Hello community,
here is the log from the commit of package java-1_7_0-openjdk.4631 for openSUSE:13.1:Update checked in at 2016-05-04 17:59:51
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:13.1:Update/java-1_7_0-openjdk.4631 (Old)
and /work/SRC/openSUSE:13.1:Update/.java-1_7_0-openjdk.4631.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "java-1_7_0-openjdk.4631"
Changes:
--------
New Changes file:
--- /dev/null 2016-04-07 01:36:33.300037506 +0200
+++ /work/SRC/openSUSE:13.1:Update/.java-1_7_0-openjdk.4631.new/java-1_7_0-openjdk.changes 2016-05-04 17:59:53.000000000 +0200
@@ -0,0 +1,4167 @@
+-------------------------------------------------------------------
+Fri Apr 22 09:28:27 UTC 2016 - fstrba@suse.com
+
+- Update to 2.6.6 - OpenJDK 7u101 (bsc#976340)
+ * Security fixes
+ - S8129952, CVE-2016-0686: Ensure thread consistency
+ - S8132051, CVE-2016-0687: Better byte behavior
+ - S8138593, CVE-2016-0695: Make DSA more fair
+ - S8139008: Better state table management
+ - S8143167, CVE-2016-3425: Better buffering of XML strings
+ - S8144430, CVE-2016-3427: Improve JMX connections
+ - S8146494: Better ligature substitution
+ - S8146498: Better device table adjustments
+ * Import of OpenJDK 7 u101 build 0
+ - S4858370: JDWP: Memory Leak: GlobalRefs never deleted when
+ processing invokeMethod command
+ - S7127906: (launcher) convert the launcher regression tests to
+ java
+ - S8002116: This JdbReadTwiceTest.sh gets an exit 1
+ - S8004007: test/sun/tools/jinfo/Basic.sh fails on when runSA is
+ set to true
+ - S8007890: [TESTBUG] JcmdWithNMTDisabled.java fails when
+ invoked with NMT explicitly turned on
+ - S8027705: com/sun/jdi/JdbMethodExitTest.sh fails when a
+ background thread is generating events.
+ - S8028537: PPC64: Updated the JDK regression tests to run on
+ AIX
+ - S8036132: Tab characters in test/com/sun/jdi files
+ - S8038963: com/sun/jdi tests fail because cygwin's ps sometimes
+ misses processes
+ - S8044419: TEST_BUG: com/sun/jdi/JdbReadTwiceTest.sh fails when
+ run under root
+ - S8059661: Test SoftReference and OOM behavior
+ - S8072753: Nondeterministic wrong answer on arithmetic
+ - S8073735: [TEST_BUG] compiler/loopopts/CountedLoopProblem.java
+ got OOME
+ - S8074146: [TEST_BUG] jdb has succeded to read an unreadable
+ file
+ - S8134297: NPE in GSSNameElement nameType check
+ - S8134650: Xsl transformation gives different results in 8u66
+ - S8141229: [Parfait] Null pointer dereference in cmsstrcasecmp
+ of cmserr.c
+ - S8143002: [Parfait] JNI exception pending in fontpath.c:1300
+ - S8146477: [TEST_BUG] ClientJSSEServerJSSE.java failing again
+ - S8146967: [TEST_BUG] javax/security/auth/SubjectDomainCombiner/Optimize.java
+ should use 4-args ProtectionDomain constructor
+ - S8147567: InterpreterRuntime::post_field_access not updated
+ for boolean in JDK-8132051
+ - S8148446: (tz) Support tzdata2016a
+ - S8148475: Missing SA Bytecode updates.
+ - S8149170: Better byte behavior for native arguments
+ - S8149367: PolicyQualifierInfo/index_Ctor JCk test fails with
+ IOE: Invalid encoding for PolicyQualifierInfo
+ - S8150012: Better byte behavior for reflection
+ - S8150790: 8u75 L10n resource file translation update
+ - S8153673: [BACKOUT] JDWP: Memory Leak: GlobalRefs never
+ deleted when processing invokeMethod command
+ - S8154210: Zero: Better byte behaviour
+ * Bug fixes
+ - PR2889: OpenJDK should check for system cacerts database (e.g.
+ /etc/pki/java/cacerts)
+ - PR2929: configure: error: "A JDK home directory could not be
+ found."
