[icedtea] Patch for OpenJDK7 b126 support
Dr Andrew John Hughes
ahughes at redhat.com
Tue Jan 25 18:25:02 PST 2011
On 01:14 Wed 26 Jan , Damien Raude-Morvan wrote:
> Hi Andrew,
>
> Le mardi 25 janvier 2011 00:33:00, Dr Andrew John Hughes a écrit :
> > Have you actually got it building? I haven't got the IcedTea forest
> > building independently yet and the last pull I did was b124. What are you
> > using to get b126?
> [...]
> > * The changesets you move to don't appear to exist on my checkout of the
> > IcedTea forest. What are these based on?
>
> Yes, I've successfuly build a b126 Icedtea+OpenJDK using patch I've send
> yesterday and using Debian toolkit for building [0] (ie. it just prepare
> configure options and apply some more patches).
>
> To get tarballs, I'm using OpenJDK7 forest [1] and a simple script to
> 1) obtain revision by parsing .hgtags and grep "b126"
> 2) wget ${JDK_URL}/${module}/archive/${rev}.tar.gz
> 3) compute sha256sum && update Makefile.am
>
> [0] https://code.launchpad.net/~drazzib/openjdk/openjdk7
> [1] http://hg.openjdk.java.net/jdk7/jdk7
>
We use http://hg.openjdk.java.net/icedtea/jdk7 as the basis for IcedTea7
as mentioned on http://icedtea.classpath.org/wiki/Main_Page
> > * Please don't bump CACAO in the same patch. This should be done
> > separately to minimise change.
>
> Of course, I'll prepare another patch.
>
> > * Don't change the jaxp/jaxws/jaf URLs. They are set to use IcedTea as the
> > Oracle servers have proved unreliable. I'll update the IcedTea server
> > with these new ones. This is the first time I've seen them as I've been
> > busy with 6.
>
> Ok, fine for me.
>
> > * The other changes look par for the course. You seem to be
> > dropping icedtea-ssl.patch with no explanation though. Why is this? It
> > looks like it possibly could be dropped.
>
> Good catch, icedtea-ssl.patch is not needed anymore.
> Here is updated patch based on all your comments.
>
> > Are you doing a full bootstrap with gcj? I assume so from the ecj patch
> > additions.
>
> Yes, I'm doing a full bootstrap with ecj-gcj... But I doesn't seems a viable
> long term solution as more and more source code of OpenJDK is updated to
> diamond operator and others Project Coin stuff... Is there support for Java 7
> planned in ECJ roadmap ?
>
I think it already does support some of it, but we build 1.6 classes not 1.7.
I think these additions to OpenJDK make it harder to bootstrap with no real
value, and seem especially odd given most of the codebase still lacks 1.5
features (try removing -nowarn and see how much ecj spews out during the build).
> Regards,
> --
> Damien
> diff -r e5b43d618ab5 -r 43fd56d0ce89 ChangeLog
> --- a/ChangeLog Wed Jan 26 01:03:53 2011 +0100
> +++ b/ChangeLog Wed Jan 26 01:12:41 2011 +0100
> @@ -1,3 +1,46 @@
> +2011-01-26 Damien Raude-Morvan <drazzib at drazzib.com>
> +
> + Bump to b126 openjdk7 drops.
> + * Makefile.am:
> + (OPENJDK_VERSION): Set to b126.
> + (CORBA_CHANGESET): Updated.
> + (HOTSPOT_CHANGESET): Likewise.
> + (JAXP_CHANGESET): Likewise.
> + (JAXWS_CHANGESET): Likewise.
> + (JDK_CHANGESET): Likewise.
> + (LANGTOOLS_CHANGESET): Likewise.
> + (OPENJDK_CHANGESET): Likewise.
> + (CORBA_SHA256SUM): Likewise.
> + (HOTSPOT_SHA256SUM): Likewise.
> + (JAXP_SHA256SUM): Likewise.
> + (JAXWS_SHA256SUM): Likewise.
> + (JDK_SHA256SUM): Likewise.
> + (LANGTOOLS_SHA256SUM): Likewise.
> + (OPENJDK_SHA256SUM): Likewise.
> + (JAXWS_DROP_ZIP): Updated to 2.2.
> + (JAXWS_DROP_SHA256SUM): Likewise.
> + (JAXP_DROP_ZIP): Updated to 1.4.5-dev.
> + (JAXP_DROP_SHA256SUM): Likewise.
> + * patches/hotspot/default/icedtea-includedb.patch: Removed;
> + includeDB completely dropped upstream.
> + * patches/no-precompiled.patch: Removed; b126 now allow to set
> + "USE_PRECOMPILED_HEADER=0"
> + * patches/icedtea-ssl.patch: Removed; don't need to cast anymore and
> + conflict with TLS 1.2 support now present upstream.
> + * generated/java/nio/DirectByteBuffer.java: fix call to super constructor
> + (drop last parameter)
> + * patches/icedtea-freetypeversion.patch, patches/icedtea-javafiles.patch,
> + patches/icedtea-lc_ctype.patch, patches/icedtea-signed-types.patch,
> + patches/boot/ant-javac.patch, patches/boot/demos.patch,
> + patches/boot/fontconfig.patch, patches/boot/revert-6941137.patch,
> + patches/boot/revert-6973616.patch, patches/boot/xbootclasspath.patch,
> + patches/hotspot/default/icedtea-gcc-suffix.patch,
> + patches/hotspot/default/icedtea-sparc-trapsfix.patch,
> + patches/hotspot/default/icedtea-text-relocations.patch,
> + : all refreshed
> + * patches/boot/ecj-diamond.patch, patches/boot/ecj-stringswitch.patch:
> + many parts of JDK now use diamond operator and string switch
> +
> 2011-01-26 Damien Raude-Morvan <drazzib at drazzib.com>
>
> Remove NetX and the IcedTea plugin (drop remaining bits from acinclude.m4
> diff -r e5b43d618ab5 -r 43fd56d0ce89 Makefile.am
> --- a/Makefile.am Wed Jan 26 01:03:53 2011 +0100
> +++ b/Makefile.am Wed Jan 26 01:12:41 2011 +0100
> @@ -1,22 +1,22 @@
> # Dependencies
>
> -OPENJDK_VERSION = b117
> +OPENJDK_VERSION = b126
>
> -CORBA_CHANGESET = 06146786b141
> -HOTSPOT_CHANGESET = 81685aa89446
> -JAXP_CHANGESET = 43658f98c582
> -JAXWS_CHANGESET = f3444af18aff
> -JDK_CHANGESET = e7fc51780596
> -LANGTOOLS_CHANGESET = fdf1b74d3437
> -OPENJDK_CHANGESET = c94d1673451e
> +CORBA_CHANGESET = d7532bcd3742
> +HOTSPOT_CHANGESET = 4c851c931d00
> +JAXP_CHANGESET = 2fde639439c1
> +JAXWS_CHANGESET = 6d772c5119d5
> +JDK_CHANGESET = 8361ef97a0f9
> +LANGTOOLS_CHANGESET = 438a8ad60f7a
> +OPENJDK_CHANGESET = b566d4909056
>
> -CORBA_SHA256SUM = 8d5a566e2d51d791d75f1ff25d5ae499317ec9391ed6bbc86eef483d15551d55
> -HOTSPOT_SHA256SUM = 7ca6831eb7505c21b8607c7cf8d12cb182fca21c3a40c4696db737d56d80e54b
> -JAXP_SHA256SUM = e0aa77b166b30d4d4052110956da831c59c43e22f8d6feeac62a06775bb083b6
> -JAXWS_SHA256SUM = ff4124f3765ac5ebac5ecfd0391cb2a54857d80ac7f967f60630ce0879cfd1f4
> -JDK_SHA256SUM = 0a01f5c43c8ef895addbc6c75adf4046d200c7a0d95d8056fa4f127a1b87feec
> -LANGTOOLS_SHA256SUM = d200c9bcf1c1805e0800a8cd8017e99ff6d12db14a1fcca8e9b67c59dc5ed448
> -OPENJDK_SHA256SUM = d7a3a531f0e064898e511f08f1127447b9171adce21ae4cecb3bca84b3f7b531
> +CORBA_SHA256SUM = ffaf9368d495dbfcbc0292c1ccd99b3c2137fa95708efc0938a03c4a20fb0f40
> +HOTSPOT_SHA256SUM = 2abfc0a8b7cd47f026ec0a28063150bd86db6807373509ee5a11c3010960bdaa
> +JAXP_SHA256SUM = 7bb23aab37af6e0e9d9d5d0312b9982a46fbf65adbe0d5ca398d84da444e30dc
> +JAXWS_SHA256SUM = 7dff2582a77bc4b76525e58feada7b86df9b2193a6bf53447b90b805483dea5a
> +JDK_SHA256SUM = 815533a7b09e0e8c02a64a6a97a6a7b8bab8a95389d7ad6db3dcc7ad3005103f
> +LANGTOOLS_SHA256SUM = 101b14691959b93e49844b95e5cb79622889b2fb7610090bb33fe037363bb3bc
> +OPENJDK_SHA256SUM = 1973623b462a97e3a5dc6820493785e5f205e7f01b88e56939c53092623b6436
>
> CACAO_VERSION = e321b101a9ee
> CACAO_SHA256SUM = 46bc5b6212c199dc4a3dbebe6386fe15a8248625a5dffa17115aab394a298444
> @@ -25,14 +25,14 @@
> CACAO_SRC_ZIP = cacao-$(CACAO_VERSION).tar.bz2
>
> JAXWS_DROP_URL = http://icedtea.classpath.org/download/drops
> -JAXWS_DROP_ZIP = jdk7-jaxws2_2-2010_08_19.zip
> -JAXWS_DROP_SHA256SUM = b8877aafbb15a348babcaee4ee372fb3e2ea0282f8fe93d306272fd24d7847de
> +JAXWS_DROP_ZIP = jdk7-jaxws2_2_2-2010_12_14.zip
> +JAXWS_DROP_SHA256SUM = ef3115dde8ed9a7129e65aab8b1499e11621e343559e6e5a8df9c4542848fb9b
> JAF_DROP_URL = http://icedtea.classpath.org/download/drops
> JAF_DROP_ZIP = jdk7-jaf-2010_08_19.zip
> JAF_DROP_SHA256SUM = e6aefedfdbb4673e8019583d1344fb162b94e1b10382c362364dbbfd5889c09e
> JAXP_DROP_URL = http://icedtea.classpath.org/download/drops
> -JAXP_DROP_ZIP = jaxp-1_4_4.zip
> -JAXP_DROP_SHA256SUM = 10b203bec5b7d3dd8f515a9e098f80abc316faf977bcc220b56efe3dc6e9e5e9
> +JAXP_DROP_ZIP = jaxp-1_4_5-dev.zip
> +JAXP_DROP_SHA256SUM = 938cce9d3f0afaa5d076c62a2de081862102d10bfe04a0767122f2dff5bd975e
>
> ICEDTEA_HG_URL = http://hg.openjdk.java.net/icedtea/jdk7
> OPENJDK_HG_URL = http://hg.openjdk.java.net/jdk7/jdk7
> @@ -255,7 +255,6 @@
>
> ICEDTEA_PATCHES = \
> patches/hotspot/$(HSBUILD)/icedtea-text-relocations.patch \
> - patches/icedtea-ssl.patch \
> patches/icedtea-rmi_amd64.patch \
> patches/icedtea-tools.patch \
> patches/icedtea-demos.patch \
> @@ -295,12 +294,10 @@
> patches/security/icedtea-6592792.patch \
> patches/security/icedtea-6733959.patch \
> patches/security/icedtea-6755943.patch \
> - patches/hotspot/$(HSBUILD)/icedtea-includedb.patch \
> patches/icedtea-demo-swingapplet.patch \
> patches/icedtea-jvmtiEnv.patch \
> patches/icedtea-disable-intree-ec.patch \
> patches/icedtea-sources.patch \
> - patches/no-precompiled.patch \
> patches/parisc.patch \
> patches/sh4-support.patch \
> patches/jtreg-httpTest.patch \
> diff -r e5b43d618ab5 -r 43fd56d0ce89 generated/java/nio/DirectByteBuffer.java
> --- a/generated/java/nio/DirectByteBuffer.java Wed Jan 26 01:03:53 2011 +0100
> +++ b/generated/java/nio/DirectByteBuffer.java Wed Jan 26 01:12:41 2011 +0100
> @@ -114,7 +114,7 @@
> //
> DirectByteBuffer(int cap) { // package-private
>
> - super(-1, 0, cap, cap, false);
> + super(-1, 0, cap, cap);
> int ps = Bits.pageSize();
> int size = cap + ps;
> Bits.reserveMemory(size, cap);
> @@ -144,7 +144,7 @@
> // Invoked only by JNI: NewDirectByteBuffer(void*, long)
> //
> private DirectByteBuffer(long addr, int cap) {
> - super(-1, 0, cap, cap, false);
> + super(-1, 0, cap, cap);
> address = addr;
> cleaner = null;
> }
> @@ -155,7 +155,7 @@
> //
> protected DirectByteBuffer(int cap, long addr, Runnable unmapper) {
>
> - super(-1, 0, cap, cap, true);
> + super(-1, 0, cap, cap);
> address = addr;
> viewedBuffer = null;
> cleaner = Cleaner.create(this, unmapper);
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/boot/ant-javac.patch
> --- a/patches/boot/ant-javac.patch Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/boot/ant-javac.patch Wed Jan 26 01:12:41 2011 +0100
> @@ -1,7 +1,6 @@
> -diff -Nru openjdk-boot.orig/jaxp/build.xml openjdk-boot/jaxp/build.xml
> ---- openjdk-boot.orig/jaxp/build.xml 2009-12-04 15:29:13.000000000 +0000
> -+++ openjdk-boot/jaxp/build.xml 2009-12-14 22:57:23.000000000 +0000
> -@@ -122,7 +122,8 @@
> +--- openjdk-boot/jaxp/build.xml.orig
> ++++ openjdk-boot/jaxp/build.xml
> +@@ -131,7 +131,8 @@
> memoryMaximumSize="${javac.memoryMaximumSize}"
> source="${javac.source}"
> debug="${javac.debug}"
> @@ -11,10 +10,9 @@
> <compilerarg value="-J-Xbootclasspath/p:${javac.jar}"/>
> <compilerarg line="${javac.version.opt} ${javac.lint.opts} ${javac.no.jdk.warnings}"/>
> <src refid="src.dir.id"/>
> -diff -Nru openjdk-boot.orig/jaxws/build.xml openjdk-boot/jaxws/build.xml
> ---- openjdk-boot.orig/jaxws/build.xml 2009-12-04 15:35:01.000000000 +0000
> -+++ openjdk-boot/jaxws/build.xml 2009-12-14 22:57:41.000000000 +0000
> -@@ -122,7 +122,8 @@
> +--- openjdk-boot/jaxws/build.xml.orig
> ++++ openjdk-boot/jaxws/build.xml
> +@@ -131,7 +131,8 @@
> memoryMaximumSize="${javac.memoryMaximumSize}"
> source="${javac.source}"
> debug="${javac.debug}"
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/boot/demos.patch
> --- a/patches/boot/demos.patch Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/boot/demos.patch Wed Jan 26 01:12:41 2011 +0100
> @@ -21,12 +21,12 @@
> diff -Nru openjdk-boot.orig/jdk/make/Makefile openjdk-boot/jdk/make/Makefile
> --- openjdk-boot.orig/jdk/make/Makefile 2010-04-28 22:05:26.000000000 +0100
> +++ openjdk-boot/jdk/make/Makefile 2010-05-04 13:23:57.000000000 +0100
> -@@ -242,7 +242,7 @@
> +@@ -241,7 +241,7 @@
>
> SUBDIRS = tools java javax sun com
> SUBDIRS_tools = launchers
> -SUBDIRS_misc = org sunw jpda mkdemo mksample
> +SUBDIRS_misc = org sunw jpda mksample
>
> - include $(BUILDDIR)/common/Subdirs.gmk
> -
> + # Alternate classes implementation
> + ifndef OPENJDK
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/boot/ecj-diamond.patch
> --- a/patches/boot/ecj-diamond.patch Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/boot/ecj-diamond.patch Wed Jan 26 01:12:41 2011 +0100
> @@ -1,6 +1,5 @@
> -diff -r 917976e88f76 src/share/classes/sun/nio/cs/AbstractCharsetProvider.java
> ---- openjdk-boot.orig/jdk/src/share/classes/sun/nio/cs/AbstractCharsetProvider.java Mon Feb 22 15:16:55 2010 +0000
> -+++ openjdk-boot/jdk/src/share/classes/sun/nio/cs/AbstractCharsetProvider.java Mon Feb 22 16:55:24 2010 +0000
> +--- openjdk-boot/jdk/src/share/classes/sun/nio/cs/AbstractCharsetProvider.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/nio/cs/AbstractCharsetProvider.java
> @@ -49,22 +49,22 @@
> /* Maps canonical names to class names
> */
> @@ -37,9 +36,8 @@
> }
>
> return new Iterator<Charset>() {
> -diff -r a9b4fde406d4 src/share/classes/sun/io/CharacterEncoding.java
> ---- openjdk-boot.orig/jdk/src/share/classes/sun/io/CharacterEncoding.java Thu Feb 18 13:31:46 2010 -0800
> -+++ openjdk-boot/jdk/src/share/classes/sun/io/CharacterEncoding.java Wed Feb 24 11:10:05 2010 +0000
> +--- openjdk-boot/jdk/src/share/classes/sun/io/CharacterEncoding.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/io/CharacterEncoding.java
> @@ -54,7 +54,7 @@
> private static volatile boolean installedAll;
>
> @@ -49,9 +47,8 @@
>
> aliasTable.put("us-ascii", "ASCII");
> aliasTable.put("ascii", "ASCII");
> -diff -r c1cee45daf4d src/share/classes/sun/net/www/protocol/http/AuthenticationInfo.java
> ---- openjdk-boot.orig/jdk/src/share/classes/sun/net/www/protocol/http/AuthenticationInfo.java Wed Apr 28 22:15:05 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/sun/net/www/protocol/http/AuthenticationInfo.java Tue May 04 18:21:07 2010 +0100
> +--- openjdk-boot/jdk/src/share/classes/sun/net/www/protocol/http/AuthenticationInfo.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/net/www/protocol/http/AuthenticationInfo.java
> @@ -111,7 +111,7 @@
> * at the same time, then all but the first will block until
> * the first completes its authentication.
