summaryrefslogtreecommitdiff
path: root/libjava/gnu/gcj/runtime/SystemClassLoader.java
diff options
context:
space:
mode:
authorupstream source tree <ports@midipix.org>2015-03-15 20:14:05 -0400
committerupstream source tree <ports@midipix.org>2015-03-15 20:14:05 -0400
commit554fd8c5195424bdbcabf5de30fdc183aba391bd (patch)
tree976dc5ab7fddf506dadce60ae936f43f58787092 /libjava/gnu/gcj/runtime/SystemClassLoader.java
downloadcbb-gcc-4.6.4-554fd8c5195424bdbcabf5de30fdc183aba391bd.tar.bz2
cbb-gcc-4.6.4-554fd8c5195424bdbcabf5de30fdc183aba391bd.tar.xz
obtained gcc-4.6.4.tar.bz2 from upstream website;upstream
verified gcc-4.6.4.tar.bz2.sig; imported gcc-4.6.4 source tree from verified upstream tarball. downloading a git-generated archive based on the 'upstream' tag should provide you with a source tree that is binary identical to the one extracted from the above tarball. if you have obtained the source via the command 'git clone', however, do note that line-endings of files in your working directory might differ from line-endings of the respective files in the upstream repository.
Diffstat (limited to 'libjava/gnu/gcj/runtime/SystemClassLoader.java')
-rw-r--r--libjava/gnu/gcj/runtime/SystemClassLoader.java113
1 files changed, 113 insertions, 0 deletions
diff --git a/libjava/gnu/gcj/runtime/SystemClassLoader.java b/libjava/gnu/gcj/runtime/SystemClassLoader.java
new file mode 100644
index 000000000..7470542cb
--- /dev/null
+++ b/libjava/gnu/gcj/runtime/SystemClassLoader.java
@@ -0,0 +1,113 @@
+/* Copyright (C) 2005, 2006 Free Software Foundation
+
+ This file is part of libgcj.
+
+This software is copyrighted work licensed under the terms of the
+Libgcj License. Please consult the file "LIBGCJ_LICENSE" for
+details. */
+
+package gnu.gcj.runtime;
+
+import java.io.*;
+import java.lang.reflect.Field;
+import java.util.StringTokenizer;
+import java.util.HashMap;
+import java.net.URL;
+import java.net.URLClassLoader;
+
+public final class SystemClassLoader extends URLClassLoader
+{
+ SystemClassLoader(ClassLoader parent)
+ {
+ super(new URL[0], parent);
+ }
+
+ // This holds all the "native" classes linked into the executable
+ // and registered with this loader.
+ private HashMap nativeClasses = new HashMap();
+
+ // This is called to register a native class which was linked into
+ // the application but which is registered with the system class
+ // loader after the VM is initialized.
+ void addClass(Class klass)
+ {
+ String packageName = null;
+ String className = klass.getName();
+ int lastDot = className.lastIndexOf('.');
+ if (lastDot != -1)
+ packageName = className.substring(0, lastDot);
+ if (packageName != null && getPackage(packageName) == null)
+ {
+ // Should have some way to store this information in a
+ // precompiled manifest.
+ definePackage(packageName, null, null, null, null, null, null, null);
+ }
+
+ // Use reflection to access the package-private "loadedClasses" field.
+ nativeClasses.put(className, klass);
+ }
+
+ protected native Class findClass(String name);
+
+ // We add the URLs to the system class loader late. The reason for
+ // this is that during bootstrap we don't want to parse URLs or
+ // create URL connections, since that will result in circularities
+ // causing a crash.
+ void init()
+ {
+ String sep = File.pathSeparator;
+ StringTokenizer st
+ = new StringTokenizer (System.getProperty ("java.class.path", "."),
+ sep, true);
+ // Pretend we start with a ':', so if we see a ':' first we add
+ // '.'.
+ boolean last_was_sep = true;
+ while (st.hasMoreElements ())
+ {
+ String e = st.nextToken ();
+ try
+ {
+ if (sep.equals(e))
+ {
+ if (last_was_sep)
+ {
+ // We saw two separators in a row, so add ".".
+ addURL(new URL("file", "", -1, "./"));
+ last_was_sep = false;
+ }
+ else
+ last_was_sep = true;
+ continue;
+ }
+
+ last_was_sep = false;
+ File path = new File(e);
+ // Ignore invalid paths.
+ if (!path.exists())
+ continue;
+ if (!e.endsWith (File.separator) && path.isDirectory ())
+ addURL(new URL("file", "", -1, e + File.separator));
+ else
+ addURL(new URL("file", "", -1, e));
+ }
+ catch (java.net.MalformedURLException x)
+ {
+ // This should never happen.
+ throw new RuntimeException(x);
+ }
+ }
+ // If we saw a trailing ":", add "." to the path.
+ if (last_was_sep)
+ {
+ try
+ {
+ addURL(new URL("file", "", -1, "./"));
+ }
+ catch (java.net.MalformedURLException x)
+ {
+ // This should never happen.
+ throw new RuntimeException(x);
+ }
+ }
+ }
+}