+ - PR2935: Check that freetype defines
+ FT_CONFIG_OPTION_INFINALITY_PATCHSET if enabling infinality
+ - PR2938: Fix build of 8148487 backport
+ - PR2939: Remove rogue ReleaseStringUTFChars line remaining from
+ merge of 7u101 b00
+ * PPC & AIX port
+ - S8148487: PPC64: Better byte behavior
+ * AArch64 port
+ - S8154413: AArch64: Better byte behaviour
+ - PR2914: byte_map_base is not page aligned on OpenJDK 7
+ * JamVM
+ - PR2665: icedtea/jamvm 2.6 fails as a build VM for icedtea
+
+-------------------------------------------------------------------
+Mon Mar 28 18:00:23 UTC 2016 - fstrba@suse.com
+
+- Update to 2.6.5 - OpenJDK 7u99 (bsc#972468)
+ * Security fixes
+ - S8152335, CVE-2016-0636: Improve MethodHandle consistency
+ * Import of OpenJDK 7 u99 build 0
+ - S6425769, PR2858: Allow specifying an address to bind JMX
+ remote connector
+ - S6961123: setWMClass fails to null-terminate WM_CLASS string
+ - S8145982, PR2858: JMXInterfaceBindingTest is failing
+ intermittently
+ - S8146015, PR2858: JMXInterfaceBindingTest is failing
+ intermittently for IPv6 addresses
+ * Backports
+ - S8028727, PR2814: [parfait] warnings from b116 for
+ jdk.src.share.native.sun.security.ec: JNI pending exceptions
+ - S8048512, PR2814: Uninitialised memory in
+ jdk/src/share/native/sun/security/ec/ECC_JNI.cpp
+ - S8071705. PR2819, RH1182694: Java application menu misbehaves
+ when running multiple screen stacked vertically
+ - S8150954, PR2866, RH1176206: AWT Robot not compatible with
+ GNOME Shell
+ * Bug fixes
+ - PR2803: Make system CUPS optional
+ - PR2886: Location of 'stap' executable is hard-coded
+ - PR2893: test/tapset/jstaptest.pl should be executable
+ - PR2894: Add missing test directory in make check.
+ * CACAO
+ - PR2781, CA195: typeinfo.cpp: typeinfo_merge_nonarrays:
+ Assertion `dest && result && x.any && y.any' failed
+ * AArch64 port
+ - PR2852: Add support for large code cache
+ - PR2852: Apply ReservedCodeCacheSize default limiting to
+ AArch64 only.
+ - S8081289, PR2852: aarch64: add support for
+ RewriteFrequentPairs in interpreter
+ - S8131483, PR2852: aarch64: illegal stlxr instructions
+ - S8133352, PR2852: aarch64: generates constrained unpredictable
+ instructions
+ - S8133842, PR2852: aarch64: C2 generates illegal instructions
+ with int shifts >=32
+ - S8134322, PR2852: AArch64: Fix several errors in C2 biased
+ locking implementation
+ - S8136615, PR2852: aarch64: elide DecodeN when followed by
+ CmpP 0
+ - S8138575, PR2852: Improve generated code for profile counters
+ - S8138641, PR2852: Disable C2 peephole by default for aarch64
+ - S8138966, PR2852: Intermittent SEGV running ParallelGC
+ - S8143067, PR2852: aarch64: guarantee failure in javac
+ - S8143285, PR2852: aarch64: Missing load acquire when checking
+ if ConstantPoolCacheEntry is resolved
+ - S8143584, PR2852: Load constant pool tag and class status with
+ load acquire
+ - S8144201, PR2852: aarch64:
+ jdk/test/com/sun/net/httpserver/Test6a.java fails with
+ --enable-unlimited-crypto
+ - S8144582, PR2852: AArch64 does not generate correct branch
+ profile data
+ - S8146709, PR2852: AArch64: Incorrect use of ADRP for
+ byte_map_base
+ - S8147805, PR2852: aarch64: C1 segmentation fault due to inline
+ Unsafe.getAndSetObject
+ - S8148240, PR2852: aarch64: random infrequent null pointer
+ exceptions in javac
+ * PPC & AIX port
+ - S8034797, PR2851: AIX: Fix os::naked_short_sleep() in
+ os_aix.cpp after 8028280
+ - S8139258, PR2851: PPC64LE: argument passing problem when
+ passing 15 floats in native call
+ - S8139421, PR2851: PPC64LE: MacroAssembler::bxx64_patchable
+ kill register R12
+
+-------------------------------------------------------------------
+Sat Feb 20 14:04:41 UTC 2016 - astieger@suse.com
+
+- re-release binaries to resolve incident number sequencing issue
+ affecing subsequent tree builds (boo#967403)
+
+-------------------------------------------------------------------
