blob: aa78b1bc925621518bf4eecaee83e8df8e36f9c9 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
/*
* Copyright (C) 2008 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package java.lang;
import java.io.FileDescriptor;
import java.io.FileInputStream;
import java.io.FileOutputStream;
import java.io.IOException;
import java.io.InputStream;
import java.io.PrintStream;
import java.nio.channels.Channel;
import java.nio.channels.spi.SelectorProvider;
import java.security.SecurityPermission;
import java.util.Collection;
import java.util.HashMap;
import java.util.Map;
import java.util.Properties;
import java.util.PropertyPermission;
import java.util.Set;
import dalvik.system.VMStack;
/**
* Provides access to system-related information and resources including
* standard input and output. Enables clients to dynamically load native
* libraries. All methods of this class are accessed in a static way and the
* class itself can not be instantiated.
*
* @see Runtime
*
* @since Android 1.0
*/
public final class System {
/**
* Default input stream.
*
* @since Android 1.0
*/
public static final InputStream in;
/**
* Default output stream.
*
* @since Android 1.0
*/
public static final PrintStream out;
/**
* Default error output stream.
*
* @since Android 1.0
*/
public static final PrintStream err;
/**
* The System Properties table.
*/
private static Properties systemProperties;
/**
* The System default SecurityManager.
*/
private static SecurityManager securityManager;
/**
* Initialize all the slots in System on first use.
*/
static {
/*
* Set up standard in, out, and err. TODO err and out are
* String.ConsolePrintStream. All three are buffered in Harmony. Check
* and possibly change this later.
*/
err = new PrintStream(new FileOutputStream(FileDescriptor.err));
out = new PrintStream(new FileOutputStream(FileDescriptor.out));
in = new FileInputStream(FileDescriptor.in);
}
/**
* Sets the standard input stream to the given user defined input stream.
*
* @param newIn
* the user defined input stream to set as the standard input
* stream.
* @throws SecurityException
* if a {@link SecurityManager} is installed and its {@code
* checkPermission()} method does not allow the change of the
* stream.
* @since Android 1.0
*/
public static void setIn(InputStream newIn) {
SecurityManager secMgr = System.getSecurityManager();
if(secMgr != null) {
secMgr.checkPermission(RuntimePermission.permissionToSetIO);
}
setFieldImpl("in", "Ljava/io/InputStream;", newIn);
}
/**
* Sets the standard output stream to the given user defined output stream.
*
* @param newOut
* the user defined output stream to set as the standard output
* stream.
* @throws SecurityException
* if a {@link SecurityManager} is installed and its {@code
* checkPermission()} method does not allow the change of the
* stream.
* @since Android 1.0
*/
public static void setOut(java.io.PrintStream newOut) {
SecurityManager secMgr = System.getSecurityManager();
if(secMgr != null) {
secMgr.checkPermission(RuntimePermission.permissionToSetIO);
}
setFieldImpl("out", "Ljava/io/PrintStream;", newOut);
}
/**
* Sets the standard error output stream to the given user defined output
* stream.
*
* @param newErr
* the user defined output stream to set as the standard error
* output stream.
* @throws SecurityException
* if a {@link SecurityManager} is installed and its {@code
* checkPermission()} method does not allow the change of the
* stream.
* @since Android 1.0
*/
public static void setErr(java.io.PrintStream newErr) {
SecurityManager secMgr = System.getSecurityManager();
if(secMgr != null) {
secMgr.checkPermission(RuntimePermission.permissionToSetIO);
}
setFieldImpl("err", "Ljava/io/PrintStream;", newErr);
}
/**
* Prevents this class from being instantiated.
*/
private System() {
}
/**
* Copies the number of {@code length} elements of the Array {@code src}
* starting at the offset {@code srcPos} into the Array {@code dest} at
* the position {@code destPos}.
*
* @param src
* the source array to copy the content.
* @param srcPos
* the starting index of the content in {@code src}.
* @param dest
* the destination array to copy the data into.
* @param destPos
* the starting index for the copied content in {@code dest}.
* @param length
* the number of elements of the {@code array1} content they have
* to be copied.
* @since Android 1.0
*/
public static native void arraycopy(Object src, int srcPos, Object dest,
int destPos, int length);
/**
* Returns the current system time in milliseconds since January 1, 1970
* 00:00:00 UTC. This method shouldn't be used for measuring timeouts or
* other elapsed time measurements, as changing the system time can affect
* the results.
*
* @return the local system time in milliseconds.
