GIJ
NAMESYNOPSIS
DESCRIPTION
OPTIONS
SEE ALSO
COPYRIGHT
NAME
gij − GNU interpreter for Java bytecode
SYNOPSIS
gij [ OPTION ] ... JARFILE [ ARGS ...]
gij
[−jar] [ OPTION ] ...
CLASS [ ARGS
...]
[−cp path] [−classpath
path]
[−Dname[=value]...]
[−ms=number]
[−mx=number]
[−Xargument] [−verbose]
[−verbose:class]
[−−showversion]
[−−version]
[−−help][−?]
DESCRIPTION
"gij" is a Java bytecode interpreter included with "libgcj". "gij" is not available on every platform; porting it requires a small amount of assembly programming which has not been done for all the targets supported by gcj.
The primary argument to "gij" is the name of a class or, with "−jar", a jar file. Options before this argument are interpreted by "gij"; remaining options are passed to the interpreted program.
If a class name is specified and this class does not have a "main" method with the appropriate signature (a "static void" method with a "String[]" as its sole argument), then "gij" will print an error and exit.
If a jar file is specified then "gij" will use information in it to determine which class’ "main" method will be invoked.
"gij" will invoke the "main" method with all the remaining command-line options.
Note that "gij" is not limited to interpreting code. Because "libgcj" includes a class loader which can dynamically load shared objects, it is possible to give "gij" the name of a class which has been compiled and put into a shared library on the class path.
OPTIONS
−cp
path
−classpath path
Set the initial class path. The class path is used for finding class and resource files. If specified, this option overrides the "CLASSPATH" environment variable. Note that this option is ignored if "−jar" is used.
−Dname[=value]
This defines a system property named name with value value. If value is not specified then it defaults to the empty string. These system properties are initialized at the program’s startup and can be retrieved at runtime using the "java.lang.System.getProperty" method.
−ms=number
Equivalent to "−Xms".
−mx=number
Equivalent to "−Xmx".
−noverify
Do not verify compliance of bytecode with the VM specification. In addition, this option disables type verification which is otherwise performed on BC-ABI compiled code.
−X |
−Xargument
Supplying
"−X" by itself will cause
"gij" to list all the supported
"−X" options. Currently these
options are supported:
−Xmssize
Set the initial heap size.
−Xmxsize
Set the maximum heap size.
−Xsssize
Set the thread stack size.
Unrecognized "−X" options are ignored, for compatibility with other runtimes.
−jar
This indicates that the name passed to "gij" should be interpreted as the name of a jar file, not a class.
−−help
−? |
Print help, then exit. |
−−showversion
Print version number and continue.
−−fullversion
Print detailed version information, then exit.
−−version
Print version number, then exit.
−verbose
−verbose:class
Each time a class is initialized, print a short message on standard error.
"gij" also recognizes and ignores the following options, for compatibility with existing application launch scripts: "−client", "−server", "−hotspot", "−jrockit", "−agentlib", "−agentpath", "−debug", "−d32", "−d64", "−javaagent", "−noclassgc", "−verify", and "−verifyremote".
SEE ALSO
gcc(1), gcj(1), gcjh(1), jcf−dump(1), gfdl(7), and the Info entries for gcj and gcc.
COPYRIGHT
Copyright (c) 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2010 Free Software Foundation, Inc.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, the Front-Cover Texts being (a) (see below), and with the Back-Cover Texts being (b) (see below). A copy of the license is included in the man page gfdl(7).
(a) The FSF ’s Front-Cover Text is:
A GNU Manual
(b) The FSF ’s Back-Cover Text is:
You have freedom to copy and modify this GNU Manual, like GNU
software. Copies published by the Free Software Foundation raise
funds for GNU development.
More Linux Commands
manpages/ldap_delete_s.3.html
ldap_delete_s(3) - Perform an LDAP delete operation.........
The ldap_delete_s() routine is used to perform an LDAP delete operation synchronously. It takes dn, the DN of the entry to be deleted. It returns an LDAP error
manpages/traptoemail.1.html
traptoemail(1) - snmptrapd handler script to convert snmp tr
converts snmp traps into email messages. OPTIONS -f FROM sender address, defaults to root -s SMTPSERVER SMTP server, defaults to localhost ADDRESSES recipient a
manpages/pam_ftp.8.html
pam_ftp(8) - PAM module for anonymous access module.........
pam_ftp is a PAM module which provides a pluggable anonymous ftp mode of access. This module intercepts the users name and password. If the name is ftp or anony
manpages/TIFFquery.3tiff.html
TIFFquery(3tiff) - query routines - Linux manual page.......
The following routines return status information about an open TIFF file. TIFFCurrentDirectory returns the index of the current directory (directories are numbe
manpages/lrint.3.html
lrint(3) - round to nearest integer - Linux manual page.....
These functions round their argument to the nearest integer value, using the current rounding direction (see fesetround(3)). Note that unlike the rint(3) family
manpages/mkdosfs.8.html
mkdosfs(8) - create an MS-DOS file system under Linux.......
mkfs.fat is used to create an MS-DOS filesystem under Linux on a device (usually a disk partition). device is the special file corresponding to the device (e.g
manpages/mdu.1.html
mdu(1) - display the amount of space occupied by an MSDOS di
Mdu is used to list the space occupied by a directory, its subdirectories and its files. It is similar to the du command on Unix. The unit used are clusters. Us
manpages/FcMatrixScale.3.html
FcMatrixScale(3) - Scale a matrix - Linux manual page.......
FcMatrixScale multiplies matrix x values by sx and y values by sy. This is done by multiplying by the matrix: sx 0 0 sy VERSION Fontconfig version 2.8.0 FcMatri
manpages/recursive_key_scan.3.html
recursive_key_scan(3) - Apply a function to all keys in a ke
recursive_key_scan() performs a depth-first recursive scan of the specified keyring tree and applies func to every link found in the accessible keyrings in that
manpages/ausearch_add_timestamp_item.3.html
ausearch_add_timestamp_item(3) - build up search rule.......
ausearch_add_timestamp_item adds an event time condition to the current audit search expression. The search conditions can then be used to scan logs, files, or
manpages/XSetOCValues.3.html
XSetOCValues(3) - create output contexts - Linux man page...
The XCreateOC function creates an output context within the specified output method. The base font names argument is mandatory at creation time, and the output
manpages/sort.3pm.html
sort(3pm) - perl pragma to control sort() behaviour.........
With the sort pragma you can control the behaviour of the builtin sort() function. In Perl versions 5.6 and earlier the quicksort algorithm was used to implemen