+Fri Jan 22 10:41:45 UTC 2016 - fstrba@suse.com
+
+- Update to 2.6.4 - OpenJDK 7u95 (bsc#962743)
+ * Security fixes
+ - S8059054, CVE-2016-0402: Better URL processing
+ - S8130710, CVE-2016-0448: Better attributes processing
+ - S8132210: Reinforce JMX collector internals
+ - S8132988: Better printing dialogues
+ - S8133962, CVE-2016-0466: More general limits
+ - S8137060: JMX memory management improvements
+ - S8139012: Better font substitutions
+ - S8139017, CVE-2016-0483: More stable image decoding
+ - S8140543, CVE-2016-0494: Arrange font actions
+ - S8143185: Cleanup for handling proxies
+ - S8143941, CVE-2015-8126, CVE-2015-8472: Update splashscreen
+ displays
+ - S8144773, CVE-2015-7575: Further reduce use of MD5 (SLOTH)
+ - S8142882, CVE-2015-4871: rebinding of the receiver of a
+ DirectMethodHandle may allow a protected method to be accessed
+ * Import of OpenJDK 7 u95 build 0
+ - S7167988: PKIX CertPathBuilder in reverse mode doesn't work if
+ more than one trust anchor is specified
+ - S8068761: [TEST_BUG] java/nio/channels/ServerSocketChannel/AdaptServerSocket.java
+ failed with SocketTimeoutException
+ - S8074068: Cleanup in src/share/classes/sun/security/x509/
+ - S8075773: jps running as root fails after the fix of JDK-8050807
+ - S8081297: SSL Problem with Tomcat
+ - S8131181: Increment minor version of HSx for 7u95 and
+ initialize the build number
+ - S8132082: Let OracleUcrypto accept RSAPrivateKey
+ - S8134605: Partial rework of the fix for 8081297
+ - S8134861: XSLT: Extension func call cause exception if
+ namespace URI contains partial package name
+ - S8135307: CompletionFailure thrown when calling FieldDoc.type,
+ if the field's type is missing
+ - S8138716: (tz) Support tzdata2015g
+ - S8140244: Port fix of JDK-8075773 to MacOSX
+ - S8141213: [Parfait]Potentially blocking function
+ GetArrayLength called in JNI critical region at line 239 of
+ jdk/src/share/native/sun/awt/image/jpeg/jpegdecoder.c in
+ function GET_ARRAYS
++++ 3970 more lines (skipped)
++++ between /dev/null
++++ and /work/SRC/openSUSE:13.1:Update/.java-1_7_0-openjdk.4631.new/java-1_7_0-openjdk.changes
New:
----
PStack-808293.patch
RH661505-toBeReverted.patch
_constraints
abrt_friendly_hs_log_jdk7.patch
corba.tar.bz2
file-contains-date-and-time.patch
fontconfig.SUSE.properties
hotspot.tar.bz2
icedtea-2.6.6.tar.xz
icedtea-2.6.6.tar.xz.sig
icedtea-sound-1.0.1.tar.xz
icedtea-sound-1.0.1.tar.xz.sig
java-1.7.0-openjdk-accessible-toolkit.patch
java-1.7.0-openjdk-adlc-parser.patch
java-1.7.0-openjdk-freetype-check-fix.patch
java-1.7.0-openjdk-java-access-bridge-security.patch
java-1.7.0-openjdk-thread-stack-size.patch
java-1_7_0-openjdk-add-memory-limit.patch
java-1_7_0-openjdk-javadoc-verbose.patch
java-1_7_0-openjdk-override.patch
java-1_7_0-openjdk-suse-desktop-files.patch
java-1_7_0-openjdk-zero-annotate-aborting-functions-zero.patch
java-1_7_0-openjdk.changes
java-1_7_0-openjdk.keyring.renamed
java-1_7_0-openjdk.spec
jaxp.tar.bz2
jaxws.tar.bz2
jdk.tar.bz2
langtools.tar.bz2
mauve-2008-10-22.tar.gz
mauve_tests
openjdk-7-src-b147-no-return-in-nonvoid-hotspot.patch
openjdk-7-src-b147-no-return-in-nonvoid.patch
openjdk.tar.bz2
pre_checkin.sh
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ java-1_7_0-openjdk.spec ++++++
++++ 1253 lines (skipped)
++++++ PStack-808293.patch ++++++
--- openjdk/hotspot/agent/src/share/classes/sun/jvm/hotspot/tools/PStack.java 2012-04-06 02:26:33.322164601 +0200
+++ openjdk/hotspot/agent/src/share/classes/sun/jvm/hotspot/tools/PStack.java 2012-04-06 02:26:57.958514071 +0200
@@ -1,5 +1,6 @@
/*
* Copyright (c) 2003, 2012, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2012, Red Hat Inc.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
@@ -84,7 +85,8 @@
out.print("----------------- ");
out.print(th);
out.println(" -----------------");
- while (f != null) {
+ int maxStack = 256;
+ while (f != null && maxStack-- > 0) {