> @@ -61,9 +58,8 @@
>
> /* check if a request for this destination is in progress
> * return false immediately if not. Otherwise block until
> -diff -r c1cee45daf4d src/share/classes/sun/security/provider/JavaKeyStore.java
> ---- openjdk-boot.orig/jdk/src/share/classes/sun/security/provider/JavaKeyStore.java Wed Apr 28 22:15:05 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/sun/security/provider/JavaKeyStore.java Wed May 05 11:35:35 2010 +0100
> +--- openjdk-boot/jdk/src/share/classes/sun/security/provider/JavaKeyStore.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/security/provider/JavaKeyStore.java
> @@ -683,7 +683,7 @@
> // Read the certificate chain
> int numOfCerts = dis.readInt();
> @@ -73,9 +69,8 @@
> numOfCerts > 10 ? 10 : numOfCerts);
> for (int j = 0; j < numOfCerts; j++) {
> if (xVersion == 2) {
> -diff -Nru openjdk-boot.orig/jdk/src/solaris/classes/sun/net/dns/ResolverConfigurationImpl.java openjdk-boot/jdk/src/solaris/classes/sun/net/dns/ResolverConfigurationImpl.java
> ---- openjdk-boot.orig/jdk/src/solaris/classes/sun/net/dns/ResolverConfigurationImpl.java 2010-09-01 22:07:18.059282202 +0100
> -+++ openjdk-boot/jdk/src/solaris/classes/sun/net/dns/ResolverConfigurationImpl.java 2010-09-01 22:07:50.032515630 +0100
> +--- openjdk-boot/jdk/src/solaris/classes/sun/net/dns/ResolverConfigurationImpl.java.orig
> ++++ openjdk-boot/jdk/src/solaris/classes/sun/net/dns/ResolverConfigurationImpl.java
> @@ -60,7 +60,7 @@
> int maxperkeyword,
> int maxkeywords)
> @@ -94,9 +89,8 @@
> String domain = fallbackDomain0();
> if (domain != null && domain.length() > 0) {
> sl.add(domain);
> -diff -r a094068f4c7b src/share/classes/sun/net/spi/nameservice/dns/DNSNameService.java
> ---- openjdk-boot.orig/jdk/src/share/classes/sun/net/spi/nameservice/dns/DNSNameService.java Fri Aug 27 19:01:53 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/sun/net/spi/nameservice/dns/DNSNameService.java Mon Sep 06 17:03:29 2010 +0100
> +--- openjdk-boot/jdk/src/share/classes/sun/net/spi/nameservice/dns/DNSNameService.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/net/spi/nameservice/dns/DNSNameService.java
> @@ -52,7 +52,7 @@
>
> // Per-thread soft cache of the last temporary context
> @@ -124,9 +118,8 @@
> Attributes attrs;
>
> // do the query
> -diff -r a094068f4c7b src/solaris/classes/sun/nio/cs/ext/CompoundTextSupport.java
> ---- openjdk-boot.orig/jdk/src/solaris/classes/sun/nio/cs/ext/CompoundTextSupport.java Fri Aug 27 19:01:53 2010 +0100
> -+++ openjdk-boot/jdk/src/solaris/classes/sun/nio/cs/ext/CompoundTextSupport.java Mon Sep 06 18:44:51 2010 +0100
> +--- openjdk-boot/jdk/src/solaris/classes/sun/nio/cs/ext/CompoundTextSupport.java.orig
> ++++ openjdk-boot/jdk/src/solaris/classes/sun/nio/cs/ext/CompoundTextSupport.java
> @@ -153,12 +153,12 @@
>
> static {
> @@ -144,10 +137,9 @@
>
> if (!(isEncodingSupported("US-ASCII") &&
> isEncodingSupported("ISO-8859-1")))
> -diff -r a094068f4c7b src/share/classes/com/sun/jndi/dns/DnsContextFactory.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/jndi/dns/DnsContextFactory.java Fri Aug 27 19:01:53 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/jndi/dns/DnsContextFactory.java Mon Sep 06 18:50:12 2010 +0100
> -@@ -132,7 +132,7 @@
> +--- openjdk-boot/jdk/src/share/classes/com/sun/jndi/dns/DnsContextFactory.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/jndi/dns/DnsContextFactory.java
> +@@ -135,7 +135,7 @@
> throw new ConfigurationException("DNS pseudo-URL required");
> }
>
> @@ -156,23 +148,22 @@
>
> for (int i = 0; i < urls.length; i++) {
> String server = urls[i].getHost();
> -diff -r 240d4d3f2db7 src/share/classes/com/sun/java/util/jar/pack/Attribute.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/java/util/jar/pack/Attribute.java Tue Sep 14 17:29:58 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Attribute.java Wed Sep 15 00:00:17 2010 +0100
> -@@ -96,9 +96,9 @@
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Attribute.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Attribute.java
> +@@ -104,9 +104,9 @@
> + return this.def.compareTo(that.def);
> }
>
> - private static final byte[] noBytes = {};
> - private static final Map<List<Attribute>, List<Attribute>> canonLists = new HashMap<>();
> - private static final Map<Layout, Attribute> attributes = new HashMap<>();
> - private static final Map<Layout, Attribute> standardDefs = new HashMap<>();
> -+ private static final Map<List<Attribute>, List<Attribute>> canonLists = new HashMap<List<Attribute>,List<Attribute>>();
> ++ private static final Map<List<Attribute>, List<Attribute>> canonLists = new HashMap<List<Attribute>, List<Attribute>>();
> + private static final Map<Layout, Attribute> attributes = new HashMap<Layout, Attribute>();
> + private static final Map<Layout, Attribute> standardDefs = new HashMap<Layout, Attribute>();
>
> // Canonicalized lists of trivial attrs (Deprecated, etc.)
> // are used by trimToSize, in order to reduce footprint
> -@@ -108,7 +108,7 @@
> +@@ -116,7 +116,7 @@
> synchronized (canonLists) {
> List<Attribute> cl = canonLists.get(al);
> if (cl == null) {
> @@ -181,7 +172,7 @@
> cl.addAll(al);
> cl = Collections.unmodifiableList(cl);
> canonLists.put(al, cl);
> -@@ -329,9 +329,9 @@
> +@@ -337,9 +337,9 @@
>
> public void addAttribute(Attribute a) {
> if (attributes == null)
> @@ -193,7 +184,7 @@
> attributes.add(a);
> }
>
> -@@ -339,7 +339,7 @@
> +@@ -347,7 +347,7 @@
> if (attributes == null) return null;
> if (!attributes.contains(a)) return null;
> if (!(attributes instanceof ArrayList))
> @@ -202,46 +193,45 @@
> attributes.remove(a);
> return a;
> }
> -@@ -824,7 +824,7 @@
> +@@ -838,7 +838,7 @@
> */
> static //private
> Layout.Element[] tokenizeLayout(Layout self, int curCble, String layout) {
> -- ArrayList<Layout.Element> col = new ArrayList<>(layout.length());
> -+ ArrayList<Layout.Element> col = new ArrayList<Layout.Element>(layout.length());
> +- List<Layout.Element> col = new ArrayList<>(layout.length());
> ++ List<Layout.Element> col = new ArrayList<Layout.Element>(layout.length());
> tokenizeLayout(self, curCble, layout, col);
> Layout.Element[] res = new Layout.Element[col.size()];
> col.toArray(res);
> -@@ -889,7 +889,7 @@
> +@@ -903,7 +903,7 @@
> case 'T': // union: 'T' any_int union_case* '(' ')' '[' body ']'
> kind = EK_UN;
> i = tokenizeSInt(e, layout, i);
> -- ArrayList<Layout.Element> cases = new ArrayList<>();
> -+ ArrayList<Layout.Element> cases = new ArrayList<Layout.Element>();
> +- List<Layout.Element> cases = new ArrayList<>();
> ++ List<Layout.Element> cases = new ArrayList<Layout.Element>();
> for (;;) {
> // Keep parsing cases until we hit the default case.
> if (layout.charAt(i++) != '(')
> -@@ -1043,7 +1043,7 @@
> +@@ -1057,7 +1057,7 @@
> }
> static //private
> String[] splitBodies(String layout) {
> -- ArrayList<String> bodies = new ArrayList<>();
> -+ ArrayList<String> bodies = new ArrayList<String>();
> +- List<String> bodies = new ArrayList<>();
> ++ List<String> bodies = new ArrayList<String>();
> // Parse several independent layout bodies: "[foo][bar]...[baz]"
> for (int i = 0; i < layout.length(); i++) {
> if (layout.charAt(i++) != '[')
> -diff -r 240d4d3f2db7 src/share/classes/com/sun/java/util/jar/pack/ConstantPool.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/java/util/jar/pack/ConstantPool.java Tue Sep 14 17:29:58 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ConstantPool.java Wed Sep 15 00:00:17 2010 +0100
> -@@ -909,7 +909,7 @@
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ConstantPool.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ConstantPool.java
> +@@ -919,7 +919,7 @@
> public static
> Index[] partition(Index ix, int[] keys) {
> // %%% Should move this into class Index.
> -- ArrayList<List<Entry>> parts = new ArrayList<>();
> -+ ArrayList<List<Entry>> parts = new ArrayList<List<Entry>>();
> +- List<List<Entry>> parts = new ArrayList<>();
> ++ List<List<Entry>> parts = new ArrayList<List<Entry>>();
> Entry[] cpMap = ix.cpMap;
> assert(keys.length == cpMap.length);
> for (int i = 0; i < keys.length; i++) {
> -@@ -920,7 +920,7 @@
> +@@ -930,7 +930,7 @@
> }
> List<Entry> part = parts.get(key);
> if (part == null) {
> @@ -250,19 +240,27 @@
> }
> part.add(cpMap[i]);
> }
> -diff -r 240d4d3f2db7 src/share/classes/com/sun/java/util/jar/pack/Package.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/java/util/jar/pack/Package.java Tue Sep 14 17:29:58 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Package.java Wed Sep 15 00:00:17 2010 +0100
> -@@ -90,7 +90,7 @@
> +@@ -1137,7 +1137,7 @@
> + void completeReferencesIn(Set<Entry> cpRefs, boolean flattenSigs) {
> + cpRefs.remove(null);
> + for (ListIterator<Entry> work =
> +- new ArrayList<>(cpRefs).listIterator(cpRefs.size());
> ++ new ArrayList<Entry>(cpRefs).listIterator(cpRefs.size());
> + work.hasPrevious(); ) {
> + Entry e = work.previous();
> + work.remove(); // pop stack
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Package.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Package.java
> +@@ -112,7 +112,7 @@
> public static final Attribute.Layout attrSourceFileSpecial;
> - public static final Map attrDefs;
> + public static final Map<Attribute.Layout, Attribute> attrDefs;
> static {
> -- HashMap<Layout, Attribute> ad = new HashMap<>(3);
> -+ HashMap<Layout, Attribute> ad = new HashMap<Layout, Attribute>(3);
> +- Map<Layout, Attribute> ad = new HashMap<>(3);
> ++ Map<Layout, Attribute> ad = new HashMap<Layout, Attribute>(3);
> attrCodeEmpty = Attribute.define(ad, ATTR_CONTEXT_METHOD,
> "Code", "").layout();
> attrInnerClassesEmpty = Attribute.define(ad, ATTR_CONTEXT_CLASS,
> -@@ -160,7 +160,7 @@
> +@@ -181,7 +181,7 @@
> }
> }
>
> @@ -271,7 +269,16 @@
>
> public List<Package.Class> getClasses() {
> return classes;
> -@@ -271,7 +271,7 @@
> +@@ -264,7 +264,7 @@
> + if (olda == null)
> + return; // no SourceFile attr.
> + String obvious = getObviousSourceFile();
> +- List<Entry> ref = new ArrayList<>(1);
> ++ List<Entry> ref = new ArrayList<Entry>(1);
> + olda.visitRefs(this, VRM_PACKAGE, ref);
> + Utf8Entry sfName = (Utf8Entry) ref.get(0);
> + Attribute a = olda;
> +@@ -292,7 +292,7 @@
> if (a != olda) {
> if (verbose > 2)
> Utils.log.fine("recoding obvious SourceFile="+obvious);
> @@ -280,25 +287,34 @@
> int where = newAttrs.indexOf(olda);
> newAttrs.set(where, a);
> setAttributes(newAttrs);
> -@@ -320,7 +320,7 @@
> +@@ -322,7 +322,7 @@
> + }
> +
> + public void setInnerClasses(Collection<InnerClass> ics) {
> +- innerClasses = (ics == null) ? null : new ArrayList<>(ics);
> ++ innerClasses = (ics == null) ? null : new ArrayList<InnerClass>(ics);
> + // Edit the attribute list, if necessary.
> + Attribute a = getAttribute(attrInnerClassesEmpty);
> + if (innerClasses != null && a == null)
> +@@ -341,7 +341,7 @@
> * with that of Package.this.allInnerClasses.
> */
> public List<InnerClass> computeGloballyImpliedICs() {
> -- HashSet<Entry> cpRefs = new HashSet<>();
> -+ HashSet<Entry> cpRefs = new HashSet<Entry>();
> +- Set<Entry> cpRefs = new HashSet<>();
> ++ Set<Entry> cpRefs = new HashSet<Entry>();
> { // This block temporarily displaces this.innerClasses.
> ArrayList<InnerClass> innerClassesSaved = innerClasses;
> innerClasses = null; // ignore for the moment
> -@@ -329,7 +329,7 @@
> +@@ -350,7 +350,7 @@
> }
> ConstantPool.completeReferencesIn(cpRefs, true);
>
> -- HashSet<Entry> icRefs = new HashSet<>();
> -+ HashSet<Entry> icRefs = new HashSet<Entry>();
> +- Set<Entry> icRefs = new HashSet<>();
> ++ Set<Entry> icRefs = new HashSet<Entry>();
> for (Entry e : cpRefs) {
> // Restrict cpRefs to InnerClasses entries only.
> if (!(e instanceof ClassEntry)) continue;
> -@@ -345,7 +345,7 @@
> +@@ -366,7 +366,7 @@
> // This loop is structured this way so as to accumulate
> // entries into impliedICs in an order which reflects
> // the order of allInnerClasses.
> @@ -307,18 +323,18 @@
> for (InnerClass ic : allInnerClasses) {
> // This one is locally relevant if it describes
> // a member of the current class, or if the current
> -@@ -388,8 +388,8 @@
> +@@ -409,8 +409,8 @@
> // Diff is A since I is empty.
> }
> // (I*A) is non-trivial
> -- HashSet<InnerClass> center = new HashSet<>(actualICs);
> +- Set<InnerClass> center = new HashSet<>(actualICs);
> - center.retainAll(new HashSet<>(impliedICs));
> -+ HashSet<InnerClass> center = new HashSet<InnerClass>(actualICs);
> ++ Set<InnerClass> center = new HashSet<InnerClass>(actualICs);
> + center.retainAll(new HashSet<InnerClass>(impliedICs));
> impliedICs.addAll(actualICs);
> impliedICs.removeAll(center);
> // Diff is now I^A = (I+A)-(I*A).
> -@@ -518,7 +518,7 @@
> +@@ -539,7 +539,7 @@
> super(flags, descriptor);
> assert(!descriptor.isMethod());
> if (fields == null)
> @@ -327,7 +343,7 @@
> boolean added = fields.add(this);
> assert(added);
> order = fields.size();
> -@@ -543,7 +543,7 @@
> +@@ -564,7 +564,7 @@
> super(flags, descriptor);
> assert(descriptor.isMethod());
> if (methods == null)
> @@ -336,7 +352,7 @@
> boolean added = methods.add(this);
> assert(added);
> }
> -@@ -713,14 +713,14 @@
> +@@ -732,14 +732,14 @@
> }
>
> // What non-class files are in this unit?
> @@ -348,30 +364,30 @@
> }
>
> public List<File> getClassStubs() {
> -- ArrayList<File> classStubs = new ArrayList<>(classes.size());
> -+ ArrayList<File> classStubs = new ArrayList<File>(classes.size());
> +- List<File> classStubs = new ArrayList<>(classes.size());
> ++ List<File> classStubs = new ArrayList<File>(classes.size());
> for (Class cls : classes) {
> assert(cls.file.isClassStub());
> classStubs.add(cls.file);
> -@@ -839,7 +839,7 @@
> +@@ -859,7 +859,7 @@
> public InputStream getInputStream() {
> InputStream in = new ByteArrayInputStream(append.toByteArray());
> - if (prepend.size() == 0) return in;
> -- ArrayList<InputStream> isa = new ArrayList<>(prepend.size()+1);
> -+ ArrayList<InputStream> isa = new ArrayList<InputStream>(prepend.size()+1);
> + if (prepend.isEmpty()) return in;
> +- List<InputStream> isa = new ArrayList<>(prepend.size()+1);
> ++ List<InputStream> isa = new ArrayList<InputStream>(prepend.size()+1);
> for (Iterator i = prepend.iterator(); i.hasNext(); ) {
> byte[] bytes = (byte[]) i.next();
> isa.add(new ByteArrayInputStream(bytes));
> -@@ -876,7 +876,7 @@
> +@@ -896,7 +896,7 @@
> }
>
> // Is there a globally declared table of inner classes?
> -- ArrayList<InnerClass> allInnerClasses = new ArrayList<>();
> -+ ArrayList<InnerClass> allInnerClasses = new ArrayList<InnerClass>();
> - HashMap<ClassEntry, InnerClass> allInnerClassesByThis;
> +- List<InnerClass> allInnerClasses = new ArrayList<>();
> ++ List<InnerClass> allInnerClasses = new ArrayList<InnerClass>();
> + Map<ClassEntry, InnerClass> allInnerClassesByThis;
>
> public
> -@@ -891,7 +891,7 @@
> +@@ -911,7 +911,7 @@
> allInnerClasses.addAll(ics);
>
> // Make an index:
> @@ -380,30 +396,17 @@
> for (InnerClass ic : allInnerClasses) {
> Object pic = allInnerClassesByThis.put(ic.thisClass, ic);
> assert(pic == null); // caller must ensure key uniqueness!
> -@@ -1288,7 +1288,7 @@
> +@@ -1307,7 +1307,7 @@
>
> // Use this before writing the class files.
> void ensureAllClassFiles() {
> -- HashSet<File> fileSet = new HashSet<>(files);
> -+ HashSet<File> fileSet = new HashSet<File>(files);
> +- Set<File> fileSet = new HashSet<>(files);
> ++ Set<File> fileSet = new HashSet<File>(files);
> for (Class cls : classes) {
> // Add to the end of ths list:
> if (!fileSet.contains(cls.file))
> -diff -r 240d4d3f2db7 src/share/classes/com/sun/java/util/jar/pack/PackerImpl.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/java/util/jar/pack/PackerImpl.java Tue Sep 14 17:29:58 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackerImpl.java Wed Sep 15 00:00:17 2010 +0100
> -@@ -599,7 +599,7 @@
> -
> - List<InFile> scanJar(JarFile jf) throws IOException {
> - // Collect jar entries, preserving order.
> -- List<InFile> inFiles = new ArrayList<>();
> -+ List<InFile> inFiles = new ArrayList<InFile>();
> - for (JarEntry je : Collections.list(jf.entries())) {
> - InFile inFile = new InFile(jf, je);
> - assert(je.isDirectory() == inFile.name.endsWith("/"));
> -diff -r 240d4d3f2db7 src/share/classes/com/sun/java/util/jar/pack/TLGlobals.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/java/util/jar/pack/TLGlobals.java Tue Sep 14 17:29:58 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/TLGlobals.java Wed Sep 15 00:00:17 2010 +0100
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/TLGlobals.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/TLGlobals.java
> @@ -58,12 +58,12 @@
> private final Map<String, MemberEntry> memberEntries;
>
> @@ -423,10 +426,9 @@
> props = new PropMap();
> }
>
> -diff -r 240d4d3f2db7 src/share/classes/com/sun/java/util/jar/pack/Utils.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/java/util/jar/pack/Utils.java Tue Sep 14 17:29:58 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Utils.java Wed Sep 15 00:00:17 2010 +0100
> -@@ -123,7 +123,7 @@
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Utils.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Utils.java
> +@@ -132,7 +132,7 @@
> // Keep a TLS point to the global data and environment.
> // This makes it simpler to supply environmental options
> // to the engine code, especially the native code.
> @@ -435,49 +437,47 @@
>
> // convenience methods to access the TL globals
> static TLGlobals getTLGlobals() {
> -diff -r 240d4d3f2db7 src/share/classes/com/sun/java/util/jar/pack/UnpackerImpl.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/java/util/jar/pack/UnpackerImpl.java Tue Sep 14 17:29:58 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/UnpackerImpl.java Wed Sep 15 14:34:26 2010 +0100
> -@@ -199,7 +199,7 @@
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/UnpackerImpl.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/UnpackerImpl.java
> +@@ -226,7 +226,7 @@
> props.setProperty(java.util.jar.Pack200.Unpacker.PROGRESS,"50");
> pkg.ensureAllClassFiles();
> // Now write out the files.
> -- HashSet<Package.Class> classesToWrite = new HashSet<>(pkg.getClasses());
> -+ HashSet<Package.Class> classesToWrite = new HashSet<Package.Class>(pkg.getClasses());
> - for (Iterator i = pkg.getFiles().iterator(); i.hasNext(); ) {
> - Package.File file = (Package.File) i.next();
> +- Set<Package.Class> classesToWrite = new HashSet<>(pkg.getClasses());
> ++ Set<Package.Class> classesToWrite = new HashSet<Package.Class>(pkg.getClasses());
> + for (Package.File file : pkg.getFiles()) {
> String name = file.nameString;
> -diff -r 240d4d3f2db7 src/share/classes/com/sun/java/util/jar/pack/Driver.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/java/util/jar/pack/Driver.java Tue Sep 14 17:29:58 2010 +0100
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Driver.java Wed Sep 15 15:25:40 2010 +0100
> -@@ -38,7 +38,7 @@
> + JarEntry je = new JarEntry(Utils.getJarEntryName(name));
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Driver.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Driver.java
> +@@ -59,7 +59,7 @@
> ResourceBundle.getBundle("com.sun.java.util.jar.pack.DriverResource");
>
> public static void main(String[] ava) throws IOException {
> -- ArrayList<String> av = new ArrayList<>(Arrays.asList(ava));
> -+ ArrayList<String> av = new ArrayList<String>(Arrays.asList(ava));
> +- List<String> av = new ArrayList<>(Arrays.asList(ava));
> ++ List<String> av = new ArrayList<String>(Arrays.asList(ava));
>
> boolean doPack = true;
> boolean doUnpack = false;
> -@@ -61,7 +61,7 @@
> +@@ -84,7 +84,7 @@
> }
>
> // Collect engine properties here:
> -- HashMap<String,String> engProps = new HashMap<>();
> -+ HashMap<String,String> engProps = new HashMap<String,String>();
> +- Map<String,String> engProps = new HashMap<>();
> ++ Map<String,String> engProps = new HashMap<String,String>();
> engProps.put(verboseProp, System.getProperty(verboseProp));
>
> String optionMap;
> -@@ -75,7 +75,7 @@
> +@@ -98,7 +98,7 @@
> }
>
> // Collect argument properties here:
> -- HashMap<String,String> avProps = new HashMap<>();
> -+ HashMap<String,String> avProps = new HashMap<String,String>();
> +- Map<String,String> avProps = new HashMap<>();
> ++ Map<String,String> avProps = new HashMap<String,String>();
> try {
> for (;;) {
> String state = parseCommandOptions(av, optionMap, avProps);
> -@@ -494,7 +494,7 @@
> +@@ -525,7 +525,7 @@
> String resultString = null;
>
> // Convert options string into optLines dictionary.
