|
22 | 22 | .\"t
|
23 | 23 | .\" Automatically generated by Pandoc 2.3.1
|
24 | 24 | .\"
|
25 |
| -.TH "JAVA" "1" "2020" "JDK 16" "JDK Commands" |
| 25 | +.TH "JAVA" "1" "2020" "JDK 17" "JDK Commands" |
26 | 26 | .hy
|
27 | 27 | .SH NAME
|
28 | 28 | .PP
|
@@ -181,7 +181,7 @@ with new values added and old values removed.
|
181 | 181 | You\[aq]ll get an error message if you use a value of \f[I]N\f[R] that is
|
182 | 182 | no longer supported.
|
183 | 183 | The supported values of \f[I]N\f[R] are the current Java SE release
|
184 |
| -(\f[CB]16\f[R]) and a limited number of previous releases, detailed in the |
| 184 | +(\f[CB]17\f[R]) and a limited number of previous releases, detailed in the |
185 | 185 | command\-line help for \f[CB]javac\f[R], under the \f[CB]\-\-source\f[R] and
|
186 | 186 | \f[CB]\-\-release\f[R] options.
|
187 | 187 | .RE
|
@@ -1120,72 +1120,6 @@ Updates \f[I]module\f[R] to open \f[I]package\f[R] to
|
1120 | 1120 | .RS
|
1121 | 1121 | .RE
|
1122 | 1122 | .TP
|
1123 |
| -.B \f[CB]\-\-illegal\-access=\f[R]\f[I]parameter\f[R] |
1124 |
| -When present at run time, \f[CB]\-\-illegal\-access=\f[R] takes a keyword |
1125 |
| -\f[I]parameter\f[R] to specify a mode of operation: |
1126 |
| -.RS |
1127 |
| -.RS |
1128 |
| -.PP |
1129 |
| -\f[B]Note:\f[R] This option will be removed in a future release. |
1130 |
| -.RE |
1131 |
| -.IP \[bu] 2 |
1132 |
| -\f[CB]permit\f[R]: This mode opens each package in each module in the |
1133 |
| -run\-time image to code in all unnamed modules ( such as code on the |
1134 |
| -class path), if that package existed in JDK 8. |
1135 |
| -This enables both static access, (for example, by compiled bytecode, and |
1136 |
| -deep reflective access) through the platform\[aq]s various reflection |
1137 |
| -APIs. |
1138 |
| -The first reflective\-access operation to any such package causes a |
1139 |
| -warning to be issued. |
1140 |
| -However, no warnings are issued after the first occurrence. |
1141 |
| -This single warning describes how to enable further warnings. |
1142 |
| -This mode is the default for the current JDK but will change in a future |
1143 |
| -release. |
1144 |
| -.IP \[bu] 2 |
1145 |
| -\f[CB]warn\f[R]: This mode is identical to \f[CB]permit\f[R] except that a |
1146 |
| -warning message is issued for each illegal reflective\-access operation. |
1147 |
| -.IP \[bu] 2 |
1148 |
| -\f[CB]debug\f[R]: This mode is identical to \f[CB]warn\f[R] except that both |
1149 |
| -a warning message and a stack trace are issued for each illegal |
1150 |
| -reflective\-access operation. |
1151 |
| -.IP \[bu] 2 |
1152 |
| -\f[CB]deny\f[R]: This mode disables all illegal\-access operations except |
1153 |
| -for those enabled by other command\-line options, such as |
1154 |
| -\f[CB]\-\-add\-opens\f[R]. |
1155 |
| -This mode will become the default in a future release. |
1156 |
| -.PP |
1157 |
| -The default mode, \f[CB]\-\-illegal\-access=permit\f[R], is intended to |
1158 |
| -make you aware of code on the class path that reflectively accesses any |
1159 |
| -JDK\-internal APIs at least once. |
1160 |
| -To learn about all such accesses, you can use the \f[CB]warn\f[R] or the |
1161 |
| -\f[CB]debug\f[R] modes. |
1162 |
| -For each library or framework on the class path that requires illegal |
1163 |
| -access, you have two options: |
1164 |
| -.IP \[bu] 2 |
1165 |
| -If the component\[aq]s maintainers have already released a fixed version |
1166 |
| -that no longer uses JDK\-internal APIs then you can consider upgrading |
1167 |
| -to that version. |
1168 |
| -.IP \[bu] 2 |
1169 |
| -If the component still needs to be fixed, then you can contact its |
1170 |
| -maintainers and ask them to replace their use of JDK\-internal APIs with |
1171 |
| -the proper exported APIs. |
1172 |
| -.PP |
1173 |
| -If you must continue to use a component that requires illegal access, |
1174 |
| -then you can eliminate the warning messages by using one or more |
1175 |
| -\f[CB]\-\-add\-opens\f[R] options to open only those internal packages to |
1176 |
| -which access is required. |
1177 |
| -.PP |
1178 |
| -To verify that your application is ready for a future version of the |
1179 |
| -JDK, run it with \f[CB]\-\-illegal\-access=deny\f[R] along with any |
1180 |
| -necessary \f[CB]\-\-add\-opens\f[R] options. |
1181 |
| -Any remaining illegal\-access errors will most likely be due to static |
1182 |
| -references from compiled code to JDK\-internal APIs. |
1183 |
| -You can identify those by running the \f[B]jdeps\f[R] tool with the |
1184 |
| -\f[CB]\-\-jdk\-internals\f[R] option. |
1185 |
| -For performance reasons, the current JDK does not issue warnings for |
1186 |
| -illegal static\-access operations. |
1187 |
| -.RE |
1188 |
| -.TP |
1189 | 1123 | .B \f[CB]\-\-limit\-modules\f[R] \f[I]module\f[R][\f[CB],\f[R]\f[I]module\f[R]...]