ClosestSymbol sym = f.closestSymbolToPC();
Address pc = f.pc();
out.print(pc + "\t");
@@ -158,10 +160,19 @@
printUnknown(out);
}
}
+ Address oldPC = f.pc();
+ Address oldFP = f.localVariableBase();
f = f.sender(th);
+ if (f != null
+ && oldPC.equals(f.pc())
+ && oldFP.equals(f.localVariableBase())) {
+ // We didn't make any progress
+ f = null;
+ }
}
} catch (Exception exp) {
- exp.printStackTrace();
+ // exp.printStackTrace();
+ out.println("bad stack: " + exp);
// continue, may be we can do a better job for other threads
}
if (isJava && concurrentLocks) {
++++++ RH661505-toBeReverted.patch ++++++
# HG changeset patch
# User andrew
# Date 1378467880 -3600
# Node ID 3372405e49a9e5cd27af64e16eb7e44539ea3339
# Parent b2611b1a750cf38b795d1df24c5bea9b9c246e0f
RH661505: JPEGs with sRGB IEC61966-2.1 color profiles have wrong colors
diff -r b2611b1a750c -r 3372405e49a9 src/share/native/sun/awt/image/jpeg/imageioJPEG.c
--- openjdk/jdk/src/share/native/sun/awt/image/jpeg/imageioJPEG.c Wed Sep 04 18:20:38 2013 +0100
+++ openjdk/jdk/src/share/native/sun/awt/image/jpeg/imageioJPEG.c Fri Sep 06 12:44:40 2013 +0100
@@ -1454,6 +1454,8 @@
"[S");
}
+#define JPEG_APP1 (JPEG_APP0 + 1) /* EXIF APP1 marker code */
+
JNIEXPORT jlong JNICALL
Java_com_sun_imageio_plugins_jpeg_JPEGImageReader_initJPEGImageReader
(JNIEnv *env,
@@ -1507,6 +1509,7 @@
// Set up to keep any APP2 markers, as these might contain ICC profile
// data
+ jpeg_save_markers(cinfo, JPEG_APP1, 0xFFFF);
jpeg_save_markers(cinfo, ICC_MARKER, 0xFFFF);
/*
@@ -1569,8 +1572,6 @@
imageio_init_source((j_decompress_ptr) cinfo);
}
-#define JPEG_APP1 (JPEG_APP0 + 1) /* EXIF APP1 marker code */
-
/*
* For EXIF images, the APP1 will appear immediately after the SOI,
* so it's safe to only look at the first marker in the list.
++++++ _constraints ++++++
<constraints>
<hardware>
<physicalmemory>
<size unit="M">2048</size>
</physicalmemory>
<disk>
<size unit="G">6</size>
</disk>
</hardware>
<overwrite>
<conditions>
<arch>armv7l</arch>
<arch>armv6l</arch>
</conditions>
<hardware>
<physicalmemory>
<size unit="M">512</size>
</physicalmemory>
</hardware>
</overwrite>
</constraints>
++++++ abrt_friendly_hs_log_jdk7.patch ++++++
--- openjdk/hotspot/src/share/vm/utilities/vmError.cpp 2012-02-02 16:17:24.476664897 +0100
+++ openjdk/hotspot/src/share/vm/utilities/vmError.cpp 2012-02-02 16:17:24.476664897 +0100
@@ -929,6 +929,7 @@
}
}
+ /*
if (fd == -1) {
const char *cwd = os::get_current_directory(buffer, sizeof(buffer));
size_t len = strlen(cwd);
@@ -938,6 +939,24 @@
os::file_separator(), os::current_process_id());
fd = open(buffer, O_RDWR | O_CREAT | O_TRUNC, 0666);
}
+ */
+
+ if (fd == -1) {
+ const char * tmpdir = os::get_temp_directory();
+ // try temp directory if it exists.
+ if (tmpdir != NULL && tmpdir[0] != '\0') {
+ jio_snprintf(buffer, sizeof(buffer), "%s%sjvm-%u",
+ tmpdir, os::file_separator(), os::current_process_id());
+ // if mkdir() failed, hs_err will be created in temporary directory
+ if (!mkdir(buffer, 0700)) { // only read+execute flags are needed
+ // but we need to write into the directory too
+ jio_snprintf(buffer, sizeof(buffer), "%s%sjvm-%u%shs_error.log",
+ tmpdir, os::file_separator(), os::current_process_id(),
+ os::file_separator());
+ fd = open(buffer, O_WRONLY | O_CREAT | O_TRUNC, 0444); // read-only file
+ }
+ }
+ }
if (fd == -1) {
const char * tmpdir = os::get_temp_directory();
++++++ file-contains-date-and-time.patch ++++++
--- openjdk/hotspot/src/share/vm/runtime/vm_version.cpp 2014-07-15 23:55:15.000000000 +0200
+++ openjdk/hotspot/src/share/vm/runtime/vm_version.cpp 2014-07-23 18:35:54.422893604 +0200
@@ -257,7 +257,7 @@
#endif
return VMNAME " (" VM_RELEASE ") for " OS "-" CPU FLOAT_ARCH_STR
- " JRE (" JRE_RELEASE_VERSION "), built on " __DATE__ " " __TIME__
+ " JRE (" JRE_RELEASE_VERSION "), built"
" by " XSTR(HOTSPOT_BUILD_USER) " with " HOTSPOT_BUILD_COMPILER;