> @@ -486,3 +486,2633 @@
> loadOptmap:
> for (String optline : options.split("\n")) {
> String[] words = optline.split("\\p{Space}+");
> +--- openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/ktab/KeyTab.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/security/krb5/internal/ktab/KeyTab.java
> +@@ -436,7 +436,7 @@
> + int count = 0;
> +
> + // Remember the highest KVNO for each etype. Used for kvno == -2
> +- Map<Integer,Integer> highest = new HashMap<>();
> ++ Map<Integer,Integer> highest = new HashMap<Integer,Integer>();
> +
> + for (int i = entries.size()-1; i >= 0; i--) {
> + KeyTabEntry e = entries.get(i);
> +--- openjdk-boot/jdk/src/share/classes/java/util/zip/ZipFile.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/zip/ZipFile.java
> +@@ -315,7 +315,7 @@
> + private static native void freeEntry(long jzfile, long jzentry);
> +
> + // the outstanding inputstreams that need to be closed.
> +- private Set<InputStream> streams = new HashSet<>();
> ++ private Set<InputStream> streams = new HashSet<InputStream>();
> +
> + /**
> + * Returns an input stream for reading the contents of the specified
> +@@ -545,7 +545,7 @@
> +
> + if (streams.size() !=0) {
> + Set<InputStream> copy = streams;
> +- streams = new HashSet<>();
> ++ streams = new HashSet();
> + for (InputStream is: copy)
> + is.close();
> + }
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackerImpl.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackerImpl.java
> +@@ -183,8 +183,8 @@
> + final Map<Attribute.Layout, Attribute> attrDefs;
> + final Map<Attribute.Layout, String> attrCommands;
> + {
> +- Map<Attribute.Layout, Attribute> lattrDefs = new HashMap<>();
> +- Map<Attribute.Layout, String> lattrCommands = new HashMap<>();
> ++ Map<Attribute.Layout, Attribute> lattrDefs = new HashMap<Attribute.Layout, Attribute>();
> ++ Map<Attribute.Layout, String> lattrCommands = new HashMap<Attribute.Layout, String>();
> + String[] keys = {
> + Pack200.Packer.CLASS_ATTRIBUTE_PFX,
> + Pack200.Packer.FIELD_ATTRIBUTE_PFX,
> +@@ -593,7 +593,7 @@
> + assert(pkg.files.containsAll(pkg.getClassStubs()));
> + // Order of stubs in file list must agree with classes.
> + List<Package.File> res = pkg.files;
> +- assert((res = new ArrayList<>(pkg.files))
> ++ assert((res = new ArrayList(pkg.files))
> + .retainAll(pkg.getClassStubs()) || true);
> + assert(res.equals(pkg.getClassStubs()));
> + }
> +@@ -626,7 +626,7 @@
> +
> + List<InFile> scanJar(JarFile jf) throws IOException {
> + // Collect jar entries, preserving order.
> +- List<InFile> inFiles = new ArrayList<>();
> ++ List<InFile> inFiles = new ArrayList<InFile>();
> + try {
> + for (JarEntry je : Collections.list(jf.entries())) {
> + InFile inFile = new InFile(jf, je);
> +--- openjdk-boot/jdk/src/share/classes/java/dyn/Switcher.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/dyn/Switcher.java
> +@@ -79,7 +79,7 @@
> + return MethodHandles.guardWithTest(this.mcsInvoker, target, fallback);
> + }
> + public static void invalidateAll(Switcher[] switchers) {
> +- List<MutableCallSite> mcss = new ArrayList<>();
> ++ List<MutableCallSite> mcss = new ArrayList<MutableCallSite>();
> + for (Switcher s : switchers) mcss.add(s.mcs);
> + for (MutableCallSite mcs : mcss) mcs.setTarget(K_false);
> + MutableCallSite.sync(mcss.toArray(new MutableCallSite[0]));
> +--- openjdk-boot/jdk/src/share/classes/sun/launcher/LauncherHelper.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/launcher/LauncherHelper.java
> +@@ -170,7 +170,7 @@
> + private static void printProperties(PrintStream ostream) {
> + Properties p = System.getProperties();
> + ostream.println(PROP_SETTINGS);
> +- List<String> sortedPropertyKeys = new ArrayList<>();
> ++ List<String> sortedPropertyKeys = new ArrayList<String>();
> + sortedPropertyKeys.addAll(p.stringPropertyNames());
> + Collections.sort(sortedPropertyKeys);
> + for (String x : sortedPropertyKeys) {
> +@@ -245,7 +245,7 @@
> + }
> + // Locale does not implement Comparable so we convert it to String
> + // and sort it for pretty printing.
> +- Set<String> sortedSet = new TreeSet<>();
> ++ Set<String> sortedSet = new TreeSet<String>();
> + for (Locale l : tlocales) {
> + sortedSet.add(l.toString());
> + }
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/CodingChooser.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/CodingChooser.java
> +@@ -743,9 +743,9 @@
> + // Steps 1/2/3 are interdependent, and may be iterated.
> + // Steps 4 and 5 may be decided independently afterward.
> + int[] LValuesCoded = PopulationCoding.LValuesCoded;
> +- List<Coding> bestFits = new ArrayList<>();
> +- List<Coding> fullFits = new ArrayList<>();
> +- List<Coding> longFits = new ArrayList<>();
> ++ List<Coding> bestFits = new ArrayList<Coding>();
> ++ List<Coding> fullFits = new ArrayList<Coding>();
> ++ List<Coding> longFits = new ArrayList<Coding>();
> + final int PACK_TO_MAX_S = 1;
> + if (bestPopFVC <= 255) {
> + bestFits.add(BandStructure.BYTE1);
> +@@ -785,7 +785,7 @@
> + }
> + }
> + }
> +- List<Coding> allFits = new ArrayList<>();
> ++ List<Coding> allFits = new ArrayList<Coding>();
> + for (Iterator<Coding> i = bestFits.iterator(),
> + j = fullFits.iterator(),
> + k = longFits.iterator();
> +@@ -1230,10 +1230,10 @@
> + Histogram hist = getValueHistogram();
> + int fVlen = stressLen(hist.getTotalLength());
> + if (fVlen == 0) return coding;
> +- List<Integer> popvals = new ArrayList<>();
> ++ List<Integer> popvals = new ArrayList<Integer>();
> + if (stress.nextBoolean()) {
> + // Build the population from the value list.
> +- Set<Integer> popset = new HashSet<>();
> ++ Set<Integer> popset = new HashSet<Integer>();
> + for (int i = start; i < end; i++) {
> + if (popset.add(values[i])) popvals.add(values[i]);
> + }
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackageReader.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackageReader.java
> +@@ -680,7 +680,7 @@
> + cp_Signature_classes.expectLength(getIntTotal(numSigClasses));
> + cp_Signature_classes.readFrom(in);
> + cp_Signature_classes.setIndex(getCPIndex(CONSTANT_Class));
> +- utf8Signatures = new HashMap<>();
> ++ utf8Signatures = new HashMap<Utf8Entry, SignatureEntry>();
> + for (int i = 0; i < cpMap.length; i++) {
> + Utf8Entry formRef = (Utf8Entry) cp_Signature_form.getRef();
> + ClassEntry[] classRefs = new ClassEntry[numSigClasses[i]];
> +@@ -880,7 +880,7 @@
> + ic_name.expectLength(longICCount);
> + ic_name.readFrom(in);
> + ic_flags.resetForSecondPass();
> +- List<InnerClass> icList = new ArrayList<>(numInnerClasses);
> ++ List<InnerClass> icList = new ArrayList<InnerClass>(numInnerClasses);
> + for (int i = 0; i < numInnerClasses; i++) {
> + int flags = ic_flags.getInt();
> + boolean longForm = (flags & ACC_IC_LONG_FORM) != 0;
> +@@ -922,7 +922,7 @@
> +
> + void readLocalInnerClasses(Class cls) throws IOException {
> + int nc = class_InnerClasses_N.getInt();
> +- List<InnerClass> localICs = new ArrayList<>(nc);
> ++ List<InnerClass> localICs = new ArrayList<InnerClass>(nc);
> + for (int i = 0; i < nc; i++) {
> + ClassEntry thisClass = (ClassEntry) class_InnerClasses_RC.getRef();
> + int flags = class_InnerClasses_F.getInt();
> +@@ -1011,7 +1011,7 @@
> + return -1;
> + }
> +
> +- Comparator<Entry> entryOutputOrder = new Comparator<>() {
> ++ Comparator<Entry> entryOutputOrder = new Comparator<Entry>() {
> + public int compare(Entry e0, Entry e1) {
> + int k0 = getOutputIndex(e0);
> + int k1 = getOutputIndex(e1);
> +@@ -1050,7 +1050,7 @@
> +
> + Entry[] reconstructLocalCPMap(Class cls) {
> + Set<Entry> ldcRefs = ldcRefMap.get(cls);
> +- Set<Entry> cpRefs = new HashSet<>();
> ++ Set<Entry> cpRefs = new HashSet<Entry>();
> +
> + // look for constant pool entries:
> + cls.visitRefs(VRM_CLASSIC, cpRefs);
> +@@ -1155,7 +1155,7 @@
> + method_descr.expectLength(totalNM);
> + if (verbose > 1) Utils.log.fine("expecting #fields="+totalNF+" and #methods="+totalNM+" in #classes="+numClasses);
> +
> +- List<Class.Field> fields = new ArrayList<>(totalNF);
> ++ List<Class.Field> fields = new ArrayList<Class.Field>(totalNF);
> + field_descr.readFrom(in);
> + for (int i = 0; i < classes.length; i++) {
> + Class c = classes[i];
> +@@ -1171,7 +1171,7 @@
> + countAndReadAttrs(ATTR_CONTEXT_FIELD, fields);
> + fields = null; // release to GC
> +
> +- List<Class.Method> methods = new ArrayList<>(totalNM);
> ++ List<Class.Method> methods = new ArrayList<Class.Method>(totalNM);
> + method_descr.readFrom(in);
> + for (int i = 0; i < classes.length; i++) {
> + Class c = classes[i];
> +@@ -1194,10 +1194,10 @@
> +
> + Code[] allCodes;
> + List<Code> codesWithFlags;
> +- Map<Class, Set<Entry>> ldcRefMap = new HashMap<>();
> ++ Map<Class, Set<Entry>> ldcRefMap = new HashMap<Class, Set<Entry>>();
> +
> + Code[] buildCodeAttrs(List<Class.Method> methods) {
> +- List<Code> codes = new ArrayList<>(methods.size());
> ++ List<Code> codes = new ArrayList<Code>(methods.size());
> + for (Class.Method m : methods) {
> + if (m.getAttribute(attrCodeEmpty) != null) {
> + m.code = new Code(m);
> +@@ -1221,7 +1221,7 @@
> + boolean attrsOK = testBit(archiveOptions, AO_HAVE_ALL_CODE_FLAGS);
> + code_headers.expectLength(allCodes.length);
> + code_headers.readFrom(in);
> +- List<Code> longCodes = new ArrayList<>(allCodes.length / 10);
> ++ List<Code> longCodes = new ArrayList<Code>(allCodes.length / 10);
> + for (int i = 0; i < allCodes.length; i++) {
> + Code c = allCodes[i];
> + int sc = code_headers.getByte();
> +@@ -1460,7 +1460,7 @@
> + bits -= (1L<<ai);
> + nfa += 1;
> + }
> +- List<Attribute> ha = new ArrayList<>(nfa + noa);
> ++ List<Attribute> ha = new ArrayList<Attribute>(nfa + noa);
> + h.attributes = ha;
> + bits = attrBits; // iterate again
> + for (int ai = 0; bits != 0; ai++) {
> +@@ -1584,7 +1584,7 @@
> + @SuppressWarnings("unchecked")
> + void readAttrs(int ctype, Collection holders) throws IOException {
> + // Decode band values into attributes.
> +- Set<Attribute.Layout> sawDefs = new HashSet<>();
> ++ Set<Attribute.Layout> sawDefs = new HashSet<Attribute.Layout>();
> + ByteArrayOutputStream buf = new ByteArrayOutputStream();
> + for (Iterator i = holders.iterator(); i.hasNext(); ) {
> + final Attribute.Holder h = (Attribute.Holder) i.next();
> +@@ -1788,7 +1788,7 @@
> + // scratch buffer for collecting code::
> + byte[] buf = new byte[1<<12];
> + // record of all switch opcodes (these are variable-length)
> +- List<Integer> allSwitchOps = new ArrayList<>();
> ++ List<Integer> allSwitchOps = new ArrayList<Integer>();
> + for (int k = 0; k < allCodes.length; k++) {
> + Code c = allCodes[k];
> + scanOneMethod:
> +@@ -1904,7 +1904,7 @@
> +
> + Set<Entry> ldcRefSet = ldcRefMap.get(curClass);
> + if (ldcRefSet == null)
> +- ldcRefMap.put(curClass, ldcRefSet = new HashSet<>());
> ++ ldcRefMap.put(curClass, ldcRefSet = new HashSet<Entry>());
> +
> + ClassEntry thisClass = curClass.thisClass;
> + ClassEntry superClass = curClass.superClass;
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackageWriter.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PackageWriter.java
> +@@ -116,7 +116,7 @@
> + int[][] attrCounts; // count attr. occurences
> +
> + void setup() {
> +- requiredEntries = new HashSet<>();
> ++ requiredEntries = new HashSet<Entry>();
> + setArchiveOptions();
> + trimClassAttributes();
> + collectAttributeLayouts();
> +@@ -176,7 +176,7 @@
> + }
> + }
> + // Decide on default version number (majority rule).
> +- Map<Integer, int[]> verCounts = new HashMap<>();
> ++ Map<Integer, int[]> verCounts = new HashMap<Integer, int[]>();
> + int bestCount = 0;
> + int bestVersion = -1;
> + for (Class cls : pkg.classes) {
> +@@ -723,7 +723,7 @@
> + @SuppressWarnings("unchecked")
> + void collectAttributeLayouts() {
> + maxFlags = new int[ATTR_CONTEXT_LIMIT];
> +- allLayouts = new FixedList<>(ATTR_CONTEXT_LIMIT);
> ++ allLayouts = new FixedList<Map<Attribute.Layout, int[]>>(ATTR_CONTEXT_LIMIT);
> + for (int i = 0; i < ATTR_CONTEXT_LIMIT; i++) {
> + allLayouts.set(i, new HashMap<Attribute.Layout, int[]>());
> + }
> +@@ -768,7 +768,7 @@
> + }
> + // Collect counts for both predefs. and custom defs.
> + // Decide on custom, local attribute definitions.
> +- backCountTable = new HashMap<>();
> ++ backCountTable = new HashMap<Attribute.Layout, int[]>();
> + attrCounts = new int[ATTR_CONTEXT_LIMIT][];
> + for (int i = 0; i < ATTR_CONTEXT_LIMIT; i++) {
> + // Now the remaining defs in allLayouts[i] need attr. indexes.
> +@@ -785,7 +785,7 @@
> + defMap.entrySet().toArray(layoutsAndCounts);
> + // Sort by count, most frequent first.
> + // Predefs. participate in this sort, though it does not matter.
> +- Arrays.sort(layoutsAndCounts, new Comparator<>() {
> ++ Arrays.sort(layoutsAndCounts, new Comparator() {
> + public int compare(Object o0, Object o1) {
> + Map.Entry e0 = (Map.Entry) o0;
> + Map.Entry e1 = (Map.Entry) o1;
> +@@ -883,7 +883,7 @@
> +
> + @SuppressWarnings("unchecked")
> + void writeAttrDefs() throws IOException {
> +- List<Object[]> defList = new ArrayList<>();
> ++ List<Object[]> defList = new ArrayList<Object[]>();
> + for (int i = 0; i < ATTR_CONTEXT_LIMIT; i++) {
> + int limit = attrDefs.get(i).size();
> + for (int j = 0; j < limit; j++) {
> +@@ -995,7 +995,7 @@
> + void collectInnerClasses() {
> + // Capture inner classes, removing them from individual classes.
> + // Irregular inner classes must stay local, though.
> +- Map<ClassEntry, InnerClass> allICMap = new HashMap<>();
> ++ Map<ClassEntry, InnerClass> allICMap = new HashMap<ClassEntry, InnerClass>();
> + // First, collect a consistent global set.
> + for (Class cls : pkg.classes) {
> + if (!cls.hasInnerClasses()) continue;
> +--- openjdk-boot/jdk/src/share/classes/sun/util/logging/PlatformLogger.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/util/logging/PlatformLogger.java
> +@@ -113,7 +113,7 @@
> +
> + // Table of known loggers. Maps names to PlatformLoggers.
> + private static Map<String,WeakReference<PlatformLogger>> loggers =
> +- new HashMap<>();
> ++ new HashMap<String,WeakReference<PlatformLogger>>();
> +
> + /**
> + * Returns a PlatformLogger of a given name.
> +@@ -126,7 +126,7 @@
> + }
> + if (log == null) {
> + log = new PlatformLogger(name);
> +- loggers.put(name, new WeakReference<>(log));
> ++ loggers.put(name, new WeakReference<PlatformLogger>(log));
> + }
> + return log;
> + }
> +@@ -488,7 +488,7 @@
> + */
> + static class JavaLogger extends LoggerProxy {
> + private static final Map<Integer, Object> levelObjects =
> +- new HashMap<>();
> ++ new HashMap();
> +
> + static {
> + if (LoggingSupport.isAvailable()) {
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/BandStructure.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/BandStructure.java
> +@@ -257,7 +257,7 @@
> + assert(basicCodings[_meta_default] == null);
> + assert(basicCodings[_meta_canon_min] != null);
> + assert(basicCodings[_meta_canon_max] != null);
> +- Map<Coding, Integer> map = new HashMap<>();
> ++ Map<Coding, Integer> map = new HashMap<Coding, Integer>();
> + for (int i = 0; i < basicCodings.length; i++) {
> + Coding c = basicCodings[i];
> + if (c == null) continue;
> +@@ -1050,8 +1050,8 @@
> +
> + // Bootstrap support for CPRefBands. These are needed to record
> + // intended CP indexes, before the CP has been created.
> +- private final List<CPRefBand> allKQBands = new ArrayList<>();
> +- private List<Object[]> needPredefIndex = new ArrayList<>();
> ++ private final List<CPRefBand> allKQBands = new ArrayList<CPRefBand>();
> ++ private List<Object[]> needPredefIndex = new ArrayList<Object[]>();
> +
> +
> + int encodeRef(Entry e, Index ix) {
> +@@ -1686,7 +1686,7 @@
> + protected int attrClassFileVersionMask;
> +
> + // Mapping from Attribute.Layout to Band[] (layout element bands).
> +- protected Map<Attribute.Layout, Band[]> attrBandTable = new HashMap<>();
> ++ protected Map<Attribute.Layout, Band[]> attrBandTable = new HashMap<Attribute.Layout, Band[]>();
> +
> + // Well-known attributes:
> + protected final Attribute.Layout attrCodeEmpty;
> +@@ -1695,16 +1695,16 @@
> + protected final Attribute.Layout attrConstantValue;
> +
> + // Mapping from Attribute.Layout to Integer (inverse of attrDefs)
> +- Map<Attribute.Layout, Integer> attrIndexTable = new HashMap<>();
> ++ Map<Attribute.Layout, Integer> attrIndexTable = new HashMap<Attribute.Layout, Integer>();
> +
> + // Mapping from attribute index (<32 are flag bits) to attributes.