|
1190 | 1124 | Specifies the limit of the universe of observable modules.
|
1191 | 1125 | .RS
|
@@ -3937,6 +3871,68 @@ future JDK release.
|
3937 | 3871 | They\[aq]re still accepted and acted upon, but a warning is issued when
|
3938 | 3872 | they\[aq]re used.
|
3939 | 3873 | .TP
|
| 3874 | +.B \f[CB]\-\-illegal\-access=\f[R]\f[I]parameter\f[R] |
| 3875 | +When present at run time, \f[CB]\-\-illegal\-access=\f[R] takes a keyword |
| 3876 | +\f[I]parameter\f[R] to specify a mode of operation: |
| 3877 | +.RS |
| 3878 | +.RS |
| 3879 | +.PP |
| 3880 | +\f[B]Note:\f[R] This option will be removed in a future release. |
| 3881 | +.RE |
| 3882 | +.IP \[bu] 2 |
| 3883 | +\f[CB]permit\f[R]: This mode opens each package in each module in the |
| 3884 | +run\-time image to code in all unnamed modules ( such as code on the |
| 3885 | +class path), if that package existed in JDK 8. |
| 3886 | +This enables both static access, (for example, by compiled bytecode, and |
| 3887 | +deep reflective access) through the platform\[aq]s various reflection |
| 3888 | +APIs. |
| 3889 | +The first reflective\-access operation to any such package causes a |
| 3890 | +warning to be issued. |
| 3891 | +However, no warnings are issued after the first occurrence. |
| 3892 | +This single warning describes how to enable further warnings. |
| 3893 | +.IP \[bu] 2 |
| 3894 | +\f[CB]warn\f[R]: This mode is identical to \f[CB]permit\f[R] except that a |
| 3895 | +warning message is issued for each illegal reflective\-access operation. |
| 3896 | +.IP \[bu] 2 |
| 3897 | +\f[CB]debug\f[R]: This mode is identical to \f[CB]warn\f[R] except that both |
| 3898 | +a warning message and a stack trace are issued for each illegal |
| 3899 | +reflective\-access operation. |
| 3900 | +.IP \[bu] 2 |
| 3901 | +\f[CB]deny\f[R]: This mode disables all illegal\-access operations except |
| 3902 | +for those enabled by other command\-line options, such as |
| 3903 | +\f[CB]\-\-add\-opens\f[R]. |
| 3904 | +This mode is the default. |
| 3905 | +.PP |
| 3906 | +If your application does not work with the default mode of |
| 3907 | +\f[CB]\-\-illegal\-access=deny\f[R] then you can learn more about what is |
| 3908 | +going on with the \f[CB]warn\f[R] and \f[CB]debug\f[R] modes. |
| 3909 | +For each library or framework on the class path that requires illegal |
| 3910 | +access, you have two options: |
| 3911 | +.IP \[bu] 2 |
| 3912 | +If the component\[aq]s maintainers have already released a fixed version |
| 3913 | +that no longer uses JDK\-internal APIs then you can consider upgrading |
| 3914 | +to that version. |
| 3915 | +.IP \[bu] 2 |
| 3916 | +If the component still needs to be fixed, then you can contact its |
| 3917 | +maintainers and ask them to replace their use of JDK\-internal APIs with |
| 3918 | +the proper exported APIs. |
| 3919 | +.PP |
| 3920 | +If you must continue to use a component that requires illegal access, |
| 3921 | +then you can eliminate the warning messages by using one or more |
| 3922 | +\f[CB]\-\-add\-opens\f[R] options to open only those internal packages to |
| 3923 | +which access is required. |
| 3924 | +.PP |
| 3925 | +To verify that your application is ready for a future version of the |
| 3926 | +JDK, run it with \f[CB]\-\-illegal\-access=deny\f[R] along with any |
| 3927 | +necessary \f[CB]\-\-add\-opens\f[R] options. |
| 3928 | +Any remaining illegal\-access errors will most likely be due to static |
| 3929 | +references from compiled code to JDK\-internal APIs. |
| 3930 | +You can identify those by running the \f[B]jdeps\f[R] tool with the |
| 3931 | +\f[CB]\-\-jdk\-internals\f[R] option. |
| 3932 | +For performance reasons, the current JDK does not issue warnings for |
| 3933 | +illegal static\-access operations. |
| 3934 | +.RE |
| 3935 | +.TP |
3940 | 3936 | .B \f[CB]\-Xfuture\f[R]
|
3941 | 3937 | Enables strict class\-file format checks that enforce close conformance
|
3942 | 3938 | to the class\-file format specification.