}
++++++ fontconfig.SUSE.properties ++++++
#
# Copyright 2007 Sun Microsystems, Inc. All Rights Reserved.
# DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
#
# This code is free software; you can redistribute it and/or modify it
# under the terms of the GNU General Public License version 2 only, as
# published by the Free Software Foundation. Sun designates this
# particular file as subject to the "Classpath" exception as provided
# by Sun in the LICENSE file that accompanied this code.
#
# This code is distributed in the hope that it will be useful, but WITHOUT
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
# FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
# version 2 for more details (a copy is included in the LICENSE file that
# accompanied this code).
#
# You should have received a copy of the GNU General Public License version
# 2 along with this work; if not, write to the Free Software Foundation,
# Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
# Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
# CA 95054 USA or visit www.sun.com if you need additional information or
# have any questions.
#
# Uses SUSE 10.2 fonts and file paths.
version=1
# Component Font Mappings
dialog.plain.latin-1=DejaVu Sans
dialog.plain.japanese-x0208=Sazanami Gothic
dialog.plain.korean=UnDotum
dialog.bold.latin-1=DejaVu Sans Bold
dialog.bold.japanese-x0208=Sazanami Gothic
dialog.bold.korean=UnDotum Bold
dialog.italic.latin-1=DejaVu Sans Oblique
dialog.italic.japanese-x0208=Sazanami Gothic
dialog.italic.korean=UnDotum
dialog.bolditalic.latin-1=DejaVu Sans Bold Oblique
dialog.bolditalic.japanese-x0208=Sazanami Gothic
dialog.bolditalic.korean=UnDotum Bold
sansserif.plain.latin-1=DejaVu Sans
sansserif.plain.japanese-x0208=Sazanami Gothic
sansserif.plain.korean=UnDotum
sansserif.bold.latin-1=DejaVu Sans Bold
sansserif.bold.japanese-x0208=Sazanami Gothic
sansserif.bold.korean=UnDotum Bold
sansserif.italic.latin-1=DejaVu Sans Oblique
sansserif.italic.japanese-x0208=Sazanami Gothic
sansserif.italic.korean=UnDotum
sansserif.bolditalic.latin-1=DejaVu Sans Bold Oblique
sansserif.bolditalic.japanese-x0208=Sazanami Gothic
sansserif.bolditalic.korean=UnDotum Bold
serif.plain.latin-1=DejaVu Serif
serif.plain.japanese-x0208=Sazanami Mincho
serif.plain.korean=UnBatang
serif.bold.latin-1=DejaVu Serif Bold
serif.bold.japanese-x0208=Sazanami Mincho
serif.bold.korean=UnBatang Bold
serif.italic.latin-1=DejaVu Serif Oblique
serif.italic.japanese-x0208=Sazanami Mincho
serif.italic.korean=UnBatang
serif.bolditalic.latin-1=DejaVu Serif Bold Oblique
serif.bolditalic.japanese-x0208=Sazanami Mincho
serif.bolditalic.korean=UnBatang Bold
monospaced.plain.latin-1=DejaVu Sans Mono
monospaced.plain.japanese-x0208=Sazanami Mincho
monospaced.plain.korean=UnDotum
monospaced.bold.latin-1=DejaVu Sans Mono Bold
monospaced.bold.japanese-x0208=Sazanami Mincho
monospaced.bold.korean=UnDotum Bold
monospaced.italic.latin-1=DejaVu Sans Mono Oblique
monospaced.italic.japanese-x0208=Sazanami Mincho
monospaced.italic.korean=UnDotum
monospaced.bolditalic.latin-1=DejaVu Sans Mono Bold Oblique
monospaced.bolditalic.japanese-x0208=Sazanami Mincho
monospaced.bolditalic.korean=UnDotum Bold
dialoginput.plain.latin-1=DejaVu Sans Mono