> + protected List<List<Attribute.Layout>> attrDefs =
> +- new FixedList<>(ATTR_CONTEXT_LIMIT);
> ++ new FixedList<List<Attribute.Layout>>(ATTR_CONTEXT_LIMIT);
> + {
> + for (int i = 0; i < ATTR_CONTEXT_LIMIT; i++) {
> + assert(attrIndexLimit[i] == 0);
> + attrIndexLimit[i] = 32; // just for the sake of predefs.
> +- attrDefs.set(i, new ArrayList<>(Collections.nCopies(
> ++ attrDefs.set(i, new ArrayList<Attribute.Layout>(Collections.nCopies(
> + attrIndexLimit[i], (Attribute.Layout)null)));
> +
> + }
> +@@ -1894,7 +1894,7 @@
> +
> + protected List getPredefinedAttrs(int ctype) {
> + assert(attrIndexLimit[ctype] != 0);
> +- List<Attribute.Layout> res = new ArrayList<>(attrIndexLimit[ctype]);
> ++ List<Attribute.Layout> res = new ArrayList<Attribute.Layout>(attrIndexLimit[ctype]);
> + // Remove nulls and non-predefs.
> + for (int ai = 0; ai < attrIndexLimit[ctype]; ai++) {
> + if (testBit(attrDefSeen[ctype], 1L<<ai)) continue;
> +@@ -2518,7 +2518,7 @@
> + // DEBUG ONLY: Record something about the band order.
> + boolean notePrevForAssert(Band b, Band p) {
> + if (prevForAssertMap == null)
> +- prevForAssertMap = new HashMap<>();
> ++ prevForAssertMap = new HashMap<Band, Band>();
> + prevForAssertMap.put(b, p);
> + return true;
> + }
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PropMap.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PropMap.java
> +@@ -48,8 +48,8 @@
> + */
> +
> + final class PropMap implements SortedMap<Object, Object> {
> +- private final TreeMap<Object, Object> theMap = new TreeMap<>();;
> +- private final List<PropertyChangeListener> listenerList = new ArrayList<>(1);
> ++ private final TreeMap<Object, Object> theMap = new TreeMap<Object, Object>();;
> ++ private final List<PropertyChangeListener> listenerList = new ArrayList<PropertyChangeListener>(1);
> +
> + void addListener(PropertyChangeListener listener) {
> + listenerList.add(listener);
> +@@ -144,7 +144,7 @@
> + } catch (IOException ignore) {}
> + }
> +
> +- defaultProps = (new HashMap<>(props)); // shrink to fit
> ++ defaultProps = (new HashMap<Object,Object>(props)); // shrink to fit
> + }
> +
> + PropMap() {
> +@@ -180,7 +180,7 @@
> + // Get sequence of props for "prefix", and "prefix.*".
> + List getProperties(String prefix) {
> + Collection<Object> values = prefixMap(prefix).values();
> +- List<Object> res = new ArrayList<>(values.size());
> ++ List<Object> res = new ArrayList(values.size());
> + res.addAll(values);
> + while (res.remove(null));
> + return res;
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Coding.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Coding.java
> +@@ -402,7 +402,7 @@
> + private static Map<Coding, Coding> codeMap;
> +
> + private static synchronized Coding of(int B, int H, int S, int del) {
> +- if (codeMap == null) codeMap = new HashMap<>();
> ++ if (codeMap == null) codeMap = new HashMap<Coding, Coding>();
> + Coding x0 = new Coding(B, H, S, del);
> + Coding x1 = codeMap.get(x0);
> + if (x1 == null) codeMap.put(x0, x1 = x0);
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PopulationCoding.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/PopulationCoding.java
> +@@ -309,7 +309,7 @@
> + // As each new value is added, we assert that the value
> + // was not already in the set.
> + Set<Integer> uniqueValuesForDebug = null;
> +- assert((uniqueValuesForDebug = new HashSet<>()) != null);
> ++ assert((uniqueValuesForDebug = new HashSet<Integer>()) != null);
> + int fillp = 1;
> + maxForDebug += fillp;
> + int min = Integer.MIN_VALUE; // farthest from the center
> +--- openjdk-boot/jdk/src/share/classes/java/io/DeleteOnExitHook.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/io/DeleteOnExitHook.java
> +@@ -34,7 +34,7 @@
> + */
> +
> + class DeleteOnExitHook {
> +- private static LinkedHashSet<String> files = new LinkedHashSet<>();
> ++ private static LinkedHashSet<String> files = new LinkedHashSet();
> + static {
> + // DeleteOnExitHook must be the last shutdown hook to be invoked.
> + // Application shutdown hooks may add the first file to the
> +@@ -71,7 +71,7 @@
> + files = null;
> + }
> +
> +- ArrayList<String> toBeDeleted = new ArrayList<>(theFiles);
> ++ ArrayList<String> toBeDeleted = new ArrayList(theFiles);
> +
> + // reverse the list to maintain previous jdk deletion order.
> + // Last in first deleted.
> +--- openjdk-boot/jdk/src/share/classes/java/io/File.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/io/File.java
> +@@ -1067,7 +1067,7 @@
> + if ((names == null) || (filter == null)) {
> + return names;
> + }
> +- List<String> v = new ArrayList<>();
> ++ List<String> v = new ArrayList();
> + for (int i = 0 ; i < names.length ; i++) {
> + if (filter.accept(this, names[i])) {
> + v.add(names[i]);
> +@@ -1158,7 +1158,7 @@
> + public File[] listFiles(FilenameFilter filter) {
> + String ss[] = list();
> + if (ss == null) return null;
> +- ArrayList<File> files = new ArrayList<>();
> ++ ArrayList<File> files = new ArrayList();
> + for (String s : ss)
> + if ((filter == null) || filter.accept(this, s))
> + files.add(new File(s, this));
> +@@ -1195,7 +1195,7 @@
> + public File[] listFiles(FileFilter filter) {
> + String ss[] = list();
> + if (ss == null) return null;
> +- ArrayList<File> files = new ArrayList<>();
> ++ ArrayList<File> files = new ArrayList();
> + for (String s : ss) {
> + File f = new File(s, this);
> + if ((filter == null) || filter.accept(f))
> +--- openjdk-boot/jdk/src/share/classes/java/io/FileInputStream.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/io/FileInputStream.java
> +@@ -56,7 +56,7 @@
> + private volatile boolean closed = false;
> +
> + private static final ThreadLocal<Boolean> runningFinalize =
> +- new ThreadLocal<>();
> ++ new ThreadLocal();
> +
> + private static boolean isRunningFinalize() {
> + Boolean val;
> +--- openjdk-boot/jdk/src/share/classes/java/io/FileOutputStream.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/io/FileOutputStream.java
> +@@ -69,7 +69,7 @@
> + private final Object closeLock = new Object();
> + private volatile boolean closed = false;
> + private static final ThreadLocal<Boolean> runningFinalize =
> +- new ThreadLocal<>();
> ++ new ThreadLocal();
> +
> + private static boolean isRunningFinalize() {
> + Boolean val;
> +--- openjdk-boot/jdk/src/share/classes/java/io/FilePermission.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/io/FilePermission.java
> +@@ -725,7 +725,7 @@
> + */
> +
> + public FilePermissionCollection() {
> +- perms = new ArrayList<>();
> ++ perms = new ArrayList();
> + }
> +
> + /**
> +@@ -830,7 +830,7 @@
> + // Don't call out.defaultWriteObject()
> +
> + // Write out Vector
> +- Vector<Permission> permissions = new Vector<>(perms.size());
> ++ Vector<Permission> permissions = new Vector(perms.size());
> + synchronized (this) {
> + permissions.addAll(perms);
> + }
> +@@ -853,7 +853,7 @@
> +
> + // Get the one we want
> + Vector<Permission> permissions = (Vector<Permission>)gfields.get("permissions", null);
> +- perms = new ArrayList<>(permissions.size());
> ++ perms = new ArrayList(permissions.size());
> + perms.addAll(permissions);
> + }
> + }
> +--- openjdk-boot/jdk/src/share/classes/java/io/ObjectInputStream.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/io/ObjectInputStream.java
> +@@ -213,7 +213,7 @@
> +
> + /** table mapping primitive type names to corresponding class objects */
> + private static final HashMap<String, Class<?>> primClasses
> +- = new HashMap<>(8, 1.0F);
> ++ = new HashMap(8, 1.0F);
> + static {
> + primClasses.put("boolean", boolean.class);
> + primClasses.put("byte", byte.class);
> +@@ -229,11 +229,11 @@
> + private static class Caches {
> + /** cache of subclass security audit results */
> + static final ConcurrentMap<WeakClassKey,Boolean> subclassAudits =
> +- new ConcurrentHashMap<>();
> ++ new ConcurrentHashMap();
> +
> + /** queue for WeakReferences to audited subclasses */
> + static final ReferenceQueue<Class<?>> subclassAuditsQueue =
> +- new ReferenceQueue<>();
> ++ new ReferenceQueue();
> + }
> +
> + /** filter stream for handling block data conversion */
> +--- openjdk-boot/jdk/src/share/classes/java/io/ObjectOutputStream.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/io/ObjectOutputStream.java
> +@@ -165,11 +165,11 @@
> + private static class Caches {
> + /** cache of subclass security audit results */
> + static final ConcurrentMap<WeakClassKey,Boolean> subclassAudits =
> +- new ConcurrentHashMap<>();
> ++ new ConcurrentHashMap();
> +
> + /** queue for WeakReferences to audited subclasses */
> + static final ReferenceQueue<Class<?>> subclassAuditsQueue =
> +- new ReferenceQueue<>();
> ++ new ReferenceQueue();
> + }
> +
> + /** filter stream for handling block data conversion */
> +@@ -2413,7 +2413,7 @@
> + private final List<String> stack;
> +
> + DebugTraceInfoStack() {
> +- stack = new ArrayList<>();
> ++ stack = new ArrayList();
> + }
> +
> + /**
> +--- openjdk-boot/jdk/src/share/classes/java/io/ObjectStreamClass.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/io/ObjectStreamClass.java
> +@@ -84,18 +84,18 @@
> + private static class Caches {
> + /** cache mapping local classes -> descriptors */
> + static final ConcurrentMap<WeakClassKey,Reference<?>> localDescs =
> +- new ConcurrentHashMap<>();
> ++ new ConcurrentHashMap();
> +
> + /** cache mapping field group/local desc pairs -> field reflectors */
> + static final ConcurrentMap<FieldReflectorKey,Reference<?>> reflectors =
> +- new ConcurrentHashMap<>();
> ++ new ConcurrentHashMap();
> +
> + /** queue for WeakReferences to local classes */
> + private static final ReferenceQueue<Class<?>> localDescsQueue =
> +- new ReferenceQueue<>();
> ++ new ReferenceQueue();
> + /** queue for WeakReferences to field reflectors keys */
> + private static final ReferenceQueue<Class<?>> reflectorsQueue =
> +- new ReferenceQueue<>();
> ++ new ReferenceQueue();
> + }
> +
> + /** class associated with this descriptor (if any) */
> +@@ -290,7 +290,7 @@
> + EntryFuture future = null;
> + if (entry == null) {
> + EntryFuture newEntry = new EntryFuture();
> +- Reference<?> newRef = new SoftReference<>(newEntry);
> ++ Reference<?> newRef = new SoftReference(newEntry);
> + do {
> + if (ref != null) {
> + Caches.localDescs.remove(key, ref);
> +@@ -329,7 +329,7 @@
> + entry = th;
> + }
> + if (future.set(entry)) {
> +- Caches.localDescs.put(key, new SoftReference<>(entry));
> ++ Caches.localDescs.put(key, new SoftReference(entry));
> + } else {
> + // nested lookup call already set future
> + entry = future.get();
> +@@ -1130,7 +1130,7 @@
> + private ClassDataSlot[] getClassDataLayout0()
> + throws InvalidClassException
> + {
> +- ArrayList<ClassDataSlot> slots = new ArrayList<>();
> ++ ArrayList<ClassDataSlot> slots = new ArrayList();
> + Class<?> start = cl, end = cl;
> +
> + // locate closest non-serializable superclass
> +@@ -1566,7 +1566,7 @@
> +
> + ObjectStreamField[] boundFields =
> + new ObjectStreamField[serialPersistentFields.length];
> +- Set<String> fieldNames = new HashSet<>(serialPersistentFields.length);
> ++ Set<String> fieldNames = new HashSet(serialPersistentFields.length);
> +
> + for (int i = 0; i < serialPersistentFields.length; i++) {
> + ObjectStreamField spf = serialPersistentFields[i];
> +@@ -1604,7 +1604,7 @@
> + */
> + private static ObjectStreamField[] getDefaultSerialFields(Class<?> cl) {
> + Field[] clFields = cl.getDeclaredFields();
> +- ArrayList<ObjectStreamField> list = new ArrayList<>();
> ++ ArrayList<ObjectStreamField> list = new ArrayList();
> + int mask = Modifier.STATIC | Modifier.TRANSIENT;
> +
> + for (int i = 0; i < clFields.length; i++) {
> +@@ -1855,8 +1855,8 @@
> + writeKeys = new long[nfields];
> + offsets = new int[nfields];
> + typeCodes = new char[nfields];
> +- ArrayList<Class<?>> typeList = new ArrayList<>();
> +- Set<Long> usedKeys = new HashSet<>();
> ++ ArrayList<Class<?>> typeList = new ArrayList();
> ++ Set<Long> usedKeys = new HashSet();
> +
> +
> + for (int i = 0; i < nfields; i++) {
> +@@ -2092,7 +2092,7 @@
> + EntryFuture future = null;
> + if (entry == null) {
> + EntryFuture newEntry = new EntryFuture();
> +- Reference<?> newRef = new SoftReference<>(newEntry);
> ++ Reference<?> newRef = new SoftReference(newEntry);
> + do {
> + if (ref != null) {
> + Caches.reflectors.remove(key, ref);
> +@@ -2118,7 +2118,7 @@
> + entry = th;
> + }
> + future.set(entry);
> +- Caches.reflectors.put(key, new SoftReference<>(entry));
> ++ Caches.reflectors.put(key, new SoftReference(entry));
> + }
> +
> + if (entry instanceof FieldReflector) {
> +--- openjdk-boot/jdk/src/share/classes/java/lang/ApplicationShutdownHooks.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/ApplicationShutdownHooks.java
> +@@ -47,7 +47,7 @@
> + }
> + }
> + );
> +- hooks = new IdentityHashMap<>();
> ++ hooks = new IdentityHashMap();
> + } catch (IllegalStateException e) {
> + // application shutdown hooks cannot be added if
> + // shutdown is in progress.
> +--- openjdk-boot/jdk/src/share/classes/java/lang/Class.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/Class.java
> +@@ -1306,7 +1306,7 @@
> + return java.security.AccessController.doPrivileged(
> + new java.security.PrivilegedAction<Class<?>[]>() {
> + public Class[] run() {
> +- List<Class<?>> list = new ArrayList<>();
> ++ List<Class<?>> list = new ArrayList();
> + Class<?> currentClass = Class.this;
> + while (currentClass != null) {
> + Class<?>[] members = currentClass.getDeclaredClasses();
> +@@ -2306,9 +2306,9 @@
> + res = Reflection.filterFields(this, getDeclaredFields0(publicOnly));
> + if (useCaches) {
> + if (publicOnly) {
> +- declaredPublicFields = new SoftReference<>(res);
> ++ declaredPublicFields = new SoftReference(res);
> + } else {
> +- declaredFields = new SoftReference<>(res);
> ++ declaredFields = new SoftReference(res);
> + }
> + }
> + return res;
> +@@ -2330,9 +2330,9 @@
> +
> + // No cached value available; compute value recursively.
> + // Traverse in correct order for getField().
> +- List<Field> fields = new ArrayList<>();
> ++ List<Field> fields = new ArrayList();
> + if (traversedInterfaces == null) {
> +- traversedInterfaces = new HashSet<>();
> ++ traversedInterfaces = new HashSet();
> + }
> +
> + // Local fields
> +@@ -2358,7 +2358,7 @@
> + res = new Field[fields.size()];
> + fields.toArray(res);
> + if (useCaches) {
> +- publicFields = new SoftReference<>(res);
> ++ publicFields = new SoftReference(res);
> + }
> + return res;
> + }
> +@@ -2403,9 +2403,9 @@
> + }
> + if (useCaches) {
> + if (publicOnly) {
> +- publicConstructors = new SoftReference<>(res);
> ++ publicConstructors = new SoftReference(res);
> + } else {
> +- declaredConstructors = new SoftReference<>(res);
> ++ declaredConstructors = new SoftReference(res);
> + }
> + }
> + return res;
> +@@ -2440,9 +2440,9 @@
> + res = Reflection.filterMethods(this, getDeclaredMethods0(publicOnly));
> + if (useCaches) {
> + if (publicOnly) {
> +- declaredPublicMethods = new SoftReference<>(res);
> ++ declaredPublicMethods = new SoftReference(res);
> + } else {
> +- declaredMethods = new SoftReference<>(res);
> ++ declaredMethods = new SoftReference(res);
> + }
> + }
> + return res;
> +@@ -2598,7 +2598,7 @@
> + methods.compactAndTrim();
> + res = methods.getArray();
> + if (useCaches) {
> +- publicMethods = new SoftReference<>(res);
> ++ publicMethods = new SoftReference(res);
> + }
> + return res;
> + }
> +@@ -2977,7 +2977,7 @@
> + if (universe == null)
> + throw new IllegalArgumentException(
> + getName() + " is not an enum type");
> +- Map<String, T> m = new HashMap<>(2 * universe.length);
> ++ Map<String, T> m = new HashMap(2 * universe.length);
> + for (T constant : universe)
> + m.put(((Enum<?>)constant).name(), constant);
> + enumConstantDirectory = m;
> +@@ -3090,7 +3090,7 @@
> + if (superClass == null) {
> + annotations = declaredAnnotations;
> + } else {
> +- annotations = new HashMap<>();
> ++ annotations = new HashMap();
> + superClass.initAnnotationsIfNecessary();
> + for (Map.Entry<Class<? extends Annotation>, Annotation> e : superClass.annotations.entrySet()) {
> + Class<? extends Annotation> annotationClass = e.getKey();
> +--- openjdk-boot/jdk/src/share/classes/java/lang/ClassLoader.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/ClassLoader.java
> +@@ -247,7 +247,7 @@
> +
> + // The classes loaded by this class loader. The only purpose of this table
> + // is to keep the classes from being GC'ed until the loader is GC'ed.
> +- private final Vector<Class<?>> classes = new Vector<>();
> ++ private final Vector<Class<?>> classes = new Vector();
> +
> + // The "default" domain. Set as the default ProtectionDomain on newly
> + // created classes.
> +@@ -266,7 +266,7 @@
> + // The packages defined in this class loader. Each package name is mapped
> + // to its corresponding Package object.
> + // @GuardedBy("itself")
> +- private final HashMap<String, Package> packages = new HashMap<>();
> ++ private final HashMap<String, Package> packages = new HashMap();
> +
> + private static Void checkCreateClassLoader() {
> + SecurityManager security = System.getSecurityManager();
> +@@ -279,16 +279,16 @@
> + private ClassLoader(Void unused, ClassLoader parent) {
> + this.parent = parent;
> + if (ParallelLoaders.isRegistered(this.getClass())) {
> +- parallelLockMap = new ConcurrentHashMap<>();
> +- package2certs = new ConcurrentHashMap<>();
> ++ parallelLockMap = new ConcurrentHashMap();
> ++ package2certs = new ConcurrentHashMap();
> + domains =
> + Collections.synchronizedSet(new HashSet<ProtectionDomain>());
> + assertionLock = new Object();
> + } else {
> + // no finer-grained lock; lock on the classloader instance
> + parallelLockMap = null;
> +- package2certs = new Hashtable<>();
> +- domains = new HashSet<>();
> ++ package2certs = new Hashtable();
> ++ domains = new HashSet();
> + assertionLock = this;
> + }
> + }
> +@@ -1181,7 +1181,7 @@
> + }
> + tmp[1] = findResources(name);
> +
> +- return new CompoundEnumeration<>(tmp);
> ++ return new CompoundEnumeration(tmp);
> + }
> +
> + /**
> +@@ -1656,7 +1656,7 @@
> + protected Package[] getPackages() {
> + Map<String, Package> map;
> + synchronized (packages) {
> +- map = new HashMap<>(packages);
> ++ map = new HashMap(packages);
> + }
> + Package[] pkgs;
> + if (parent != null) {
> +@@ -1763,17 +1763,17 @@
> + }
> +
> + // All native library names we've loaded.