* @since Android 1.0
*/
public static native long currentTimeMillis();
/**
* Returns the current timestamp of the most precise timer available on the
* local system. This timestamp can only be used to measure an elapsed
* period by comparing it against another timestamp. It cannot be used as a
* very exact system time expression.
*
* @return the current timestamp in nanoseconds.
* @since Android 1.0
*/
public static native long nanoTime();
/**
* Causes the virtual machine to stop running and the program to exit. If
* {@link #runFinalizersOnExit(boolean)} has been previously invoked with a
* {@code true} argument, then all all objects will be properly
* garbage-collected and finalized first.
*
* @param code
* the return code.
* @throws SecurityException
* if the running thread has not enough permission to exit the
* virtual machine.
* @see SecurityManager#checkExit
* @since Android 1.0
*/
public static void exit(int code) {
Runtime.getRuntime().exit(code);
}
/**
* Indicates to the virtual machine that it would be a good time to run the
* garbage collector. Note that this is a hint only. There is no guarantee
* that the garbage collector will actually be run.
*
* @since Android 1.0
*/
public static void gc() {
Runtime.getRuntime().gc();
}
/**
* Returns the value of the environment variable with the given name {@code
* var}.
*
* @param name
* the name of the environment variable.
* @return the value of the specified environment variable or {@code null}
* if no variable exists with the given name.
* @throws SecurityException
* if a {@link SecurityManager} is installed and its {@code
* checkPermission()} method does not allow the querying of
* single environment variables.
*
* @since Android 1.0
*/
public static String getenv(String name) {
if (name == null) {
throw new NullPointerException();
}
SecurityManager secMgr = System.getSecurityManager();
if (secMgr != null) {
secMgr.checkPermission(new RuntimePermission("getenv." + name));
}
return getEnvByName(name);
}
/*
* Returns an environment variable. No security checks are performed.
* @param var the name of the environment variable
* @return the value of the specified environment variable
*/
private static native String getEnvByName(String name);
/**
* Returns an unmodifiable map of all available environment variables.
*
* @return the map representing all environment variables.
* @throws SecurityException
* if a {@link SecurityManager} is installed and its {@code
* checkPermission()} method does not allow the querying of
* all environment variables.
* @since Android 1.0
*/
public static Map<String, String> getenv() {
SecurityManager secMgr = System.getSecurityManager();
if (secMgr != null) {
secMgr.checkPermission(new RuntimePermission("getenv.*"));
}
Map<String, String> map = new HashMap<String, String>();
int index = 0;
String entry = getEnvByIndex(index++);
while (entry != null) {
int pos = entry.indexOf('=');
if (pos != -1) {
map.put(entry.substring(0, pos), entry.substring(pos + 1));
}
entry = getEnvByIndex(index++);
}
return new SystemEnvironment(map);
}
/*
* Returns an environment variable. No security checks are performed. The
* safe way of traversing the environment is to start at index zero and
* count upwards until a null pointer is encountered. This marks the end of
* the Unix environment.
* @param index the index of the environment variable
* @return the value of the specified environment variable
*/
private static native String getEnvByIndex(int index);
/**
* Returns the inherited channel from the creator of the current virtual
* machine.
*
* @return the inherited {@link Channel} or {@code null} if none exists.
* @throws IOException
* if an I/O error occurred.
* @see SelectorProvider
* @see SelectorProvider#inheritedChannel()
* @since Android 1.0
*/
public static Channel inheritedChannel() throws IOException {
return SelectorProvider.provider().inheritedChannel();
}
/**
* Returns the system properties. Note that this is not a copy, so that
* changes made to the returned Properties object will be reflected in
* subsequent calls to getProperty and getProperties.
*
* @return the system properties.
* @throws SecurityException
* if a {@link SecurityManager} is installed and its {@code
* checkPropertiesAccess()} method does not allow the operation.
* @since Android 1.0
*/
public static Properties getProperties() {
SecurityManager secMgr = System.getSecurityManager();
if (secMgr != null) {
secMgr.checkPropertiesAccess();
}
return internalGetProperties();
}
/**
* Returns the system properties without any security checks. This is used
* for access from within java.lang.
*
* @return the system properties
*/
static Properties internalGetProperties() {
if (System.systemProperties == null) {
SystemProperties props = new SystemProperties();
props.preInit();
props.postInit();
System.systemProperties = props;
}
return systemProperties;
}
/**
* Returns the value of a particular system property or {@code null} if no
* such property exists.
