprecation") |
| @Deprecated |
| public static void runFinalizersOnExit(boolean flag) { |
| Runtime.runFinalizersOnExit(flag); |
| } |
| |
| /** |
| * Sets all system properties. |
| * |
| * @param p |
| * the new system property. |
| * @throws SecurityException |
| * if a {@link SecurityManager} is installed and its {@code |
| * checkPropertiesAccess()} method does not allow the operation. |
| * @since Android 1.0 |
| */ |
| public static void setProperties(Properties p) { |
| SecurityManager secMgr = System.getSecurityManager(); |
| if (secMgr != null) { |
| secMgr.checkPropertiesAccess(); |
| } |
| |
| systemProperties = p; |
| } |
| |
| /** |
| * <strong>Warning:</strong> security managers do <strong>not</strong> |
| * provide a secure environment for executing untrusted code. Untrusted code |
| * cannot be safely isolated within the Dalvik VM. |
| * |
| * <p>Sets the active security manager. Note that once the security manager |
| * has been set, it can not be changed. Attempts to do that will cause a |
| * security exception. |
| * |
| * @param sm |
| * the new security manager. |
| * @throws SecurityException |
| * if the security manager has already been set and if its |
| * checkPermission method does not allow to redefine the |
| * security manager. |
| * @since Android 1.0 |
| */ |
| public static void setSecurityManager(final SecurityManager sm) { |
| if (securityManager != null) { |
| securityManager.checkPermission(new java.lang.RuntimePermission("setSecurityManager")); |
| } |
| |
| if (sm != null) { |
| // before the new manager assumed office, make a pass through |
| // the common operations and let it load needed classes (if any), |
| // to avoid infinite recursion later on |
| try { |
| sm.checkPermission(new SecurityPermission("getProperty.package.access")); |
| } catch (Exception ignore) { |
| } |
| try { |
| sm.checkPackageAccess("java.lang"); |
| } catch (Exception ignore) { |
| } |
| } |
| |
| securityManager = sm; |
| } |
| |
| /** |
| * Returns the platform specific file name format for the shared library |
| * named by the argument. |
| * |
| * @param userLibName |
| * the name of the library to look up. |
| * @return the platform specific filename for the library. |
| * @since Android 1.0 |
| */ |
| public static native String mapLibraryName(String userLibName); |
| |
| /** |
| * Sets the value of the named static field in the receiver to the passed in |
| * argument. |
| * |
| * @param fieldName |
| * the name of the field to set, one of in, out, or err |
| * @param stream |
| * the new value of the field |
| */ |
| private static native void setFieldImpl(String fieldName, String signature, Object stream); |
| |
| } |
| |
| /** |
| * Internal class holding the System properties. Needed by the Dalvik VM for the |
| * two native methods. Must not be a local class, since we don't have a System |
| * instance. |
| */ |
| class SystemProperties extends Properties { |
| // Dummy, just to make the compiler happy. |
| |
| native void preInit(); |
| |
| native void postInit(); |
| } |
| |
| /** |
| * Internal class holding the System environment variables. The Java spec |
| * mandates that this map be read-only, so we wrap our real map into this one |
| * and make sure no one touches the contents. We also check for null parameters |
| * and do some (seemingly unnecessary) type casts to fulfill the contract layed |
| * out in the spec. |
| */ |
| class SystemEnvironment implements Map { |
| |
| private Map<String, String> map; |
| |
| public SystemEnvironment(Map<String, String> map) { |
| this.map = map; |
| } |
| |
| public void clear() { |
| throw new UnsupportedOperationException("Can't modify environment"); |
| } |
| |
| @SuppressWarnings("cast") |
| public boolean containsKey(Object key) { |
| if (key == null) { |
| throw new NullPointerException(); |
| } |
| |
| return map.containsKey((String)key); |
| } |
| |
| @SuppressWarnings("cast") |
| public boolean containsValue(Object value) { |
| if (value == null) { |
| throw new NullPointerException(); |
| } |
| |
| return map.containsValue((String)value); |
| } |
| |
| public Set entrySet() { |
| return map.entrySet(); |
| } |
| |
| @SuppressWarnings("cast") |
| public String get(Object key) { |
| if (key == null) { |
| throw new NullPointerException(); |
| } |
| |
| return map.get((String)key); |
| } |
| |
| public boolean isEmpty() { |
| return map.isEmpty(); |
| } |
| |
| public Set<String> keySet() { |
| return map.keySet(); |
| } |
| |
| public String put(Object key, Object value) { |
| throw new UnsupportedOperationException("Can't modify environment"); |
| } |
| |
| public void putAll(Map map) { |
| throw new UnsupportedOperationException("Can't modify environment"); |
| } |
| |
| public String remove(Object key) { |
| throw new UnsupportedOperationException("Can't modify environment"); |
| } |
| |
| public int size() { |
| return map.size(); |
| } |
| |
| public Collection values() { |
| return map.values(); |
| } |
| |
| } |