> +- private static Vector<String> loadedLibraryNames = new Vector<>();
> ++ private static Vector<String> loadedLibraryNames = new Vector();
> +
> + // Native libraries belonging to system classes.
> + private static Vector<NativeLibrary> systemNativeLibraries
> +- = new Vector<>();
> ++ = new Vector();
> +
> + // Native libraries associated with the class loader.
> +- private Vector<NativeLibrary> nativeLibraries = new Vector<>();
> ++ private Vector<NativeLibrary> nativeLibraries = new Vector();
> +
> + // native libraries being loaded/unloaded.
> +- private static Stack<NativeLibrary> nativeLibraryContext = new Stack<>();
> ++ private static Stack<NativeLibrary> nativeLibraryContext = new Stack();
> +
> + // The paths searched for libraries
> + private static String usr_paths[];
> +@@ -2097,8 +2097,8 @@
> + * them to empty maps, effectively ignoring any present settings.
> + */
> + synchronized (assertionLock) {
> +- classAssertionStatus = new HashMap<>();
> +- packageAssertionStatus = new HashMap<>();
> ++ classAssertionStatus = new HashMap();
> ++ packageAssertionStatus = new HashMap();
> + defaultAssertionStatus = false;
> + }
> + }
> +@@ -2160,8 +2160,8 @@
> + private void initializeJavaAssertionMaps() {
> + // assert Thread.holdsLock(assertionLock);
> +
> +- classAssertionStatus = new HashMap<>();
> +- packageAssertionStatus = new HashMap<>();
> ++ classAssertionStatus = new HashMap();
> ++ packageAssertionStatus = new HashMap();
> + AssertionStatusDirectives directives = retrieveDirectives();
> +
> + for(int i = 0; i < directives.classes.length; i++)
> +--- openjdk-boot/jdk/src/share/classes/java/lang/String.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/String.java
> +@@ -2330,7 +2330,7 @@
> + int off = 0;
> + int next = 0;
> + boolean limited = limit > 0;
> +- ArrayList<String> list = new ArrayList<>();
> ++ ArrayList<String> list = new ArrayList();
> + while ((next = indexOf(ch, off)) != -1) {
> + if (!limited || list.size() < limit - 1) {
> + list.add(substring(off, next));
> +--- openjdk-boot/jdk/src/share/classes/java/lang/StringCoding.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/StringCoding.java
> +@@ -53,9 +53,9 @@
> +
> + /** The cached coders for each thread */
> + private final static ThreadLocal<SoftReference<StringDecoder>> decoder =
> +- new ThreadLocal<>();
> ++ new ThreadLocal();
> + private final static ThreadLocal<SoftReference<StringEncoder>> encoder =
> +- new ThreadLocal<>();
> ++ new ThreadLocal();
> +
> + private static boolean warnUnsupportedCharset = true;
> +
> +@@ -67,7 +67,7 @@
> + }
> +
> + private static <T> void set(ThreadLocal<SoftReference<T>> tl, T ob) {
> +- tl.set(new SoftReference<>(ob));
> ++ tl.set(new SoftReference(ob));
> + }
> +
> + // Trim the given byte array to the given length
> +--- openjdk-boot/jdk/src/share/classes/java/lang/Thread.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/Thread.java
> +@@ -1642,7 +1642,7 @@
> + // Get a snapshot of the list of all threads
> + Thread[] threads = getThreads();
> + StackTraceElement[][] traces = dumpThreads(threads);
> +- Map<Thread, StackTraceElement[]> m = new HashMap<>(threads.length);
> ++ Map<Thread, StackTraceElement[]> m = new HashMap(threads.length);
> + for (int i = 0; i < threads.length; i++) {
> + StackTraceElement[] stackTrace = traces[i];
> + if (stackTrace != null) {
> +@@ -1663,11 +1663,11 @@
> + private static class Caches {
> + /** cache of subclass security audit results */
> + static final ConcurrentMap<WeakClassKey,Boolean> subclassAudits =
> +- new ConcurrentHashMap<>();
> ++ new ConcurrentHashMap();
> +
> + /** queue for WeakReferences to audited subclasses */
> + static final ReferenceQueue<Class<?>> subclassAuditsQueue =
> +- new ReferenceQueue<>();
> ++ new ReferenceQueue();
> + }
> +
> + /**
> +--- openjdk-boot/jdk/src/share/classes/java/lang/management/ManagementFactory.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/management/ManagementFactory.java
> +@@ -794,7 +794,7 @@
> + */
> + public static List<Class<? extends PlatformManagedObject>> getAllPlatformMXBeanInterfaces() {
> + List<Class<? extends PlatformManagedObject>> result =
> +- new ArrayList<>();
> ++ new ArrayList();
> + for (PlatformComponent component: PlatformComponent.values()) {
> + result.add(component.getMXBeanInterface());
> + }
> +--- openjdk-boot/jdk/src/share/classes/java/lang/management/PlatformComponent.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/management/PlatformComponent.java
> +@@ -267,7 +267,7 @@
> + List<T> getGcMXBeanList(Class<T> gcMXBeanIntf) {
> + List<GarbageCollectorMXBean> list =
> + ManagementFactoryHelper.getGarbageCollectorMXBeans();
> +- List<T> result = new ArrayList<>(list.size());
> ++ List<T> result = new ArrayList(list.size());
> + for (GarbageCollectorMXBean m : list) {
> + if (gcMXBeanIntf.isInstance(m)) {
> + result.add(gcMXBeanIntf.cast(m));
> +@@ -330,7 +330,7 @@
> + }
> +
> + private static Set<String> keyProperties(String... keyNames) {
> +- Set<String> set = new HashSet<>();
> ++ Set<String> set = new HashSet();
> + set.add("type");
> + for (String s : keyNames) {
> + set.add(s);
> +@@ -364,7 +364,7 @@
> + List<T> getMXBeans(MBeanServerConnection mbs, Class<T> mxbeanInterface)
> + throws java.io.IOException
> + {
> +- List<T> result = new ArrayList<>();
> ++ List<T> result = new ArrayList();
> + for (ObjectName on : getObjectNames(mbs)) {
> + result.add(ManagementFactory.
> + newPlatformMXBeanProxy(mbs,
> +--- openjdk-boot/jdk/src/share/classes/java/lang/reflect/Proxy.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/reflect/Proxy.java
> +@@ -232,7 +232,7 @@
> +
> + /** maps a class loader to the proxy class cache for that loader */
> + private static Map<ClassLoader, Map<List<String>, Object>> loaderToCache
> +- = new WeakHashMap<>();
> ++ = new WeakHashMap();
> +
> + /** marks that a particular proxy class is currently being generated */
> + private static Object pendingGenerationMarker = new Object();
> +@@ -356,7 +356,7 @@
> + String[] interfaceNames = new String[interfaces.length];
> +
> + // for detecting duplicates
> +- Set<Class<?>> interfaceSet = new HashSet<>();
> ++ Set<Class<?>> interfaceSet = new HashSet();
> +
> + for (int i = 0; i < interfaces.length; i++) {
> + /*
> +@@ -413,7 +413,7 @@
> + synchronized (loaderToCache) {
> + cache = loaderToCache.get(loader);
> + if (cache == null) {
> +- cache = new HashMap<>();
> ++ cache = new HashMap();
> + loaderToCache.put(loader, cache);
> + }
> + /*
> +--- openjdk-boot/jdk/src/share/classes/java/sql/DriverManager.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/sql/DriverManager.java
> +@@ -364,7 +364,7 @@
> + * @return the list of JDBC Drivers loaded by the caller's class loader
> + */
> + public static java.util.Enumeration<Driver> getDrivers() {
> +- java.util.Vector<Driver> result = new java.util.Vector<>();
> ++ java.util.Vector<Driver> result = new java.util.Vector();
> + java.util.Vector drivers = null;
> +
> + if (!initialized) {
> +--- openjdk-boot/jdk/src/share/classes/java/util/Collections.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/Collections.java
> +@@ -1035,7 +1035,7 @@
> + * @return an unmodifiable view of the specified collection.
> + */
> + public static <T> Collection<T> unmodifiableCollection(Collection<? extends T> c) {
> +- return new UnmodifiableCollection<>(c);
> ++ return new UnmodifiableCollection(c);
> + }
> +
> + /**
> +@@ -1109,7 +1109,7 @@
> + * @return an unmodifiable view of the specified set.
> + */
> + public static <T> Set<T> unmodifiableSet(Set<? extends T> s) {
> +- return new UnmodifiableSet<>(s);
> ++ return new UnmodifiableSet(s);
> + }
> +
> + /**
> +@@ -1141,7 +1141,7 @@
> + * @return an unmodifiable view of the specified sorted set.
> + */
> + public static <T> SortedSet<T> unmodifiableSortedSet(SortedSet<T> s) {
> +- return new UnmodifiableSortedSet<>(s);
> ++ return new UnmodifiableSortedSet(s);
> + }
> +
> + /**
> +@@ -1158,13 +1158,13 @@
> + public Comparator<? super E> comparator() {return ss.comparator();}
> +
> + public SortedSet<E> subSet(E fromElement, E toElement) {
> +- return new UnmodifiableSortedSet<>(ss.subSet(fromElement,toElement));
> ++ return new UnmodifiableSortedSet(ss.subSet(fromElement,toElement));
> + }
> + public SortedSet<E> headSet(E toElement) {
> +- return new UnmodifiableSortedSet<>(ss.headSet(toElement));
> ++ return new UnmodifiableSortedSet(ss.headSet(toElement));
> + }
> + public SortedSet<E> tailSet(E fromElement) {
> +- return new UnmodifiableSortedSet<>(ss.tailSet(fromElement));
> ++ return new UnmodifiableSortedSet(ss.tailSet(fromElement));
> + }
> +
> + public E first() {return ss.first();}
> +@@ -1188,8 +1188,8 @@
> + */
> + public static <T> List<T> unmodifiableList(List<? extends T> list) {
> + return (list instanceof RandomAccess ?
> +- new UnmodifiableRandomAccessList<>(list) :
> +- new UnmodifiableList<>(list));
> ++ new UnmodifiableRandomAccessList(list) :
> ++ new UnmodifiableList(list));
> + }
> +
> + /**
> +@@ -1250,7 +1250,7 @@
> + }
> +
> + public List<E> subList(int fromIndex, int toIndex) {
> +- return new UnmodifiableList<>(list.subList(fromIndex, toIndex));
> ++ return new UnmodifiableList(list.subList(fromIndex, toIndex));
> + }
> +
> + /**
> +@@ -1267,7 +1267,7 @@
> + */
> + private Object readResolve() {
> + return (list instanceof RandomAccess
> +- ? new UnmodifiableRandomAccessList<>(list)
> ++ ? new UnmodifiableRandomAccessList(list)
> + : this);
> + }
> + }
> +@@ -1283,7 +1283,7 @@
> + }
> +
> + public List<E> subList(int fromIndex, int toIndex) {
> +- return new UnmodifiableRandomAccessList<>(
> ++ return new UnmodifiableRandomAccessList(
> + list.subList(fromIndex, toIndex));
> + }
> +
> +@@ -1296,7 +1296,7 @@
> + * deserialization.
> + */
> + private Object writeReplace() {
> +- return new UnmodifiableList<>(list);
> ++ return new UnmodifiableList(list);
> + }
> + }
> +
> +@@ -1315,7 +1315,7 @@
> + * @return an unmodifiable view of the specified map.
> + */
> + public static <K,V> Map<K,V> unmodifiableMap(Map<? extends K, ? extends V> m) {
> +- return new UnmodifiableMap<>(m);
> ++ return new UnmodifiableMap(m);
> + }
> +
> + /**
> +@@ -1363,7 +1363,7 @@
> +
> + public Set<Map.Entry<K,V>> entrySet() {
> + if (entrySet==null)
> +- entrySet = new UnmodifiableEntrySet<>(m.entrySet());
> ++ entrySet = new UnmodifiableEntrySet(m.entrySet());
> + return entrySet;
> + }
> +
> +@@ -1400,7 +1400,7 @@
> + return i.hasNext();
> + }
> + public Map.Entry<K,V> next() {
> +- return new UnmodifiableEntry<>(i.next());
> ++ return new UnmodifiableEntry(i.next());
> + }
> + public void remove() {
> + throw new UnsupportedOperationException();
> +@@ -1411,7 +1411,7 @@
> + public Object[] toArray() {
> + Object[] a = c.toArray();
> + for (int i=0; i<a.length; i++)
> +- a[i] = new UnmodifiableEntry<>((Map.Entry<K,V>)a[i]);
> ++ a[i] = new UnmodifiableEntry((Map.Entry<K,V>)a[i]);
> + return a;
> + }
> +
> +@@ -1422,7 +1422,7 @@
> + Object[] arr = c.toArray(a.length==0 ? a : Arrays.copyOf(a, 0));
> +
> + for (int i=0; i<arr.length; i++)
> +- arr[i] = new UnmodifiableEntry<>((Map.Entry<K,V>)arr[i]);
> ++ arr[i] = new UnmodifiableEntry((Map.Entry<K,V>)arr[i]);
> +
> + if (arr.length > a.length)
> + return (T[])arr;
> +@@ -1443,7 +1443,7 @@
> + if (!(o instanceof Map.Entry))
> + return false;
> + return c.contains(
> +- new UnmodifiableEntry<>((Map.Entry<?,?>) o));
> ++ new UnmodifiableEntry((Map.Entry<?,?>) o));
> + }
> +
> + /**
> +@@ -1517,7 +1517,7 @@
> + * @return an unmodifiable view of the specified sorted map.
> + */
> + public static <K,V> SortedMap<K,V> unmodifiableSortedMap(SortedMap<K, ? extends V> m) {
> +- return new UnmodifiableSortedMap<>(m);
> ++ return new UnmodifiableSortedMap(m);
> + }
> +
> + /**
> +@@ -1535,13 +1535,13 @@
> + public Comparator<? super K> comparator() {return sm.comparator();}
> +
> + public SortedMap<K,V> subMap(K fromKey, K toKey) {
> +- return new UnmodifiableSortedMap<>(sm.subMap(fromKey, toKey));
> ++ return new UnmodifiableSortedMap(sm.subMap(fromKey, toKey));
> + }
> + public SortedMap<K,V> headMap(K toKey) {
> +- return new UnmodifiableSortedMap<>(sm.headMap(toKey));
> ++ return new UnmodifiableSortedMap(sm.headMap(toKey));
> + }
> + public SortedMap<K,V> tailMap(K fromKey) {
> +- return new UnmodifiableSortedMap<>(sm.tailMap(fromKey));
> ++ return new UnmodifiableSortedMap(sm.tailMap(fromKey));
> + }
> +
> + public K firstKey() {return sm.firstKey();}
> +@@ -1583,11 +1583,11 @@
> + * @return a synchronized view of the specified collection.
> + */
> + public static <T> Collection<T> synchronizedCollection(Collection<T> c) {
> +- return new SynchronizedCollection<>(c);
> ++ return new SynchronizedCollection(c);
> + }
> +
> + static <T> Collection<T> synchronizedCollection(Collection<T> c, Object mutex) {
> +- return new SynchronizedCollection<>(c, mutex);
> ++ return new SynchronizedCollection(c, mutex);
> + }
> +
> + /**
> +@@ -1686,11 +1686,11 @@
> + * @return a synchronized view of the specified set.
> + */
> + public static <T> Set<T> synchronizedSet(Set<T> s) {
> +- return new SynchronizedSet<>(s);
> ++ return new SynchronizedSet(s);
> + }
> +
> + static <T> Set<T> synchronizedSet(Set<T> s, Object mutex) {
> +- return new SynchronizedSet<>(s, mutex);
> ++ return new SynchronizedSet(s, mutex);
> + }
> +
> + /**
> +@@ -1754,7 +1754,7 @@
> + * @return a synchronized view of the specified sorted set.
> + */
> + public static <T> SortedSet<T> synchronizedSortedSet(SortedSet<T> s) {
> +- return new SynchronizedSortedSet<>(s);
> ++ return new SynchronizedSortedSet(s);
> + }
> +
> + /**
> +@@ -1783,18 +1783,18 @@
> +
> + public SortedSet<E> subSet(E fromElement, E toElement) {
> + synchronized (mutex) {
> +- return new SynchronizedSortedSet<>(
> ++ return new SynchronizedSortedSet(
> + ss.subSet(fromElement, toElement), mutex);
> + }
> + }
> + public SortedSet<E> headSet(E toElement) {
> + synchronized (mutex) {
> +- return new SynchronizedSortedSet<>(ss.headSet(toElement), mutex);
> ++ return new SynchronizedSortedSet(ss.headSet(toElement), mutex);
> + }
> + }
> + public SortedSet<E> tailSet(E fromElement) {
> + synchronized (mutex) {
> +- return new SynchronizedSortedSet<>(ss.tailSet(fromElement),mutex);
> ++ return new SynchronizedSortedSet(ss.tailSet(fromElement),mutex);
> + }
> + }
> +
> +@@ -1833,14 +1833,14 @@
> + */
> + public static <T> List<T> synchronizedList(List<T> list) {
> + return (list instanceof RandomAccess ?
> +- new SynchronizedRandomAccessList<>(list) :
> +- new SynchronizedList<>(list));
> ++ new SynchronizedRandomAccessList(list) :
> ++ new SynchronizedList(list));
> + }
> +
> + static <T> List<T> synchronizedList(List<T> list, Object mutex) {
> + return (list instanceof RandomAccess ?
> +- new SynchronizedRandomAccessList<>(list, mutex) :
> +- new SynchronizedList<>(list, mutex));
> ++ new SynchronizedRandomAccessList(list, mutex) :
> ++ new SynchronizedList(list, mutex));
> + }
> +
> + /**
> +@@ -1903,7 +1903,7 @@
> +
> + public List<E> subList(int fromIndex, int toIndex) {
> + synchronized (mutex) {
> +- return new SynchronizedList<>(list.subList(fromIndex, toIndex),
> ++ return new SynchronizedList(list.subList(fromIndex, toIndex),
> + mutex);
> + }
> + }
> +@@ -1922,7 +1922,7 @@
> + */
> + private Object readResolve() {
> + return (list instanceof RandomAccess
> +- ? new SynchronizedRandomAccessList<>(list)
> ++ ? new SynchronizedRandomAccessList(list)
> + : this);
> + }
> + }
> +@@ -1944,7 +1944,7 @@
> +
> + public List<E> subList(int fromIndex, int toIndex) {
> + synchronized (mutex) {
> +- return new SynchronizedRandomAccessList<>(
> ++ return new SynchronizedRandomAccessList(
> + list.subList(fromIndex, toIndex), mutex);
> + }
> + }
> +@@ -1958,7 +1958,7 @@
> + * deserialization.
> + */
> + private Object writeReplace() {
> +- return new SynchronizedList<>(list);
> ++ return new SynchronizedList(list);
> + }
> + }
> +
> +@@ -1990,7 +1990,7 @@
> + * @return a synchronized view of the specified map.
> + */
> + public static <K,V> Map<K,V> synchronizedMap(Map<K,V> m) {
> +- return new SynchronizedMap<>(m);
> ++ return new SynchronizedMap(m);
> + }
> +
> + /**
> +@@ -2051,7 +2051,7 @@
> + public Set<K> keySet() {
> + synchronized (mutex) {
> + if (keySet==null)
> +- keySet = new SynchronizedSet<>(m.keySet(), mutex);
> ++ keySet = new SynchronizedSet(m.keySet(), mutex);
> + return keySet;
> + }
> + }
> +@@ -2059,7 +2059,7 @@
> + public Set<Map.Entry<K,V>> entrySet() {
> + synchronized (mutex) {
> + if (entrySet==null)
> +- entrySet = new SynchronizedSet<>(m.entrySet(), mutex);
> ++ entrySet = new SynchronizedSet(m.entrySet(), mutex);
> + return entrySet;
> + }
> + }
> +@@ -2067,7 +2067,7 @@
> + public Collection<V> values() {
> + synchronized (mutex) {
> + if (values==null)
> +- values = new SynchronizedCollection<>(m.values(), mutex);
> ++ values = new SynchronizedCollection(m.values(), mutex);
> + return values;
> + }
> + }
> +@@ -2129,7 +2129,7 @@
> + * @return a synchronized view of the specified sorted map.