dialoginput.plain.japanese-x0208=Sazanami Gothic
dialoginput.plain.korean=UnDotum
dialoginput.bold.latin-1=DejaVu Sans Mono Bold
dialoginput.bold.japanese-x0208=Sazanami Gothic
dialoginput.bold.korean=UnDotum Bold
dialoginput.italic.latin-1=DejaVu Sans Mono Oblique
dialoginput.italic.japanese-x0208=Sazanami Gothic
dialoginput.italic.korean=UnDotum
dialoginput.bolditalic.latin-1=DejaVu Sans Mono Bold Oblique
dialoginput.bolditalic.japanese-x0208=Sazanami Gothic
dialoginput.bolditalic.korean=UnDotum Bold
allfonts.chinese-big5=AR PL Mingti2L Big5
allfonts.chinese-gb18030=AR PL SungtiL GB
# Search Sequences
sequence.allfonts=latin-1
sequence.allfonts.Big5=chinese-big5,latin-1
sequence.allfonts.x-euc-jp-linux=japanese-x0208,latin-1
sequence.allfonts.EUC-KR=korean,latin-1
sequence.allfonts.GB18030=chinese-gb18030,latin-1
sequence.fallback=chinese-big5,chinese-gb18030,japanese-x0208,korean
# Font File Names
filename.DejaVu_Sans=/usr/share/fonts/truetype/DejaVuSans.ttf
filename.DejaVu_Sans_Bold=/usr/share/fonts/truetype/DejaVuSans-Bold.ttf
filename.DejaVu_Sans_Oblique=/usr/share/fonts/truetype/DejaVuSans-Oblique.ttf
filename.DejaVu_Sans_Bold_Oblique=/usr/share/fonts/truetype/DejaVuSans-BoldOblique.ttf
filename.DejaVu_Sans_Mono=/usr/share/fonts/truetype/DejaVuSansMono.ttf
filename.DejaVu_Sans_Mono_Bold=/usr/share/fonts/truetype/DejaVuSansMono-Bold.ttf
filename.DejaVu_Sans_Mono_Oblique=/usr/share/fonts/truetype/DejaVuSans-BoldOblique.ttf
filename.DejaVu_Sans_Mono_Bold_Oblique=/usr/share/fonts/truetype/DejaVuSans-BoldOblique.ttf
filename.DejaVu_Serif=/usr/share/fonts/truetype/DejaVuSerif.ttf
filename.DejaVu_Serif_Bold=/usr/share/fonts/truetype/DejaVuSerif-Bold.ttf
filename.DejaVu_Serif_Oblique=/usr/share/fonts/truetype/DejaVuSerif-Italic.ttf
filename.DejaVu_Serif_Bold_Oblique=/usr/share/fonts/truetype/DejaVuSerif-BoldItalic.ttf
filename.Sazanami_Gothic=/usr/share/fonts/truetype/sazanami-gothic.ttf
filename.Sazanami_Mincho=/usr/share/fonts/truetype/sazanami-mincho.ttf
filename.AR_PL_SungtiL_GB=/usr/share/fonts/truetype/gbsn00lp.ttf
filename.AR_PL_Mingti2L_Big5=/usr/share/fonts/truetype/bsmi00lp.ttf
filename.UnDotum=/usr/share/fonts/truetype/UnDotum.ttf
filename.UnDotum_Bold=/usr/share/fonts/truetype/UnDotumBold.ttf
filename.UnBatang=/usr/share/fonts/truetype/UnBatang.ttf
filename.UnBatang_Bold=/usr/share/fonts/truetype/UnBatangBold.ttf
# AWT X11 font paths
awtfontpath.japanese-x0201=/usr/share/fonts/truetype
awtfontpath.japanese-x0208=/usr/share/fonts/truetype
awtfontpath.japanese-iso10646-1=/usr/share/fonts/truetype
awtfontpath.korean=/usr/share/fonts/truetype
awtfontpath.latin-1=/usr/share/fonts/truetype
++++++ java-1.7.0-openjdk-accessible-toolkit.patch ++++++
diff -uNr openjdk-orig/jdk/src/share/classes/java/awt/Toolkit.java openjdk/jdk/src/share/classes/java/awt/Toolkit.java
--- openjdk-orig/jdk/src/share/classes/java/awt/Toolkit.java 2009-01-23 11:59:47.000000000 -0500
+++ openjdk/jdk/src/share/classes/java/awt/Toolkit.java 2009-01-23 12:05:20.000000000 -0500
@@ -871,7 +871,11 @@
return null;
}
});
- loadAssistiveTechnologies();
+ try {
+ loadAssistiveTechnologies();
+ } catch ( AWTError error) {
+ // ignore silently
+ }
} finally {
// Make sure to always re-enable the JIT.