* <p>
* The properties currently provided by the virtual machine are:
*
* <pre>
* java.vendor.url
* java.class.path
* user.home
* java.class.version
* os.version
* java.vendor
* user.dir
* user.timezone
* path.separator
* os.name
* os.arch
* line.separator
* file.separator
* user.name
* java.version
* java.home
* </pre>
*
* @param prop
* the name of the system property to look up.
* @return the value of the specified system property or {@code null} if the
* property doesn't exist.
* @throws SecurityException
* if a {@link SecurityManager} is installed and its {@code
* checkPropertyAccess()} method does not allow the operation.
* @since Android 1.0
*/
public static String getProperty(String prop) {
return getProperty(prop, null);
}
/**
* Returns the value of a particular system property. The {@code
* defaultValue} will be returned if no such property has been found.
*
* @param prop
* the name of the system property to look up.
* @param defaultValue
* the return value if the system property with the given name
* does not exist.
* @return the value of the specified system property or the {@code
* defaultValue} if the property does not exist.
* @throws SecurityException
* if a {@link SecurityManager} is installed and its {@code
* checkPropertyAccess()} method does not allow the operation.
* @since Android 1.0
*/
public static String getProperty(String prop, String defaultValue) {
if (prop.length() == 0) {
throw new IllegalArgumentException();
}
SecurityManager secMgr = System.getSecurityManager();
if (secMgr != null) {
secMgr.checkPropertyAccess(prop);
}
return internalGetProperties().getProperty(prop, defaultValue);
}
/**
* Sets the value of a particular system property.
*
* @param prop
* the name of the system property to be changed.
* @param value
* the value to associate with the given property {@code prop}.
* @return the old value of the property or {@code null} if the property
* didn't exist.
* @throws SecurityException
* if a security manager exists and write access to the
* specified property is not allowed.
* @since Android 1.0
*/
public static String setProperty(String prop, String value) {
if (prop.length() == 0) {
throw new IllegalArgumentException();
}
SecurityManager secMgr = System.getSecurityManager();
if (secMgr != null) {
secMgr.checkPermission(new PropertyPermission(prop, "write"));
}
return (String)internalGetProperties().setProperty(prop, value);
}
/**
* Removes a specific system property.
*
* @param key
* the name of the system property to be removed.
* @return the property value or {@code null} if the property didn't exist.
* @throws NullPointerException
* if the argument {@code key} is {@code null}.
* @throws IllegalArgumentException
* if the argument {@code key} is empty.
* @throws SecurityException
* if a security manager exists and write access to the
* specified property is not allowed.
* @since Android 1.0
*/
public static String clearProperty(String key) {
if (key == null) {
throw new NullPointerException();
}
if (key.length() == 0) {
throw new IllegalArgumentException();
}
SecurityManager secMgr = System.getSecurityManager();
if (secMgr != null) {
secMgr.checkPermission(new PropertyPermission(key, "write"));
}
return (String)internalGetProperties().remove(key);
}
/**
* Returns the active security manager.
*
* @return the system security manager object.
* @since Android 1.0
*/
public static SecurityManager getSecurityManager() {
return securityManager;
}
/**
* Returns an integer hash code for the parameter. The hash code returned is
* the same one that would be returned by the method {@code
* java.lang.Object.hashCode()}, whether or not the object's class has
* overridden hashCode(). The hash code for {@code null} is {@code 0}.
*
* @param anObject
* the object to calculate the hash code.
* @return the hash code for the given object.
* @see java.lang.Object#hashCode
* @since Android 1.0
*/
public static native int identityHashCode(Object anObject);
/**
* Loads the specified file as a dynamic library.
*
* @param pathName
* the path of the file to be loaded.
* @throws SecurityException
* if the library was not allowed to be loaded.
* @since Android 1.0
*/
public static void load(String pathName) {
SecurityManager smngr = System.getSecurityManager();
if (smngr != null) {
smngr.checkLink(pathName);
}
Runtime.getRuntime().load(pathName, VMStack.getCallingClassLoader());
}
/**
* Loads and links the shared library with the given name {@code libName}.
* The file will be searched in the default directory for shared libraries
* of the local system.
*
* @param libName
* the name of the library to load.
* @throws UnsatisfiedLinkError
* if the library could not be loaded.
* @throws SecurityException
* if the library was not allowed to be loaded.
* @since Android 1.0
*/
public static void loadLibrary(String libName) {
SecurityManager smngr = System.getSecurityManager();
if (smngr != null) {
smngr.checkLink(libName);
}
Runtime.getRuntime().loadLibrary(libName, VMStack.getCallingClassLoader());
}
/**
* Provides a hint to the virtual machine that it would be useful to attempt
* to perform any outstanding object finalizations.