> + */
> + public static <K,V> SortedMap<K,V> synchronizedSortedMap(SortedMap<K,V> m) {
> +- return new SynchronizedSortedMap<>(m);
> ++ return new SynchronizedSortedMap(m);
> + }
> +
> +
> +@@ -2159,18 +2159,18 @@
> +
> + public SortedMap<K,V> subMap(K fromKey, K toKey) {
> + synchronized (mutex) {
> +- return new SynchronizedSortedMap<>(
> ++ return new SynchronizedSortedMap(
> + sm.subMap(fromKey, toKey), mutex);
> + }
> + }
> + public SortedMap<K,V> headMap(K toKey) {
> + synchronized (mutex) {
> +- return new SynchronizedSortedMap<>(sm.headMap(toKey), mutex);
> ++ return new SynchronizedSortedMap(sm.headMap(toKey), mutex);
> + }
> + }
> + public SortedMap<K,V> tailMap(K fromKey) {
> + synchronized (mutex) {
> +- return new SynchronizedSortedMap<>(sm.tailMap(fromKey),mutex);
> ++ return new SynchronizedSortedMap(sm.tailMap(fromKey),mutex);
> + }
> + }
> +
> +@@ -2246,7 +2246,7 @@
> + */
> + public static <E> Collection<E> checkedCollection(Collection<E> c,
> + Class<E> type) {
> +- return new CheckedCollection<>(c, type);
> ++ return new CheckedCollection(c, type);
> + }
> +
> + @SuppressWarnings("unchecked")
> +@@ -2378,7 +2378,7 @@
> + * @since 1.5
> + */
> + public static <E> Set<E> checkedSet(Set<E> s, Class<E> type) {
> +- return new CheckedSet<>(s, type);
> ++ return new CheckedSet(s, type);
> + }
> +
> + /**
> +@@ -2424,7 +2424,7 @@
> + */
> + public static <E> SortedSet<E> checkedSortedSet(SortedSet<E> s,
> + Class<E> type) {
> +- return new CheckedSortedSet<>(s, type);
> ++ return new CheckedSortedSet(s, type);
> + }
> +
> + /**
> +@@ -2484,8 +2484,8 @@
> + */
> + public static <E> List<E> checkedList(List<E> list, Class<E> type) {
> + return (list instanceof RandomAccess ?
> +- new CheckedRandomAccessList<>(list, type) :
> +- new CheckedList<>(list, type));
> ++ new CheckedRandomAccessList(list, type) :
> ++ new CheckedList(list, type));
> + }
> +
> + /**
> +@@ -2550,7 +2550,7 @@
> + }
> +
> + public List<E> subList(int fromIndex, int toIndex) {
> +- return new CheckedList<>(list.subList(fromIndex, toIndex), type);
> ++ return new CheckedList(list.subList(fromIndex, toIndex), type);
> + }
> + }
> +
> +@@ -2567,7 +2567,7 @@
> + }
> +
> + public List<E> subList(int fromIndex, int toIndex) {
> +- return new CheckedRandomAccessList<>(
> ++ return new CheckedRandomAccessList(
> + list.subList(fromIndex, toIndex), type);
> + }
> + }
> +@@ -2609,7 +2609,7 @@
> + public static <K, V> Map<K, V> checkedMap(Map<K, V> m,
> + Class<K> keyType,
> + Class<V> valueType) {
> +- return new CheckedMap<>(m, keyType, valueType);
> ++ return new CheckedMap(m, keyType, valueType);
> + }
> +
> +
> +@@ -2677,14 +2677,14 @@
> + // - protection from malicious t
> + // - correct behavior if t is a concurrent map
> + Object[] entries = t.entrySet().toArray();
> +- List<Map.Entry<K,V>> checked = new ArrayList<>(entries.length);
> ++ List<Map.Entry<K,V>> checked = new ArrayList(entries.length);
> + for (Object o : entries) {
> + Map.Entry<?,?> e = (Map.Entry<?,?>) o;
> + Object k = e.getKey();
> + Object v = e.getValue();
> + typeCheck(k, v);
> + checked.add(
> +- new AbstractMap.SimpleImmutableEntry<>((K) k, (V) v));
> ++ new AbstractMap.SimpleImmutableEntry((K) k, (V) v));
> + }
> + for (Map.Entry<K,V> e : checked)
> + m.put(e.getKey(), e.getValue());
> +@@ -2694,7 +2694,7 @@
> +
> + public Set<Map.Entry<K,V>> entrySet() {
> + if (entrySet==null)
> +- entrySet = new CheckedEntrySet<>(m.entrySet(), valueType);
> ++ entrySet = new CheckedEntrySet(m.entrySet(), valueType);
> + return entrySet;
> + }
> +
> +@@ -2809,7 +2809,7 @@
> + if (!(o instanceof Map.Entry))
> + return false;
> + return s.remove(new AbstractMap.SimpleImmutableEntry
> +- <>((Map.Entry<?,?>)o));
> ++ ((Map.Entry<?,?>)o));
> + }
> +
> + public boolean removeAll(Collection<?> c) {
> +@@ -2842,7 +2842,7 @@
> +
> + static <K,V,T> CheckedEntry<K,V,T> checkedEntry(Map.Entry<K,V> e,
> + Class<T> valueType) {
> +- return new CheckedEntry<>(e, valueType);
> ++ return new CheckedEntry(e, valueType);
> + }
> +
> + /**
> +@@ -2883,7 +2883,7 @@
> + if (!(o instanceof Map.Entry))
> + return false;
> + return e.equals(new AbstractMap.SimpleImmutableEntry
> +- <>((Map.Entry<?,?>)o));
> ++ ((Map.Entry<?,?>)o));
> + }
> + }
> + }
> +@@ -2926,7 +2926,7 @@
> + public static <K,V> SortedMap<K,V> checkedSortedMap(SortedMap<K, V> m,
> + Class<K> keyType,
> + Class<V> valueType) {
> +- return new CheckedSortedMap<>(m, keyType, valueType);
> ++ return new CheckedSortedMap(m, keyType, valueType);
> + }
> +
> + /**
> +@@ -2992,7 +2992,7 @@
> +
> + private static class EmptyIterator<E> implements Iterator<E> {
> + static final EmptyIterator<Object> EMPTY_ITERATOR
> +- = new EmptyIterator<>();
> ++ = new EmptyIterator();
> +
> + public boolean hasNext() { return false; }
> + public E next() { throw new NoSuchElementException(); }
> +@@ -3041,7 +3041,7 @@
> + implements ListIterator<E>
> + {
> + static final EmptyListIterator<Object> EMPTY_ITERATOR
> +- = new EmptyListIterator<>();
> ++ = new EmptyListIterator();
> +
> + public boolean hasPrevious() { return false; }
> + public E previous() { throw new NoSuchElementException(); }
> +@@ -3077,7 +3077,7 @@
> +
> + private static class EmptyEnumeration<E> implements Enumeration<E> {
> + static final EmptyEnumeration<Object> EMPTY_ENUMERATION
> +- = new EmptyEnumeration<>();
> ++ = new EmptyEnumeration();
> +
> + public boolean hasMoreElements() { return false; }
> + public E nextElement() { throw new NoSuchElementException(); }
> +@@ -3089,7 +3089,7 @@
> + * @see #emptySet()
> + */
> + @SuppressWarnings("unchecked")
> +- public static final Set EMPTY_SET = new EmptySet<>();
> ++ public static final Set EMPTY_SET = new EmptySet();
> +
> + /**
> + * Returns the empty set (immutable). This set is serializable.
> +@@ -3149,7 +3149,7 @@
> + * @see #emptyList()
> + */
> + @SuppressWarnings("unchecked")
> +- public static final List EMPTY_LIST = new EmptyList<>();
> ++ public static final List EMPTY_LIST = new EmptyList();
> +
> + /**
> + * Returns the empty list (immutable). This list is serializable.
> +@@ -3223,7 +3223,7 @@
> + * @since 1.3
> + */
> + @SuppressWarnings("unchecked")
> +- public static final Map EMPTY_MAP = new EmptyMap<>();
> ++ public static final Map EMPTY_MAP = new EmptyMap();
> +
> + /**
> + * Returns the empty map (immutable). This map is serializable.
> +@@ -3285,7 +3285,7 @@
> + * @return an immutable set containing only the specified object.
> + */
> + public static <T> Set<T> singleton(T o) {
> +- return new SingletonSet<>(o);
> ++ return new SingletonSet(o);
> + }
> +
> + static <E> Iterator<E> singletonIterator(final E e) {
> +@@ -3338,7 +3338,7 @@
> + * @since 1.3
> + */
> + public static <T> List<T> singletonList(T o) {
> +- return new SingletonList<>(o);
> ++ return new SingletonList(o);
> + }
> +
> + /**
> +@@ -3380,7 +3380,7 @@
> + * @since 1.3
> + */
> + public static <K,V> Map<K,V> singletonMap(K key, V value) {
> +- return new SingletonMap<>(key, value);
> ++ return new SingletonMap(key, value);
> + }
> +
> + /**
> +@@ -3422,7 +3422,7 @@
> + public Set<Map.Entry<K,V>> entrySet() {
> + if (entrySet==null)
> + entrySet = Collections.<Map.Entry<K,V>>singleton(
> +- new SimpleImmutableEntry<>(k, v));
> ++ new SimpleImmutableEntry(k, v));
> + return entrySet;
> + }
> +
> +@@ -3454,7 +3454,7 @@
> + public static <T> List<T> nCopies(int n, T o) {
> + if (n < 0)
> + throw new IllegalArgumentException("List length = " + n);
> +- return new CopiesList<>(n, o);
> ++ return new CopiesList(n, o);
> + }
> +
> + /**
> +@@ -3528,7 +3528,7 @@
> + if (fromIndex > toIndex)
> + throw new IllegalArgumentException("fromIndex(" + fromIndex +
> + ") > toIndex(" + toIndex + ")");
> +- return new CopiesList<>(toIndex - fromIndex, element);
> ++ return new CopiesList(toIndex - fromIndex, element);
> + }
> + }
> +
> +@@ -3594,7 +3594,7 @@
> + if (cmp instanceof ReverseComparator2)
> + return ((ReverseComparator2<T>)cmp).cmp;
> +
> +- return new ReverseComparator2<>(cmp);
> ++ return new ReverseComparator2(cmp);
> + }
> +
> + /**
> +@@ -3673,7 +3673,7 @@
> + * @see ArrayList
> + */
> + public static <T> ArrayList<T> list(Enumeration<T> e) {
> +- ArrayList<T> l = new ArrayList<>();
> ++ ArrayList<T> l = new ArrayList();
> + while (e.hasMoreElements())
> + l.add(e.nextElement());
> + return l;
> +@@ -3818,7 +3818,7 @@
> + * @since 1.6
> + */
> + public static <E> Set<E> newSetFromMap(Map<E, Boolean> map) {
> +- return new SetFromMap<>(map);
> ++ return new SetFromMap(map);
> + }
> +
> + /**
> +@@ -3882,7 +3882,7 @@
> + * @since 1.6
> + */
> + public static <T> Queue<T> asLifoQueue(Deque<T> deque) {
> +- return new AsLIFOQueue<>(deque);
> ++ return new AsLIFOQueue(deque);
> + }
> +
> + /**
> +--- openjdk-boot/jdk/src/share/classes/java/util/Formatter.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/Formatter.java
> +@@ -2490,7 +2490,7 @@
> + * Finds format specifiers in the format string.
> + */
> + private FormatString[] parse(String s) {
> +- ArrayList<FormatString> al = new ArrayList<>();
> ++ ArrayList<FormatString> al = new ArrayList();
> + Matcher m = fsPattern.matcher(s);
> + for (int i = 0, len = s.length(); i < len; ) {
> + if (m.find(i)) {
> +--- openjdk-boot/jdk/src/share/classes/java/util/HashSet.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/HashSet.java
> +@@ -100,7 +100,7 @@
> + * default initial capacity (16) and load factor (0.75).
> + */
> + public HashSet() {
> +- map = new HashMap<>();
> ++ map = new HashMap();
> + }
> +
> + /**
> +@@ -113,7 +113,7 @@
> + * @throws NullPointerException if the specified collection is null
> + */
> + public HashSet(Collection<? extends E> c) {
> +- map = new HashMap<>(Math.max((int) (c.size()/.75f) + 1, 16));
> ++ map = new HashMap(Math.max((int) (c.size()/.75f) + 1, 16));
> + addAll(c);
> + }
> +
> +@@ -127,7 +127,7 @@
> + * than zero, or if the load factor is nonpositive
> + */
> + public HashSet(int initialCapacity, float loadFactor) {
> +- map = new HashMap<>(initialCapacity, loadFactor);
> ++ map = new HashMap(initialCapacity, loadFactor);
> + }
> +
> + /**
> +@@ -139,7 +139,7 @@
> + * than zero
> + */
> + public HashSet(int initialCapacity) {
> +- map = new HashMap<>(initialCapacity);
> ++ map = new HashMap(initialCapacity);
> + }
> +
> + /**
> +@@ -156,7 +156,7 @@
> + * than zero, or if the load factor is nonpositive
> + */
> + HashSet(int initialCapacity, float loadFactor, boolean dummy) {
> +- map = new LinkedHashMap<>(initialCapacity, loadFactor);
> ++ map = new LinkedHashMap(initialCapacity, loadFactor);
> + }
> +
> + /**
> +--- openjdk-boot/jdk/src/share/classes/java/util/JumboEnumSet.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/JumboEnumSet.java
> +@@ -89,7 +89,7 @@
> + * @return an iterator over the elements contained in this set
> + */
> + public Iterator<E> iterator() {
> +- return new EnumSetIterator<>();
> ++ return new EnumSetIterator();
> + }
> +
> + private class EnumSetIterator<E extends Enum<E>> implements Iterator<E> {
> +--- openjdk-boot/jdk/src/share/classes/java/util/PriorityQueue.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/PriorityQueue.java
> +@@ -538,7 +538,7 @@
> + cursor--;
> + else {
> + if (forgetMeNot == null)
> +- forgetMeNot = new ArrayDeque<>();
> ++ forgetMeNot = new ArrayDeque();
> + forgetMeNot.add(moved);
> + }
> + } else if (lastRetElt != null) {
> +--- openjdk-boot/jdk/src/share/classes/java/util/Properties.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/Properties.java
> +@@ -1011,7 +1011,7 @@
> + * @since 1.6
> + */
> + public Set<String> stringPropertyNames() {
> +- Hashtable<String, String> h = new Hashtable<>();
> ++ Hashtable<String, String> h = new Hashtable();
> + enumerateStringProperties(h);
> + return h.keySet();
> + }
> +--- openjdk-boot/jdk/src/share/classes/java/util/RegularEnumSet.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/RegularEnumSet.java
> +@@ -71,7 +71,7 @@
> + * @return an iterator over the elements contained in this set
> + */
> + public Iterator<E> iterator() {
> +- return new EnumSetIterator<>();
> ++ return new EnumSetIterator();
> + }
> +
> + private class EnumSetIterator<E extends Enum<E>> implements Iterator<E> {
> +--- openjdk-boot/jdk/src/share/classes/java/util/ServiceLoader.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/ServiceLoader.java
> +@@ -191,7 +191,7 @@
> + private ClassLoader loader;
> +
> + // Cached providers, in instantiation order
> +- private LinkedHashMap<String,S> providers = new LinkedHashMap<>();
> ++ private LinkedHashMap<String,S> providers = new LinkedHashMap();
> +
> + // The current lazy-lookup iterator
> + private LazyIterator lookupIterator;
> +@@ -291,7 +291,7 @@
> + {
> + InputStream in = null;
> + BufferedReader r = null;
> +- ArrayList<String> names = new ArrayList<>();
> ++ ArrayList<String> names = new ArrayList();
> + try {
> + in = u.openStream();
> + r = new BufferedReader(new InputStreamReader(in, "utf-8"));
> +@@ -463,7 +463,7 @@
> + public static <S> ServiceLoader<S> load(Class<S> service,
> + ClassLoader loader)
> + {
> +- return new ServiceLoader<>(service, loader);
> ++ return new ServiceLoader(service, loader);
> + }
> +
> + /**
> +--- openjdk-boot/jdk/src/share/classes/java/util/TreeSet.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/TreeSet.java
> +@@ -138,7 +138,7 @@
> + * ordering} of the elements will be used.
> + */
> + public TreeSet(Comparator<? super E> comparator) {
> +- this(new TreeMap<>(comparator));
> ++ this(new TreeMap(comparator));
> + }
> +
> + /**
> +@@ -195,7 +195,7 @@
> + * @since 1.6
> + */
> + public NavigableSet<E> descendingSet() {
> +- return new TreeSet<>(m.descendingMap());
> ++ return new TreeSet(m.descendingMap());
> + }
> +
> + /**
> +@@ -322,7 +322,7 @@
> + */
> + public NavigableSet<E> subSet(E fromElement, boolean fromInclusive,
> + E toElement, boolean toInclusive) {
> +- return new TreeSet<>(m.subMap(fromElement, fromInclusive,
> ++ return new TreeSet(m.subMap(fromElement, fromInclusive,
> + toElement, toInclusive));
> + }
> +
> +@@ -335,7 +335,7 @@
> + * @since 1.6
> + */
> + public NavigableSet<E> headSet(E toElement, boolean inclusive) {
> +- return new TreeSet<>(m.headMap(toElement, inclusive));
> ++ return new TreeSet(m.headMap(toElement, inclusive));
> + }
> +
> + /**
> +@@ -347,7 +347,7 @@
> + * @since 1.6
> + */
> + public NavigableSet<E> tailSet(E fromElement, boolean inclusive) {
> +- return new TreeSet<>(m.tailMap(fromElement, inclusive));
> ++ return new TreeSet(m.tailMap(fromElement, inclusive));
> + }
> +
> + /**
> +@@ -477,7 +477,7 @@
> + throw new InternalError();
> + }
> +
> +- clone.m = new TreeMap<>(m);
> ++ clone.m = new TreeMap(m);
> + return clone;
> + }
> +
> +@@ -524,9 +524,9 @@
> + // Create backing TreeMap
> + TreeMap<E,Object> tm;
> + if (c==null)
> +- tm = new TreeMap<>();
> ++ tm = new TreeMap();
> + else
> +- tm = new TreeMap<>(c);
> ++ tm = new TreeMap(c);
> + m = tm;
> +
> + // Read in size
> +--- openjdk-boot/jdk/src/share/classes/java/util/WeakHashMap.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/WeakHashMap.java
> +@@ -171,7 +171,7 @@
> + /**
> + * Reference queue for cleared WeakEntries
> + */
> +- private final ReferenceQueue<Object> queue = new ReferenceQueue<>();
> ++ private final ReferenceQueue<Object> queue = new ReferenceQueue();
> +
> + /**
> + * The number of times this WeakHashMap has been structurally modified.
> +@@ -439,7 +439,7 @@
> +
> + modCount++;
> + Entry<K,V> e = tab[i];
> +- tab[i] = new Entry<>(k, value, queue, h, e);
> ++ tab[i] = new Entry(k, value, queue, h, e);
> + if (++size >= threshold)
> + resize(tab.length * 2);
> + return null;
> +@@ -955,9 +955,9 @@
> + }
> +
> + private List<Map.Entry<K,V>> deepCopy() {
> +- List<Map.Entry<K,V>> list = new ArrayList<>(size());
> ++ List<Map.Entry<K,V>> list = new ArrayList(size());
> + for (Map.Entry<K,V> e : this)
> +- list.add(new AbstractMap.SimpleEntry<>(e));
> ++ list.add(new AbstractMap.SimpleEntry(e));
> + return list;
> + }
> +
> +--- openjdk-boot/jdk/src/share/classes/java/util/logging/FileHandler.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/logging/FileHandler.java
> +@@ -127,7 +127,7 @@
> + private FileOutputStream lockStream;
> + private File files[];
> + private static final int MAX_LOCKS = 100;
> +- private static java.util.HashMap<String, String> locks = new java.util.HashMap<>();
> ++ private static java.util.HashMap<String, String> locks = new java.util.HashMap();
> +
> + // A metered stream is a subclass of OutputStream that
> + // (a) forwards all its output to a target stream
> +--- openjdk-boot/jdk/src/share/classes/java/util/logging/Level.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/logging/Level.java
> +@@ -59,7 +59,7 @@
> + */
> +
> + public class Level implements java.io.Serializable {
> +- private static java.util.ArrayList<Level> known = new java.util.ArrayList<>();
> ++ private static java.util.ArrayList<Level> known = new java.util.ArrayList();
> + private static String defaultBundle = "sun.util.logging.resources.logging";
> +
> + /**
> +--- openjdk-boot/jdk/src/share/classes/java/util/logging/LogManager.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/logging/LogManager.java
> +@@ -156,7 +156,7 @@
> + private final static Level defaultLevel = Level.INFO;
> +
> + // Table of named Loggers that maps names to Loggers.