java.lang.Compiler.enable();
++++++ java-1.7.0-openjdk-adlc-parser.patch ++++++
--- openjdk/hotspot/src/share/vm/adlc/formsopt.cpp
+++ openjdk/hotspot/src/share/vm/adlc/formsopt.cpp
@@ -347,6 +347,7 @@ FrameForm::FrameForm() {
_return_value = NULL;
_c_return_value = NULL;
_interpreter_frame_pointer_reg = NULL;
+ _cisc_spilling_operand_name = NULL;
}
FrameForm::~FrameForm() {
++++++ java-1.7.0-openjdk-freetype-check-fix.patch ++++++
diff -up openjdk/jdk/make/common/shared/Sanity.gmk.sav openjdk/jdk/make/common/shared/Sanity.gmk
--- openjdk/jdk/make/common/shared/Sanity.gmk.sav 2012-02-14 16:12:48.000000000 -0500
+++ openjdk/jdk/make/common/shared/Sanity.gmk 2012-03-07 17:31:26.153840755 -0500
@@ -814,12 +814,12 @@ ifdef OPENJDK
@(($(CD) $(BUILDDIR)/tools/freetypecheck && $(MAKE)) || \
$(ECHO) "Failed to build freetypecheck." ) > $@
- sane-freetype: $(TEMPDIR)/freetypeinfo
- @if [ "`$(CAT) $< | $(GREP) Fail`" != "" ]; then \
- $(ECHO) "ERROR: FreeType version " $(REQUIRED_FREETYPE_VERSION) \
- " or higher is required. \n" \
- "`$(CAT) $<` \n" >> $(ERROR_FILE) ; \
- fi
+# sane-freetype: $(TEMPDIR)/freetypeinfo
+# @if [ "`$(CAT) $< | $(GREP) Fail`" != "" ]; then \
+# $(ECHO) "ERROR: FreeType version " $(REQUIRED_FREETYPE_VERSION) \
+# " or higher is required. \n" \
+# "`$(CAT) $<` \n" >> $(ERROR_FILE) ; \
+# fi
else
#do nothing (cross-compiling)
sane-freetype:
++++++ java-1.7.0-openjdk-java-access-bridge-security.patch ++++++
--- openjdk/jdk/src/share/lib/security/java.security-linux.orig
+++ openjdk/jdk/src/share/lib/security/java.security-linux
@@ -154,7 +154,9 @@
com.sun.org.apache.xml.internal.security.,\
com.sun.org.glassfish.,\
org.jcp.xml.dsig.internal.,\
- oracle.jrockit.jfr.
+ oracle.jrockit.jfr.,\
+ org.GNOME.Accessibility.,\
+ org.GNOME.Bonobo.
#
# List of comma-separated packages that start with or equal this string
# will cause a security exception to be thrown when
@@ -192,7 +194,9 @@
com.sun.org.apache.xml.internal.security.,\
com.sun.org.glassfish.,\
org.jcp.xml.dsig.internal.,\
- oracle.jrockit.jfr.
+ oracle.jrockit.jfr.,\
+ org.GNOME.Accessibility.,\
+ org.GNOME.Bonobo.
#
# Determines whether this properties file can be appended to
# or overridden on the command line via -Djava.security.properties
++++++ java-1.7.0-openjdk-thread-stack-size.patch ++++++
Index: openjdk/hotspot/src/os_cpu/linux_zero/vm/globals_linux_zero.hpp
===================================================================
--- openjdk/hotspot/src/os_cpu/linux_zero/vm/globals_linux_zero.hpp
+++ openjdk/hotspot/src/os_cpu/linux_zero/vm/globals_linux_zero.hpp
@@ -34,7 +34,7 @@
//
define_pd_global(bool, DontYieldALot, false);
-define_pd_global(intx, ThreadStackSize, 1664);
+define_pd_global(intx, ThreadStackSize, PPC_ONLY(2048) NOT_PPC(1664));
#ifdef _LP64
define_pd_global(intx, VMThreadStackSize, PPC_ONLY(1664) NOT_PPC(1024));
#else
++++++ java-1_7_0-openjdk-add-memory-limit.patch ++++++
Index: icedtea-2.3.2/Makefile.am
===================================================================
--- icedtea-2.3.2.orig/Makefile.am 2012-08-31 16:12:45.117462371 +0200
+++ icedtea-2.3.2/Makefile.am 2012-09-04 10:43:29.052561796 +0200
@@ -1980,7 +1980,7 @@
if WITH_RHINO
mkdir -p rhino/rhino.{old,new} && \
(cd rhino/rhino.old && $(BOOT_DIR)/bin/jar xf $(RHINO_JAR)) && \
- $(BOOT_DIR)/bin/java -cp $(REWRITER_BUILD_DIR) \
+ $(BOOT_DIR)/bin/java -Xmx256m -Xms128m -cp $(REWRITER_BUILD_DIR) \
com.redhat.rewriter.ClassRewriter \
$(abs_top_builddir)/rhino/rhino.old $(abs_top_builddir)/rhino/rhino.new \
org.mozilla sun.org.mozilla && \
Index: icedtea-2.3.2/Makefile.in
===================================================================