*
* @since Android 1.0
*/
public static void runFinalization() {
Runtime.getRuntime().runFinalization();
}
/**
* Ensures that, when the virtual machine is about to exit, all objects are
* finalized. Note that all finalization which occurs when the system is
* exiting is performed after all running threads have been terminated.
*
* @param flag
* the flag determines if finalization on exit is enabled.
* @deprecated this method is unsafe.
* @since Android 1.0
*/
@SuppressWarnings("deprecation")
@Deprecated
public static void runFinalizersOnExit(boolean flag) {
Runtime.runFinalizersOnExit(flag);
}
/**
* Sets all system properties.
*
* @param p
* the new system property.
* @throws SecurityException
* if a {@link SecurityManager} is installed and its {@code
* checkPropertiesAccess()} method does not allow the operation.
* @since Android 1.0
*/
public static void setProperties(Properties p) {
SecurityManager secMgr = System.getSecurityManager();
if (secMgr != null) {
secMgr.checkPropertiesAccess();
}
systemProperties = p;
}
/**
* <strong>Warning:</strong> security managers do <strong>not</strong>
* provide a secure environment for executing untrusted code. Untrusted code
* cannot be safely isolated within the Dalvik VM.
*
* <p>Sets the active security manager. Note that once the security manager
* has been set, it can not be changed. Attempts to do that will cause a
* security exception.
*
* @param sm
* the new security manager.
* @throws SecurityException
* if the security manager has already been set and if its
* checkPermission method does not allow to redefine the
* security manager.
* @since Android 1.0
*/
public static void setSecurityManager(final SecurityManager sm) {
if (securityManager != null) {
securityManager.checkPermission(new java.lang.RuntimePermission("setSecurityManager"));
}
if (sm != null) {
// before the new manager assumed office, make a pass through
// the common operations and let it load needed classes (if any),
// to avoid infinite recursion later on
try {
sm.checkPermission(new SecurityPermission("getProperty.package.access"));
} catch (Exception ignore) {
}
try {
sm.checkPackageAccess("java.lang");
} catch (Exception ignore) {
}
}
securityManager = sm;
}
/**
* Returns the platform specific file name format for the shared library
* named by the argument.
*
* @param userLibName
* the name of the library to look up.
* @return the platform specific filename for the library.
* @since Android 1.0
*/
public static native String mapLibraryName(String userLibName);
/**
* Sets the value of the named static field in the receiver to the passed in
* argument.
*
* @param fieldName
* the name of the field to set, one of in, out, or err
* @param stream
* the new value of the field
*/
private static native void setFieldImpl(String fieldName, String signature, Object stream);
}
/**
* Internal class holding the System properties. Needed by the Dalvik VM for the
* two native methods. Must not be a local class, since we don't have a System
* instance.
*/
class SystemProperties extends Properties {
// Dummy, just to make the compiler happy.
native void preInit();
native void postInit();
}
/**
* Internal class holding the System environment variables. The Java spec
* mandates that this map be read-only, so we wrap our real map into this one
* and make sure no one touches the contents. We also check for null parameters
* and do some (seemingly unnecessary) type casts to fulfill the contract layed
* out in the spec.
*/
class SystemEnvironment implements Map {
private Map<String, String> map;
public SystemEnvironment(Map<String, String> map) {
this.map = map;
}
public void clear() {
throw new UnsupportedOperationException("Can't modify environment");
}
@SuppressWarnings("cast")
public boolean containsKey(Object key) {
if (key == null) {
throw new NullPointerException();
}
return map.containsKey((String)key);
}
@SuppressWarnings("cast")
public boolean containsValue(Object value) {
if (value == null) {
throw new NullPointerException();
}
return map.containsValue((String)value);
}
public Set entrySet() {
return map.entrySet();
}
@SuppressWarnings("cast")
public String get(Object key) {
if (key == null) {
throw new NullPointerException();
}
return map.get((String)key);
}
public boolean isEmpty() {
return map.isEmpty();
}
public Set<String> keySet() {
return map.keySet();
}
public String put(Object key, Object value) {
throw new UnsupportedOperationException("Can't modify environment");
}
public void putAll(Map map) {
throw new UnsupportedOperationException("Can't modify environment");
}
public String remove(Object key) {
throw new UnsupportedOperationException("Can't modify environment");
}
public int size() {
return map.size();
}
public Collection values() {
return map.values();
}
}