> +- private Hashtable<String,LoggerWeakRef> namedLoggers = new Hashtable<>();
> ++ private Hashtable<String,LoggerWeakRef> namedLoggers = new Hashtable();
> + // Tree of named Loggers
> + private LogNode root = new LogNode(null);
> + private Logger rootLogger;
> +@@ -421,7 +421,7 @@
> + // loggerRefQueue holds LoggerWeakRef objects for Logger objects
> + // that have been GC'ed.
> + private final ReferenceQueue<Logger> loggerRefQueue
> +- = new ReferenceQueue<>();
> ++ = new ReferenceQueue();
> +
> + // Package-level inner class.
> + // Helper class for managing WeakReferences to Logger objects.
> +@@ -671,7 +671,7 @@
> + name = "";
> + }
> + if (node.children == null) {
> +- node.children = new HashMap<>();
> ++ node.children = new HashMap();
> + }
> + LogNode child = node.children.get(head);
> + if (child == null) {
> +@@ -855,7 +855,7 @@
> + }
> + hands = hands.trim();
> + int ix = 0;
> +- Vector<String> result = new Vector<>();
> ++ Vector<String> result = new Vector();
> + while (ix < hands.length()) {
> + int end = ix;
> + while (end < hands.length()) {
> +--- openjdk-boot/jdk/src/share/classes/java/util/logging/LogRecord.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/logging/LogRecord.java
> +@@ -85,7 +85,7 @@
> + private static final AtomicInteger nextThreadId
> + = new AtomicInteger(MIN_SEQUENTIAL_THREAD_ID);
> +
> +- private static final ThreadLocal<Integer> threadIds = new ThreadLocal<>();
> ++ private static final ThreadLocal<Integer> threadIds = new ThreadLocal();
> +
> + /**
> + * @serial Logging message level
> +--- openjdk-boot/jdk/src/share/classes/java/util/logging/Logger.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/logging/Logger.java
> +@@ -170,7 +170,7 @@
> + private LogManager manager;
> + private String name;
> + private final CopyOnWriteArrayList<Handler> handlers =
> +- new CopyOnWriteArrayList<>();
> ++ new CopyOnWriteArrayList();
> + private String resourceBundleName;
> + private volatile boolean useParentHandlers = true;
> + private volatile Filter filter;
> +@@ -1420,13 +1420,13 @@
> + // Set our new parent.
> + parent = newParent;
> + if (parent.kids == null) {
> +- parent.kids = new ArrayList<>(2);
> ++ parent.kids = new ArrayList(2);
> + }
> + if (ref == null) {
> + // we didn't have a previous parent
> + ref = manager.new LoggerWeakRef(this);
> + }
> +- ref.setParentRef(new WeakReference<>(parent));
> ++ ref.setParentRef(new WeakReference(parent));
> + parent.kids.add(ref);
> +
> + // As a result of the reparenting, the effective level
> +--- openjdk-boot/jdk/src/share/classes/java/util/logging/Logging.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/logging/Logging.java
> +@@ -56,7 +56,7 @@
> +
> + public List<String> getLoggerNames() {
> + Enumeration loggers = logManager.getLoggerNames();
> +- ArrayList<String> array = new ArrayList<>();
> ++ ArrayList<String> array = new ArrayList();
> +
> + for (; loggers.hasMoreElements();) {
> + array.add((String) loggers.nextElement());
> +--- openjdk-boot/jdk/src/share/classes/java/util/prefs/AbstractPreferences.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/prefs/AbstractPreferences.java
> +@@ -155,7 +155,7 @@
> + * All known unremoved children of this node. (This "cache" is consulted
> + * prior to calling childSpi() or getChild().
> + */
> +- private Map<String, AbstractPreferences> kidCache = new HashMap<>();
> ++ private Map<String, AbstractPreferences> kidCache = new HashMap();
> +
> + /**
> + * This field is used to keep track of whether or not this node has
> +@@ -712,7 +712,7 @@
> + if (removed)
> + throw new IllegalStateException("Node has been removed.");
> +
> +- Set<String> s = new TreeSet<>(kidCache.keySet());
> ++ Set<String> s = new TreeSet(kidCache.keySet());
> + for (String kid : childrenNamesSpi())
> + s.add(kid);
> + return s.toArray(EMPTY_STRING_ARRAY);
> +@@ -1441,7 +1441,7 @@
> + * event delivery from preference activity, greatly simplifying
> + * locking and reducing opportunity for deadlock.
> + */
> +- private static final List<EventObject> eventQueue = new LinkedList<>();
> ++ private static final List<EventObject> eventQueue = new LinkedList();
> +
> + /**
> + * These two classes are used to distinguish NodeChangeEvents on
> +--- openjdk-boot/jdk/src/share/classes/java/util/regex/Pattern.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/regex/Pattern.java
> +@@ -314,7 +314,7 @@
> + * <td headers="matches">Nothing, but quotes all characters until <tt>\E</tt></td></tr>
> + * <tr><td valign="top" headers="construct quot"><tt>\E</tt></td>
> + * <td headers="matches">Nothing, but ends quoting started by <tt>\Q</tt></td></tr>
> +- * <!-- Metachars: !$()*+.<>?[\]^{|} -->
> ++ * <!-- Metachars: !$()*+.()?[\]^{|} -->
> + *
> + * <tr><th> </th></tr>
> + * <tr align="left"><th colspan="2" id="special">Special constructs (named-capturing and non-capturing)</th></tr>
> +@@ -1068,7 +1068,7 @@
> + public String[] split(CharSequence input, int limit) {
> + int index = 0;
> + boolean matchLimited = limit > 0;
> +- ArrayList<String> matchList = new ArrayList<>();
> ++ ArrayList<String> matchList = new ArrayList();
> + Matcher m = matcher(input);
> +
> + // Add segments before each match found
> +@@ -1566,7 +1566,7 @@
> +
> + Map<String, Integer> namedGroups() {
> + if (namedGroups == null)
> +- namedGroups = new HashMap<>(2);
> ++ namedGroups = new HashMap(2);
> + return namedGroups;
> + }
> +
> +@@ -5309,7 +5309,7 @@
> + }
> +
> + private static final HashMap<String, CharPropertyFactory> map
> +- = new HashMap<>();
> ++ = new HashMap();
> +
> + static {
> + // Unicode character property aliases, defined in
> +--- openjdk-boot/jdk/src/share/classes/java/util/zip/ZipOutputStream.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/zip/ZipOutputStream.java
> +@@ -52,8 +52,8 @@
> + }
> +
> + private XEntry current;
> +- private Vector<XEntry> xentries = new Vector<>();
> +- private HashSet<String> names = new HashSet<>();
> ++ private Vector<XEntry> xentries = new Vector();
> ++ private HashSet<String> names = new HashSet();
> + private CRC32 crc = new CRC32();
> + private long written = 0;
> + private long locoff = 0;
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ClassReader.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ClassReader.java
> +@@ -469,7 +469,7 @@
> +
> + void readInnerClasses(Class cls) throws IOException {
> + int nc = readUnsignedShort();
> +- ArrayList<InnerClass> ics = new ArrayList<>(nc);
> ++ ArrayList<InnerClass> ics = new ArrayList(nc);
> + for (int i = 0; i < nc; i++) {
> + InnerClass ic =
> + new InnerClass(readClassRef(),
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/FixedList.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/FixedList.java
> +@@ -45,7 +45,7 @@
> + private final ArrayList<E> flist;
> +
> + protected FixedList(int capacity) {
> +- flist = new ArrayList<>(capacity);
> ++ flist = new ArrayList(capacity);
> + // initialize the list to null
> + for (int i = 0 ; i < capacity ; i++) {
> + flist.add(null);
> +--- openjdk-boot/jdk/src/share/classes/java/lang/Character.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/Character.java
> +@@ -648,7 +648,7 @@
> + */
> + public static final class UnicodeBlock extends Subset {
> +
> +- private static Map<String, UnicodeBlock> map = new HashMap<>(256);
> ++ private static Map<String, UnicodeBlock> map = new HashMap(256);
> +
> + /**
> + * Creates a UnicodeBlock with the given identifier name.
> +@@ -4177,7 +4177,7 @@
> +
> + private static HashMap<String, Character.UnicodeScript> aliases;
> + static {
> +- aliases = new HashMap<>(128);
> ++ aliases = new HashMap(128);
> + aliases.put("ARAB", ARABIC);
> + aliases.put("ARMI", IMPERIAL_ARAMAIC);
> + aliases.put("ARMN", ARMENIAN);
> +--- openjdk-boot/jdk/src/share/classes/java/lang/CharacterName.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/CharacterName.java
> +@@ -81,7 +81,7 @@
> + } while (cpOff < cpEnd);
> + strPool = new byte[total - cpEnd];
> + dis.readFully(strPool);
> +- refStrPool = new SoftReference<>(strPool);
> ++ refStrPool = new SoftReference(strPool);
> + } catch (Exception x) {
> + throw new InternalError(x.getMessage());
> + } finally {
> +--- openjdk-boot/jdk/src/share/classes/java/lang/Package.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/Package.java
> +@@ -588,13 +588,13 @@
> + }
> +
> + // The map of loaded system packages
> +- private static Map<String, Package> pkgs = new HashMap<>(31);
> ++ private static Map<String, Package> pkgs = new HashMap(31);
> +
> + // Maps each directory or zip file name to its corresponding url
> +- private static Map<String, URL> urls = new HashMap<>(10);
> ++ private static Map<String, URL> urls = new HashMap(10);
> +
> + // Maps each code source url for a jar file to its manifest
> +- private static Map<String, Manifest> mans = new HashMap<>(10);
> ++ private static Map<String, Manifest> mans = new HashMap(10);
> +
> + private static native String getSystemPackage0(String name);
> + private static native String[] getSystemPackages0();
> +--- openjdk-boot/jdk/src/share/classes/java/lang/ProcessBuilder.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/ProcessBuilder.java
> +@@ -214,7 +214,7 @@
> + * @param command a string array containing the program and its arguments
> + */
> + public ProcessBuilder(String... command) {
> +- this.command = new ArrayList<>(command.length);
> ++ this.command = new ArrayList(command.length);
> + for (String arg : command)
> + this.command.add(arg);
> + }
> +@@ -251,7 +251,7 @@
> + * @return this process builder
> + */
> + public ProcessBuilder command(String... command) {
> +- this.command = new ArrayList<>(command.length);
> ++ this.command = new ArrayList(command.length);
> + for (String arg : command)
> + this.command.add(arg);
> + return this;
> +--- openjdk-boot/jdk/src/share/classes/java/lang/Throwable.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/Throwable.java
> +@@ -828,7 +828,7 @@
> + // Use the sentinel for a zero-length list
> + suppressed = SUPPRESSED_SENTINEL;
> + } else { // Copy Throwables to new list
> +- suppressed = new ArrayList<>(1);
> ++ suppressed = new ArrayList(1);
> + for (Throwable t : suppressedExceptions) {
> + // Enforce constraints on suppressed exceptions in
> + // case of corrupt or malicious stream.
> +@@ -911,7 +911,7 @@
> + return;
> +
> + if (suppressedExceptions == SUPPRESSED_SENTINEL)
> +- suppressedExceptions = new ArrayList<>(1);
> ++ suppressedExceptions = new ArrayList(1);
> +
> + assert suppressedExceptions != SUPPRESSED_SENTINEL;
> +
> +--- openjdk-boot/jdk/src/share/classes/java/lang/reflect/Constructor.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/reflect/Constructor.java
> +@@ -144,7 +144,7 @@
> + // which implicitly requires that new java.lang.reflect
> + // objects be fabricated for each reflective call on Class
> + // objects.)
> +- Constructor<T> res = new Constructor<>(clazz,
> ++ Constructor<T> res = new Constructor(clazz,
> + parameterTypes,
> + exceptionTypes, modifiers, slot,
> + signature,
> +--- openjdk-boot/jdk/src/share/classes/java/lang/reflect/ReflectAccess.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/lang/reflect/ReflectAccess.java
> +@@ -84,7 +84,7 @@
> + byte[] annotations,
> + byte[] parameterAnnotations)
> + {
> +- return new Constructor<>(declaringClass,
> ++ return new Constructor(declaringClass,
> + parameterTypes,
> + checkedExceptions,
> + modifiers,
> +--- openjdk-boot/jdk/src/share/classes/java/util/AbstractList.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/AbstractList.java
> +@@ -482,8 +482,8 @@
> + */
> + public List<E> subList(int fromIndex, int toIndex) {
> + return (this instanceof RandomAccess ?
> +- new RandomAccessSubList<>(this, fromIndex, toIndex) :
> +- new SubList<>(this, fromIndex, toIndex));
> ++ new RandomAccessSubList(this, fromIndex, toIndex) :
> ++ new SubList(this, fromIndex, toIndex));
> + }
> +
> + // Comparison and hashing
> +@@ -747,7 +747,7 @@
> + }
> +
> + public List<E> subList(int fromIndex, int toIndex) {
> +- return new SubList<>(this, fromIndex, toIndex);
> ++ return new SubList(this, fromIndex, toIndex);
> + }
> +
> + private void rangeCheck(int index) {
> +@@ -776,6 +776,6 @@
> + }
> +
> + public List<E> subList(int fromIndex, int toIndex) {
> +- return new RandomAccessSubList<>(this, fromIndex, toIndex);
> ++ return new RandomAccessSubList(this, fromIndex, toIndex);
> + }
> + }
> +--- openjdk-boot/jdk/src/share/classes/java/util/Arrays.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/Arrays.java
> +@@ -2824,7 +2824,7 @@
> + * @return a list view of the specified array
> + */
> + public static <T> List<T> asList(T... a) {
> +- return new ArrayList<>(a);
> ++ return new ArrayList(a);
> + }
> +
> + /**
> +--- openjdk-boot/jdk/src/share/classes/java/util/EnumMap.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/EnumMap.java
> +@@ -499,7 +499,7 @@
> + int j = 0;
> + for (int i = 0; i < vals.length; i++)
> + if (vals[i] != null)
> +- a[j++] = new AbstractMap.SimpleEntry<>(
> ++ a[j++] = new AbstractMap.SimpleEntry(
> + keyUniverse[i], unmaskNull(vals[i]));
> + return a;
> + }
> +--- openjdk-boot/jdk/src/share/classes/java/util/EnumSet.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/EnumSet.java
> +@@ -110,9 +110,9 @@
> + throw new ClassCastException(elementType + " not an enum");
> +
> + if (universe.length <= 64)
> +- return new RegularEnumSet<>(elementType, universe);
> ++ return new RegularEnumSet(elementType, universe);
> + else
> +- return new JumboEnumSet<>(elementType, universe);
> ++ return new JumboEnumSet(elementType, universe);
> + }
> +
> + /**
> +@@ -430,7 +430,7 @@
> + }
> +
> + Object writeReplace() {
> +- return new SerializationProxy<>(this);
> ++ return new SerializationProxy(this);
> + }
> +
> + // readObject method for the serialization proxy pattern
> +--- openjdk-boot/jdk/src/share/classes/java/util/HashMap.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/HashMap.java
> +@@ -763,7 +763,7 @@
> + */
> + void addEntry(int hash, K key, V value, int bucketIndex) {
> + Entry<K,V> e = table[bucketIndex];
> +- table[bucketIndex] = new Entry<>(hash, key, value, e);
> ++ table[bucketIndex] = new Entry(hash, key, value, e);
> + if (size++ >= threshold)
> + resize(2 * table.length);
> + }
> +@@ -778,7 +778,7 @@
> + */
> + void createEntry(int hash, K key, V value, int bucketIndex) {
> + Entry<K,V> e = table[bucketIndex];
> +- table[bucketIndex] = new Entry<>(hash, key, value, e);
> ++ table[bucketIndex] = new Entry(hash, key, value, e);
> + size++;
> + }
> +
> +--- openjdk-boot/jdk/src/share/classes/java/util/Hashtable.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/Hashtable.java
> +@@ -455,7 +455,7 @@
> +
> + // Creates the new entry.
> + Entry<K,V> e = tab[index];
> +- tab[index] = new Entry<>(hash, key, value, e);
> ++ tab[index] = new Entry(hash, key, value, e);
> + count++;
> + return null;
> + }
> +@@ -579,7 +579,7 @@
> + if (count == 0) {
> + return Collections.emptyEnumeration();
> + } else {
> +- return new Enumerator<>(type, false);
> ++ return new Enumerator(type, false);
> + }
> + }
> +
> +@@ -587,7 +587,7 @@
> + if (count == 0) {
> + return Collections.emptyIterator();
> + } else {
> +- return new Enumerator<>(type, true);
> ++ return new Enumerator(type, true);
> + }
> + }
> +
> +@@ -929,7 +929,7 @@
> + }
> + // Creates the new entry.
> + Entry<K,V> e = tab[index];
> +- tab[index] = new Entry<>(hash, key, value, e);
> ++ tab[index] = new Entry(hash, key, value, e);
> + count++;
> + }
> +
> +@@ -950,7 +950,7 @@
> + }
> +
> + protected Object clone() {
> +- return new Entry<>(hash, key, value,
> ++ return new Entry(hash, key, value,
> + (next==null ? null : (Entry<K,V>) next.clone()));
> + }
> +
> +--- openjdk-boot/jdk/src/share/classes/java/util/IdentityHashMap.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/IdentityHashMap.java
> +@@ -1134,7 +1134,7 @@
> + Object[] result = new Object[size];
> + Iterator<Map.Entry<K,V>> it = iterator();
> + for (int i = 0; i < size; i++)
> +- result[i] = new AbstractMap.SimpleEntry<>(it.next());
> ++ result[i] = new AbstractMap.SimpleEntry(it.next());
> + return result;
> + }
> +
> +@@ -1146,7 +1146,7 @@
> + .newInstance(a.getClass().getComponentType(), size);
> + Iterator<Map.Entry<K,V>> it = iterator();
> + for (int i = 0; i < size; i++)
> +- a[i] = (T) new AbstractMap.SimpleEntry<>(it.next());
> ++ a[i] = (T) new AbstractMap.SimpleEntry(it.next());
> + if (a.length > size)
> + a[size] = null;
> + return a;
> +--- openjdk-boot/jdk/src/share/classes/java/util/LinkedHashMap.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/LinkedHashMap.java
> +@@ -237,7 +237,7 @@
> + * the chain.
> + */
> + void init() {
> +- header = new Entry<>(-1, null, null, null);
> ++ header = new Entry(-1, null, null, null);
> + header.before = header.after = header;
> + }
> +
> +@@ -438,7 +438,7 @@
> + */
> + void createEntry(int hash, K key, V value, int bucketIndex) {
> + HashMap.Entry<K,V> old = table[bucketIndex];
> +- Entry<K,V> e = new Entry<>(hash, key, value, old);
> ++ Entry<K,V> e = new Entry(hash, key, value, old);
> + table[bucketIndex] = e;
> + e.addBefore(header);
> + size++;
> +--- openjdk-boot/jdk/src/share/classes/java/util/LinkedList.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/LinkedList.java
> +@@ -122,7 +122,7 @@
> + */
> + private void linkFirst(E e) {
> + final Node<E> f = first;
> +- final Node<E> newNode = new Node<>(null, e, f);
> ++ final Node<E> newNode = new Node(null, e, f);
> + first = newNode;
> + if (f == null)
> + last = newNode;
> +@@ -137,7 +137,7 @@
> + */
> + void linkLast(E e) {
> + final Node<E> l = last;
> +- final Node<E> newNode = new Node<>(l, e, null);
> ++ final Node<E> newNode = new Node(l, e, null);
> + last = newNode;
> + if (l == null)
> + first = newNode;
> +@@ -153,7 +153,7 @@
> + void linkBefore(E e, Node<E> succ) {
> + // assert succ != null;
> + final Node<E> pred = succ.prev;
> +- final Node<E> newNode = new Node<>(pred, e, succ);
> ++ final Node<E> newNode = new Node(pred, e, succ);
> + succ.prev = newNode;
> + if (pred == null)
> + first = newNode;
> +@@ -419,7 +419,7 @@
> +
> + for (Object o : a) {
> + @SuppressWarnings("unchecked") E e = (E) o;
> +- Node<E> newNode = new Node<>(pred, e, null);
> ++ Node<E> newNode = new Node(pred, e, null);
> + if (pred == null)
> + first = newNode;
> + else
> +--- openjdk-boot/jdk/src/share/classes/java/util/ListResourceBundle.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/ListResourceBundle.java
> +@@ -187,7 +187,7 @@
> + return;
> +
> + Object[][] contents = getContents();
> +- HashMap<String,Object> temp = new HashMap<>(contents.length);
> ++ HashMap<String,Object> temp = new HashMap(contents.length);
> + for (int i = 0; i < contents.length; ++i) {
> + // key must be non-null String, value must be non-null
> + String key = (String) contents[i][0];
> +--- openjdk-boot/jdk/src/share/classes/java/util/TimSort.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/TimSort.java
> +@@ -196,7 +196,7 @@
> + * extending short natural runs to minRun elements, and merging runs
> + * to maintain stack invariant.