--- icedtea-2.3.2.orig/Makefile.in 2012-08-31 21:37:17.545573948 +0200
+++ icedtea-2.3.2/Makefile.in 2012-09-04 10:44:04.127811173 +0200
@@ -2388,7 +2388,7 @@
stamps/rewrite-rhino.stamp: stamps/rewriter.stamp $(RHINO_JAR)
@WITH_RHINO_TRUE@ mkdir -p rhino/rhino.{old,new} && \
@WITH_RHINO_TRUE@ (cd rhino/rhino.old && $(BOOT_DIR)/bin/jar xf $(RHINO_JAR)) && \
-@WITH_RHINO_TRUE@ $(BOOT_DIR)/bin/java -cp $(REWRITER_BUILD_DIR) \
+@WITH_RHINO_TRUE@ $(BOOT_DIR)/bin/java -Xmx256m -Xms128m -cp $(REWRITER_BUILD_DIR) \
@WITH_RHINO_TRUE@ com.redhat.rewriter.ClassRewriter \
@WITH_RHINO_TRUE@ $(abs_top_builddir)/rhino/rhino.old $(abs_top_builddir)/rhino/rhino.new \
@WITH_RHINO_TRUE@ org.mozilla sun.org.mozilla && \
++++++ java-1_7_0-openjdk-javadoc-verbose.patch ++++++
--- icedtea-2.4.5/openjdk/jdk/make/docs/Makefile
+++ icedtea-2.4.5/openjdk/jdk/make/docs/Makefile
@@ -204,7 +204,6 @@ $(call CopyrightLine,$(COPYRIGHT_URL),$(
# Common javadoc options used by all
COMMON_JAVADOCFLAGS = \
$(NO_PROPRIETARY_API_WARNINGS) \
- -quiet \
-use \
-keywords \
$(ADDITIONAL_JAVADOCFLAGS)
++++++ java-1_7_0-openjdk-override.patch ++++++
--- openjdk/jdk/src/share/classes/com/sun/tools/example/debug/tty/ReferenceTypeSpec.java 2014-10-16 11:21:12.169855907 +0200
+++ openjdk/jdk/src/share/classes/com/sun/tools/example/debug/tty/ReferenceTypeSpec.java 2014-10-16 11:13:35.377248000 +0200
@@ -44,9 +44,7 @@
boolean matches(ReferenceType refType);
ClassPrepareRequest createPrepareRequest();
- @Override
int hashCode();
- @Override
boolean equals(Object obj);
}
--- openjdk/jdk/src/share/classes/com/sun/tools/example/debug/bdi/ReferenceTypeSpec.java 2014-10-16 11:21:12.169855907 +0200
+++ openjdk/jdk/src/share/classes/com/sun/tools/example/debug/bdi/ReferenceTypeSpec.java 2014-10-16 11:13:35.377248000 +0200
@@ -42,9 +42,7 @@
*/
boolean matches(ReferenceType refType);
- @Override
int hashCode();
- @Override
boolean equals(Object obj);
}
++++++ java-1_7_0-openjdk-suse-desktop-files.patch ++++++
--- icedtea-2.6.0/jconsole.desktop.in 2015-07-19 23:17:06.831317144 +0200
+++ icedtea-2.6.0/jconsole.desktop.in 2015-07-19 23:19:28.255218134 +0200
@@ -1,10 +1,11 @@
[Desktop Entry]
Name=OpenJDK @JAVA_VER@ Monitoring & Management Console
+GenericName=OpenJDK @JAVA_VER@ Monitoring & Management Console
Comment=Monitor and manage OpenJDK applications
Exec=_BINDIR_/jconsole
Icon=java-@JAVA_VER@
Terminal=false
Type=Application
StartupWMClass=sun-tools-jconsole-JConsole
-Categories=Development;Monitor;Java;
+Categories=Development;Profiling;
Version=1.0
--- icedtea-2.6.0/policytool.desktop.in 2015-07-19 23:17:06.831317144 +0200
+++ icedtea-2.6.0/policytool.desktop.in 2015-07-19 23:20:17.972128444 +0200
@@ -1,10 +1,11 @@
[Desktop Entry]
Name=OpenJDK @JAVA_VER@ Policy Tool
+GenericName=OpenJDK @JAVA_VER@ Policy Tool
Comment=Manage OpenJDK policy files
Exec=_BINDIR_/policytool
Icon=java-@JAVA_VER@
Terminal=false
Type=Application
StartupWMClass=sun-security-tools-PolicyTool
-Categories=Development;Java;
+Categories=System;DesktopSettings;Security;
Version=1.0
++++++ java-1_7_0-openjdk-zero-annotate-aborting-functions-zero.patch ++++++
--- openjdk/hotspot/src/os_cpu/linux_zero/vm/os_linux_zero.cpp
+++ openjdk/hotspot/src/os_cpu/linux_zero/vm/os_linux_zero.cpp
@@ -67,6 +67,7 @@
frame os::get_sender_for_C_frame(frame* fr) {
ShouldNotCallThis();
+ return frame();
}
frame os::current_frame() {
@@ -439,6 +440,7 @@
extern "C" {
int SpinPause() {
+ return 0;
}
int SafeFetch32(int *adr, int errValue) {
++++++ java-1_7_0-openjdk.keyring.renamed ++++++
pub rsa4096/248BDC07 2011-09-28 [expires: 2017-10-08]
uid [ unknown] Dr Andrew John Hughes