|
@@ -4006,6 +4002,52 @@ The default value is 2.
|
4006 | 4002 | Use the option \f[CB]\-XX:MinRAMPercentage\f[R] instead.
|
4007 | 4003 | .RE
|
4008 | 4004 | .TP
|
| 4005 | +.B \f[CB]\-XX:+UseBiasedLocking\f[R] |
| 4006 | +Enables the use of biased locking. |
| 4007 | +Some applications with significant amounts of uncontended |
| 4008 | +synchronization may attain significant speedups with this flag enabled, |
| 4009 | +but applications with certain patterns of locking may see slowdowns. |
| 4010 | +.RS |
| 4011 | +.PP |
| 4012 | +By default, this option is disabled. |
| 4013 | +.RE |
| 4014 | +.SH OBSOLETE JAVA OPTIONS |
| 4015 | +.PP |
| 4016 | +These \f[CB]java\f[R] options are still accepted but ignored, and a |
| 4017 | +warning is issued when they\[aq]re used. |
| 4018 | +.PP |
| 4019 | +None in JDK 17. |
| 4020 | +.SH REMOVED JAVA OPTIONS |
| 4021 | +.PP |
| 4022 | +These \f[CB]java\f[R] options have been removed in JDK 17 and using them |
| 4023 | +results in an error of: |
| 4024 | +.RS |
| 4025 | +.PP |
| 4026 | +\f[CB]Unrecognized\ VM\ option\f[R] \f[I]option\-name\f[R] |
| 4027 | +.RE |
| 4028 | +.TP |
| 4029 | +.B \f[CB]\-XX:+UseMembar\f[R] |
| 4030 | +Enabled issuing membars on thread\-state transitions. |
| 4031 | +This option was disabled by default on all platforms except ARM servers, |
| 4032 | +where it was enabled. |
| 4033 | +.RS |
| 4034 | +.RE |
| 4035 | +.TP |
| 4036 | +.B \f[CB]\-XX:MaxPermSize=\f[R]\f[I]size\f[R] |
| 4037 | +Sets the maximum permanent generation space size (in bytes). |
| 4038 | +This option was deprecated in JDK 8 and superseded by the |
| 4039 | +\f[CB]\-XX:MaxMetaspaceSize\f[R] option. |
| 4040 | +.RS |
| 4041 | +.RE |
| 4042 | +.TP |
| 4043 | +.B \f[CB]\-XX:PermSize=\f[R]\f[I]size\f[R] |
| 4044 | +Sets the space (in bytes) allocated to the permanent generation that |
| 4045 | +triggers a garbage collection if it\[aq]s exceeded. |
| 4046 | +This option was deprecated in JDK 8 and superseded by the |
| 4047 | +\f[CB]\-XX:MetaspaceSize\f[R] option. |
| 4048 | +.RS |
| 4049 | +.RE |
| 4050 | +.TP |
4009 | 4051 | .B \f[CB]\-XX:+TraceClassLoading\f[R]
|
4010 | 4052 | Enables tracing of classes as they are loaded.
|
4011 | 4053 | By default, this option is disabled and classes aren\[aq]t traced.
|
@@ -4053,62 +4095,13 @@ The replacement Unified Logging syntax is
|
4053 | 4095 | \f[CB]\-Xlog:class+loader+constraints=info\f[R].
