From ec55bd233aae78967918d8ee84be2ba8ca468c78 Mon Sep 17 00:00:00 2001 From: mkoch Date: Tue, 20 Apr 2004 12:30:19 +0000 Subject: 2004-04-20 Michael Koch * java/lang/Byte.java, java/lang/CharSequence.java, java/lang/ClassLoader.java, java/lang/Compiler.java, java/lang/Double.java, java/lang/Float.java, java/lang/Integer.java, java/lang/Long.java, java/lang/Math.java, java/lang/Number.java, java/lang/Package.java, java/lang/Runtime.java, java/lang/RuntimePermission.java, java/lang/SecurityManager.java, java/lang/Short.java, java/lang/StringBuffer.java, java/lang/System.java, java/lang/ThreadGroup.java, java/lang/Throwable.java, java/lang/reflect/InvocationHandler.java, java/lang/reflect/Proxy.java: Fixed javadocs, coding style and argument names all over. git-svn-id: svn+ssh://gcc.gnu.org/svn/gcc/trunk@80899 138bc75d-0d04-0410-961f-82ee72b054a4 --- libjava/java/lang/Runtime.java | 25 ++++++++++++++----------- 1 file changed, 14 insertions(+), 11 deletions(-) (limited to 'libjava/java/lang/Runtime.java') diff --git a/libjava/java/lang/Runtime.java b/libjava/java/lang/Runtime.java index 5c6037ed8a7..e14cd192f40 100644 --- a/libjava/java/lang/Runtime.java +++ b/libjava/java/lang/Runtime.java @@ -95,8 +95,9 @@ public class Runtime * System.loadLibrary calls Runtime.getRuntime, triggering initialization * Runtime. calls Properties., triggering initialization * Dictionary, Hashtable, and Properties have no dependencies - * Runtime. calls insertSystemProperties; the VM must make sure - * that there are not any harmful dependencies + * Runtime. calls VMRuntime.insertSystemProperties, triggering + * initialization of VMRuntime; the VM must make sure that there are + * not any harmful dependencies * Runtime. calls Runtime. * Runtime. calls StringTokenizer., triggering initialization * StringTokenizer has no dependencies @@ -170,13 +171,13 @@ public class Runtime * *

First, all shutdown hooks are run, in unspecified order, and * concurrently. Next, if finalization on exit has been enabled, all pending - * finalizers are run. Finally, the system calls halt. + * finalizers are run. Finally, the system calls halt.

* *

If this is run a second time after shutdown has already started, there * are two actions. If shutdown hooks are still executing, it blocks * indefinitely. Otherwise, if the status is nonzero it halts immediately; * if it is zero, it blocks indefinitely. This is typically called by - * System.exit. + * System.exit.

* * @param status the status to exit with * @throws SecurityException if permission is denied @@ -285,23 +286,23 @@ public class Runtime * System.exit was invoked), or when the user terminates * the virtual machine (such as by typing ^C, or logging off). There is * a security check to add hooks, - * RuntimePermission("shutdownHooks"). + * RuntimePermission("shutdownHooks"). * *

The hook must be an initialized, but unstarted Thread. The threads * are run concurrently, and started in an arbitrary order; and user * threads or daemons may still be running. Once shutdown hooks have * started, they must all complete, or else you must use halt, * to actually finish the shutdown sequence. Attempts to modify hooks - * after shutdown has started result in IllegalStateExceptions. + * after shutdown has started result in IllegalStateExceptions.

* *

It is imperative that you code shutdown hooks defensively, as you * do not want to deadlock, and have no idea what other hooks will be * running concurrently. It is also a good idea to finish quickly, as the - * virtual machine really wants to shut down! + * virtual machine really wants to shut down!

* *

There are no guarantees that such hooks will run, as there are ways * to forcibly kill a process. But in such a drastic case, shutdown hooks - * would do little for you in the first place. + * would do little for you in the first place.

* * @param hook an initialized, unstarted Thread * @throws IllegalArgumentException if the hook is already registered or run @@ -334,7 +335,7 @@ public class Runtime /** * De-register a shutdown hook. As when you registered it, there is a * security check to remove hooks, - * RuntimePermission("shutdownHooks"). + * RuntimePermission("shutdownHooks"). * * @param hook the hook to remove * @return true if the hook was successfully removed, false if it was not @@ -408,7 +409,7 @@ public class Runtime /** * Create a new subprocess with the specified command line. Calls - * exec(cmdline, null, null). A security check is performed, + * exec(cmdline, null, null). A security check is performed, * checkExec. * * @param cmdline the command to call @@ -635,9 +636,11 @@ public class Runtime * System.mapLibraryName(libname). There may be a security * check, of checkLink. * - * @param filename the file to load + * @param libname the library to load + * * @throws SecurityException if permission is denied * @throws UnsatisfiedLinkError if the library is not found + * * @see System#mapLibraryName(String) * @see ClassLoader#findLibrary(String) */ -- cgit v1.2.3