|
4054 | 4096 | See \f[B]Enable Logging with the JVM Unified Logging Framework\f[R].
|
4055 | 4097 | .RE
|
4056 |
| -.TP |
4057 |
| -.B \f[CB]\-XX:+UseBiasedLocking\f[R] |
4058 |
| -Enables the use of biased locking. |
4059 |
| -Some applications with significant amounts of uncontended |
4060 |
| -synchronization may attain significant speedups with this flag enabled, |
4061 |
| -but applications with certain patterns of locking may see slowdowns. |
4062 |
| -.RS |
4063 |
| -.PP |
4064 |
| -By default, this option is disabled. |
4065 |
| -.RE |
4066 |
| -.SH OBSOLETE JAVA OPTIONS |
4067 |
| -.PP |
4068 |
| -These \f[CB]java\f[R] options are still accepted but ignored, and a |
4069 |
| -warning is issued when they\[aq]re used. |
4070 |
| -.TP |
4071 |
| -.B \f[CB]\-XX:+UseMembar\f[R] |
4072 |
| -Enabled issuing membars on thread\-state transitions. |
4073 |
| -This option was disabled by default on all platforms except ARM servers, |
4074 |
| -where it was enabled. |
4075 |
| -.RS |
4076 |
| -.RE |
4077 |
| -.TP |
4078 |
| -.B \f[CB]\-XX:MaxPermSize=\f[R]\f[I]size\f[R] |
4079 |
| -Sets the maximum permanent generation space size (in bytes). |
4080 |
| -This option was deprecated in JDK 8 and superseded by the |
4081 |
| -\f[CB]\-XX:MaxMetaspaceSize\f[R] option. |
4082 |
| -.RS |
4083 |
| -.RE |
4084 |
| -.TP |
4085 |
| -.B \f[CB]\-XX:PermSize=\f[R]\f[I]size\f[R] |
4086 |
| -Sets the space (in bytes) allocated to the permanent generation that |
4087 |
| -triggers a garbage collection if it\[aq]s exceeded. |
4088 |
| -This option was deprecated in JDK 8 and superseded by the |
4089 |
| -\f[CB]\-XX:MetaspaceSize\f[R] option. |
4090 |
| -.RS |
4091 |
| -.RE |
4092 |
| -.SH REMOVED JAVA OPTIONS |
4093 |
| -.PP |
4094 |
| -These \f[CB]java\f[R] options have been removed in JDK 15 and using them |
4095 |
| -results in an error of: |
4096 |
| -.RS |
4097 |
| -.PP |
4098 |
| -\f[CB]Unrecognized\ VM\ option\f[R] \f[I]option\-name\f[R] |
4099 |
| -.RE |
4100 |
| -.TP |
4101 |
| -.B \f[CB]\-XX:+UseParallelOldGC\f[R] |
4102 |
| -Enables the use of the parallel garbage collector for full GCs. |
4103 |
| -By default, this option is disabled. |
4104 |
| -Enabling it automatically enables the \f[CB]\-XX:+UseParallelGC\f[R] |
4105 |
| -option. |
4106 |
| -.RS |
4107 |
| -.RE |
4108 | 4098 | .PP
|
4109 | 4099 | For the lists and descriptions of options removed in previous releases
|
4110 | 4100 | see the \f[I]Removed Java Options\f[R] section in:
|
4111 | 4101 | .IP \[bu] 2
|
| 4102 | +\f[B]Java Platform, Standard Edition Tools Reference, Release 16\f[R] |
| 4103 | +[https://docs.oracle.com/en/java/javase/16/docs/specs/man/java.html] |
| 4104 | +.IP \[bu] 2 |
4112 | 4105 | \f[B]Java Platform, Standard Edition Tools Reference, Release 15\f[R]
|
4113 | 4106 | [https://docs.oracle.com/en/java/javase/15/docs/specs/man/java.html]
|
4114 | 4107 | .IP \[bu] 2
|
@@ -4794,6 +4787,10 @@ T}
|
4794 | 4787 | .TE
|
4795 | 4788 | .SS Convert Runtime Logging Flags to Xlog
|
4796 | 4789 | .PP
|
| 4790 | +These legacy flags are no longer recognized and will cause an error if |
| 4791 | +used directly. |
| 4792 | +Use their unified logging equivalent instead. |
| 4793 | +.PP |
4797 | 4794 | .TS
|
4798 | 4795 | tab(@);
|
4799 | 4796 | lw(15.0n) lw(20.2n) lw(34.7n).
|
|
0 commit comments