> + */
> +- TimSort<T> ts = new TimSort<>(a, c);
> ++ TimSort<T> ts = new TimSort(a, c);
> + int minRun = minRunLength(nRemaining);
> + do {
> + // Identify next run
> +--- openjdk-boot/jdk/src/share/classes/java/util/TreeMap.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/java/util/TreeMap.java
> +@@ -533,7 +533,7 @@
> + // throw NullPointerException
> + //
> + // compare(key, key); // type check
> +- root = new Entry<>(key, value, null);
> ++ root = new Entry(key, value, null);
> + size = 1;
> + modCount++;
> + return null;
> +@@ -569,7 +569,7 @@
> + return t.setValue(value);
> + } while (t != null);
> + }
> +- Entry<K,V> e = new Entry<>(key, value, parent);
> ++ Entry<K,V> e = new Entry(key, value, parent);
> + if (cmp < 0)
> + parent.left = e;
> + else
> +@@ -1069,14 +1069,14 @@
> + }
> + public NavigableSet<E> subSet(E fromElement, boolean fromInclusive,
> + E toElement, boolean toInclusive) {
> +- return new KeySet<>(m.subMap(fromElement, fromInclusive,
> ++ return new KeySet(m.subMap(fromElement, fromInclusive,
> + toElement, toInclusive));
> + }
> + public NavigableSet<E> headSet(E toElement, boolean inclusive) {
> +- return new KeySet<>(m.headMap(toElement, inclusive));
> ++ return new KeySet(m.headMap(toElement, inclusive));
> + }
> + public NavigableSet<E> tailSet(E fromElement, boolean inclusive) {
> +- return new KeySet<>(m.tailMap(fromElement, inclusive));
> ++ return new KeySet(m.tailMap(fromElement, inclusive));
> + }
> + public SortedSet<E> subSet(E fromElement, E toElement) {
> + return subSet(fromElement, true, toElement, false);
> +@@ -1205,7 +1205,7 @@
> + */
> + static <K,V> Map.Entry<K,V> exportEntry(TreeMap.Entry<K,V> e) {
> + return (e == null) ? null :
> +- new AbstractMap.SimpleImmutableEntry<>(e);
> ++ new AbstractMap.SimpleImmutableEntry(e);
> + }
> +
> + /**
> +@@ -2406,7 +2406,7 @@
> + value = (defaultVal != null ? defaultVal : (V) str.readObject());
> + }
> +
> +- Entry<K,V> middle = new Entry<>(key, value, null);
> ++ Entry<K,V> middle = new Entry(key, value, null);
> +
> + // color nodes in non-full bottommost level red
> + if (level == redLevel)
> +--- openjdk-boot/jdk/src/share/classes/sun/io/Converters.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/io/Converters.java
> +@@ -120,7 +120,7 @@
> +
> + private static Class<?> cache(int type, Object encoding, Class<?> c) {
> + SoftReference<Object[]>[] srs = classCache[type];
> +- srs[CACHE_SIZE - 1] = new SoftReference<>(new Object[] { c, encoding });
> ++ srs[CACHE_SIZE - 1] = new SoftReference(new Object[] { c, encoding });
> + moveToFront(srs, CACHE_SIZE - 1);
> + return c;
> + }
> +--- openjdk-boot/jdk/src/solaris/classes/java/lang/ProcessEnvironment.java.orig
> ++++ openjdk-boot/jdk/src/solaris/classes/java/lang/ProcessEnvironment.java
> +@@ -68,7 +68,7 @@
> + // We cache the C environment. This means that subsequent calls
> + // to putenv/setenv from C will not be visible from Java code.
> + byte[][] environ = environ();
> +- theEnvironment = new HashMap<>(environ.length/2 + 3);
> ++ theEnvironment = new HashMap(environ.length/2 + 3);
> + // Read environment variables back to front,
> + // so that earlier variables override later ones.
> + for (int i = environ.length-1; i > 0; i-=2)
> +--- openjdk-boot/jdk/src/solaris/classes/java/util/prefs/FileSystemPreferences.java.orig
> ++++ openjdk-boot/jdk/src/solaris/classes/java/util/prefs/FileSystemPreferences.java
> +@@ -354,7 +354,7 @@
> + * log against that map. The resulting map is then written back
> + * to the disk.
> + */
> +- final List<Change> changeLog = new ArrayList<>();
> ++ final List<Change> changeLog = new ArrayList();
> +
> + /**
> + * Represents a change to a preference.
> +@@ -507,7 +507,7 @@
> + });
> + if (newNode) {
> + // These 2 things guarantee node will get wrtten at next flush/sync
> +- prefsCache = new TreeMap<>();
> ++ prefsCache = new TreeMap();
> + nodeCreate = new NodeCreate();
> + changeLog.add(nodeCreate);
> + }
> +@@ -550,7 +550,7 @@
> + loadCache();
> + } catch(Exception e) {
> + // assert lastSyncTime == 0;
> +- prefsCache = new TreeMap<>();
> ++ prefsCache = new TreeMap();
> + }
> + }
> +
> +@@ -567,7 +567,7 @@
> + AccessController.doPrivileged(
> + new PrivilegedExceptionAction<Void>() {
> + public Void run() throws BackingStoreException {
> +- Map<String, String> m = new TreeMap<>();
> ++ Map<String, String> m = new TreeMap();
> + long newLastSyncTime = 0;
> + try {
> + newLastSyncTime = prefsFile.lastModified();
> +@@ -581,7 +581,7 @@
> + prefsFile.renameTo( new File(
> + prefsFile.getParentFile(),
> + "IncorrectFormatPrefs.xml"));
> +- m = new TreeMap<>();
> ++ m = new TreeMap();
> + } else if (e instanceof FileNotFoundException) {
> + getLogger().warning("Prefs file removed in background "
> + + prefsFile.getPath());
> +@@ -646,7 +646,7 @@
> + return AccessController.doPrivileged(
> + new PrivilegedAction<String[]>() {
> + public String[] run() {
> +- List<String> result = new ArrayList<>();
> ++ List<String> result = new ArrayList();
> + File[] dirContents = dir.listFiles();
> + if (dirContents != null) {
> + for (int i = 0; i < dirContents.length; i++)
> +@@ -794,7 +794,7 @@
> + } else if (lastSyncTime != 0 && !dir.exists()) {
> + // This node was removed in the background. Playback any changes
> + // against a virgin (empty) Map.
> +- prefsCache = new TreeMap<>();
> ++ prefsCache = new TreeMap();
> + replayChanges();
> + }
> + if (!changeLog.isEmpty()) {
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/boot/ecj-stringswitch.patch
> --- a/patches/boot/ecj-stringswitch.patch Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/boot/ecj-stringswitch.patch Wed Jan 26 01:12:41 2011 +0100
> @@ -1,6 +1,5 @@
> -diff -r c981a387cd86 src/share/classes/com/sun/security/ntlm/NTLM.java
> ---- openjdk-boot.orig/jdk/src/share/classes/com/sun/security/ntlm/NTLM.java Mon Nov 22 21:55:09 2010 +0000
> -+++ openjdk-boot/jdk/src/share/classes/com/sun/security/ntlm/NTLM.java Wed Nov 24 00:34:39 2010 +0000
> +--- openjdk-boot/jdk/src/share/classes/com/sun/security/ntlm/NTLM.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/security/ntlm/NTLM.java
> @@ -64,17 +64,23 @@
>
> protected NTLM(String version) throws NTLMException {
> @@ -36,3 +35,161 @@
> try {
> fac = SecretKeyFactory.getInstance ("DES");
> cipher = Cipher.getInstance ("DES/ECB/NoPadding");
> +--- openjdk-boot/jdk/src/share/classes/sun/security/util/DisabledAlgorithmConstraints.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/security/util/DisabledAlgorithmConstraints.java
> +@@ -383,18 +383,17 @@
> + GE; // ">="
> +
> + static Operator of(String s) {
> +- switch (s) {
> +- case "==":
> ++ if (s.equals("==")) {
> + return EQ;
> +- case "!=":
> ++ } else if (s.equals("!=")) {
> + return NE;
> +- case "<":
> ++ } else if (s.equals("<")) {
> + return LT;
> +- case "<=":
> ++ } else if (s.equals("<=")) {
> + return LE;
> +- case ">":
> ++ } else if (s.equals(">")) {
> + return GT;
> +- case ">=":
> ++ } else if (s.equals(">=")) {
> + return GE;
> + }
> +
> +--- openjdk-boot/jdk/src/share/classes/sun/launcher/LauncherHelper.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/sun/launcher/LauncherHelper.java
> +@@ -114,23 +114,18 @@
> + String optStr = (opts.length > 1 && opts[1] != null)
> + ? opts[1].trim()
> + : "all";
> +- switch (optStr) {
> +- case "vm":
> ++ if (optStr.equals("vm")) {
> + printVmSettings(ostream, initialHeapSize, maxHeapSize,
> + stackSize, isServer);
> +- break;
> +- case "properties":
> ++ } else if (optStr.equals("properties")) {
> + printProperties(ostream);
> +- break;
> +- case "locale":
> ++ } else if (optStr.equals("locale")) {
> + printLocale(ostream);
> +- break;
> +- default:
> ++ } else {
> + printVmSettings(ostream, initialHeapSize, maxHeapSize,
> + stackSize, isServer);
> + printProperties(ostream);
> + printLocale(ostream);
> +- break;
> + }
> + }
> +
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Package.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Package.java
> +@@ -1116,30 +1116,25 @@
> + // what is one of { Debug, Compile, Constant, Exceptions, InnerClasses }
> + if (verbose > 0)
> + Utils.log.info("Stripping "+what.toLowerCase()+" data and attributes...");
> +- switch (what) {
> +- case "Debug":
> ++ if (what.equals("Debug")) {
> + strip("SourceFile");
> + strip("LineNumberTable");
> + strip("LocalVariableTable");
> + strip("LocalVariableTypeTable");
> +- break;
> +- case "Compile":
> ++ } else if (what.equals("Compile")) {
> + // Keep the inner classes normally.
> + // Although they have no effect on execution,
> + // the Reflection API exposes them, and JCK checks them.
> + // NO: // strip("InnerClasses");
> + strip("Deprecated");
> + strip("Synthetic");
> +- break;
> +- case "Exceptions":
> ++ } else if (what.equals("Exceptions")) {
> + // Keep the exceptions normally.
> + // Although they have no effect on execution,
> + // the Reflection API exposes them, and JCK checks them.
> + strip("Exceptions");
> +- break;
> +- case "Constant":
> ++ } else if (what.equals("Constant")) {
> + stripConstantFields();
> +- break;
> + }
> + }
> +
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ClassReader.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/ClassReader.java
> +@@ -351,16 +351,14 @@
> + Object lkey = Attribute.keyForLookup(ctype, name);
> + String cmd = (String) attrCommands.get(lkey);
> + if (cmd != null) {
> +- switch (cmd) {
> +- case "pass":
> ++ if (cmd.equals("pass")) {
> + String message1 = "passing attribute bitwise in " + h;
> + throw new Attribute.FormatException(message1, ctype, name, cmd);
> +- case "error":
> ++ } else if (cmd.equals("error")) {
> + String message2 = "attribute not allowed in " + h;
> + throw new Attribute.FormatException(message2, ctype, name, cmd);
> +- case "strip":
> ++ } else if (cmd.equals("strip")) {
> + skip(length, name + " attribute in " + h);
> +- continue;
> + }
> + }
> + }
> +--- openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Driver.java.orig
> ++++ openjdk-boot/jdk/src/share/classes/com/sun/java/util/jar/pack/Driver.java
> +@@ -71,15 +71,12 @@
> + {
> + // Non-standard, undocumented "--unpack" switch enables unpack mode.
> + String arg0 = av.isEmpty() ? "" : av.get(0);
> +- switch (arg0) {
> +- case "--pack":
> ++ if (arg0.equals("--pack")) {
> + av.remove(0);
> +- break;
> +- case "--unpack":
> ++ } else if (arg0.equals("--unpack")) {
> + av.remove(0);
> + doPack = false;
> + doUnpack = true;
> +- break;
> + }
> + }
> +
> +@@ -180,17 +177,13 @@
> + // Deal with remaining non-engine properties:
> + for (String opt : avProps.keySet()) {
> + String val = avProps.get(opt);
> +- switch (opt) {
> +- case "--repack":
> ++ if (opt.equals("--repack")) {
> + doRepack = true;
> +- break;
> +- case "--no-gzip":
> ++ } else if (opt.equals("--no-gzip")) {
> + doZip = (val == null);
> +- break;
> +- case "--log-file=":
> ++ } else if (opt.equals("--log-file=")) {
> + logFile = val;
> +- break;
> +- default:
> ++ } else {
> + throw new InternalError(MessageFormat.format(
> + RESOURCE.getString(DriverResource.BAD_OPTION),
> + opt, avProps.get(opt)));
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/boot/fontconfig.patch
> --- a/patches/boot/fontconfig.patch Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/boot/fontconfig.patch Wed Jan 26 01:12:41 2011 +0100
> @@ -1,7 +1,6 @@
> -diff -Nru openjdk-boot.orig/jdk/make/sun/awt/Makefile openjdk-boot/jdk/make/sun/awt/Makefile
> ---- openjdk-boot.orig/jdk/make/sun/awt/Makefile 2010-03-02 18:01:28.000000000 +0000
> -+++ openjdk-boot/jdk/make/sun/awt/Makefile 2010-03-02 18:01:21.000000000 +0000
> -@@ -402,11 +402,9 @@
> +--- openjdk-boot/jdk/make/sun/awt/Makefile.orig
> ++++ openjdk-boot/jdk/make/sun/awt/Makefile
> +@@ -407,11 +407,9 @@
>
> COMPILEFONTCONFIG_JARFILE = $(BUILDTOOLJARDIR)/compilefontconfig.jar
>
> @@ -9,7 +8,7 @@
> - $(COMPILEFONTCONFIG_JARFILE)
> +$(LIBDIR)/%.bfc: $(GENSRCDIR)/fontconfig/%.bfc
> $(prep-target)
> -- $(BOOT_JAVA_CMD) -jar $(COMPILEFONTCONFIG_JARFILE) $< $@
> +- $(BOOT_JAVA_CMD) -jar $(COMPILEFONTCONFIG_JARFILE) $(COMPILEFONTCONFIG_FLAGS) $< $@
> - $(install-module-file)
> + $(install-file)
> $(call chmod-file, 444)
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/boot/revert-6941137.patch
> --- a/patches/boot/revert-6941137.patch Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/boot/revert-6941137.patch Wed Jan 26 01:12:41 2011 +0100
> @@ -1,10 +1,9 @@
> -diff -r c981a387cd86 src/share/classes/sun/util/calendar/ZoneInfoFile.java
> ---- openjdk-boot.orig/jdk/src/share/classes/sun/util/calendar/ZoneInfoFile.java Mon Nov 22 21:55:09 2010 +0000
> -+++ openjdk-boot/jdk/src/share/classes/sun/util/calendar/ZoneInfoFile.java Tue Nov 23 23:05:24 2010 +0000
> -@@ -486,7 +486,7 @@
> - String otherDir = getZoneInfoDir(homeDir);
> - if (otherDir != null)
> - zi = otherDir;
> +--- openjdk-boot.orig/jdk/src/share/classes/sun/util/calendar/ZoneInfoFile.java
> ++++ openjdk-boot/jdk/src/share/classes/sun/util/calendar/ZoneInfoFile.java
> +@@ -479,7 +479,7 @@
> + String zi = System.getProperty("java.home") +
> + File.separator + "lib" + File.separator + "zi";
> + try {
> - zi = FileSystems.getDefault().getPath(zi).toRealPath(true).toString();
> + zi = new File(zi).getCanonicalPath();
> } catch(Exception e) {
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/boot/revert-6973616.patch
> --- a/patches/boot/revert-6973616.patch Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/boot/revert-6973616.patch Wed Jan 26 01:12:41 2011 +0100
> @@ -1,12 +1,11 @@
> -diff -Nru openjdk-boot.orig/jdk/make/common/shared/Defs-versions.gmk openjdk-boot/jdk/make/common/shared/Defs-versions.gmk
> ---- openjdk-boot.orig/jdk/make/common/shared/Defs-versions.gmk 2010-09-06 13:47:55.000000000 +0100
> -+++ openjdk-boot/jdk/make/common/shared/Defs-versions.gmk 2010-09-06 13:54:03.765973618 +0100
> -@@ -191,7 +191,7 @@
> +--- openjdk-boot/jdk/make/common/shared/Defs-versions.gmk.orig
> ++++ openjdk-boot/jdk/make/common/shared/Defs-versions.gmk
> +@@ -206,7 +206,7 @@
>
> # Generic
> REQUIRED_ANT_VER = 1.6.3
> -REQUIRED_BOOT_VER = 1.6
> +REQUIRED_BOOT_VER = 1.5
> REQUIRED_FREETYPE_VERSION = 2.2.1
> - REQUIRED_MAKE_VER = 3.78
> + REQUIRED_MAKE_VER = 3.81
> REQUIRED_UNZIP_VER = 5.12
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/boot/xbootclasspath.patch
> --- a/patches/boot/xbootclasspath.patch Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/boot/xbootclasspath.patch Wed Jan 26 01:12:41 2011 +0100
> @@ -1,6 +1,5 @@
> -diff -Nru openjdk.orig/corba/make/common/shared/Defs-java.gmk openjdk/corba/make/common/shared/Defs-java.gmk
> ---- openjdk-boot.orig/corba/make/common/shared/Defs-java.gmk 2010-11-12 01:18:17.000000000 +0000
> -+++ openjdk-boot/corba/make/common/shared/Defs-java.gmk 2010-11-22 17:37:26.447519804 +0000
> +--- openjdk-boot/corba/make/common/shared/Defs-java.gmk.orig
> ++++ openjdk-boot/corba/make/common/shared/Defs-java.gmk
> @@ -131,26 +131,14 @@
> CLASS_VERSION = -target $(TARGET_CLASS_VERSION)
> JAVACFLAGS += $(CLASS_VERSION)
> @@ -33,9 +32,8 @@
>
> # Override of what javac to use (see deploy workspace)
> ifdef JAVAC
> -diff -Nru openjdk.orig/jdk/make/common/shared/Defs-java.gmk openjdk/jdk/make/common/shared/Defs-java.gmk
> ---- openjdk-boot.orig/jdk/make/common/shared/Defs-java.gmk 2010-11-22 17:32:24.000000000 +0000
> -+++ openjdk-boot/jdk/make/common/shared/Defs-java.gmk 2010-11-22 17:35:30.752202773 +0000
> +--- openjdk-boot/jdk/make/common/shared/Defs-java.gmk.orig
> ++++ openjdk-boot/jdk/make/common/shared/Defs-java.gmk
> @@ -136,7 +136,7 @@
> JAVACFLAGS += $(OTHER_JAVACFLAGS)
>
> @@ -57,7 +55,7 @@
> - "-Xbootclasspath/p:$(JAVAC_JAR)" \
> - -jar $(JAVAC_JAR) $(JAVACFLAGS)
> - JAVAH_CMD = $(BOOT_JAVA_CMD) \
> -- "-Xbootclasspath/p:$(JAVAH_JAR)$(CLASSPATH_SEPARATOR)$(JAVADOC_JAR)$(CLASSPATH_SEPARATOR)$(JAVAC_JAR)" \
> +- "-Xbootclasspath/p:$(JAVAH_JAR)$(CLASSPATH_SEPARATOR)$(JAVAC_JAR)" \
> - -jar $(JAVAH_JAR) $(JAVAHFLAGS)
> JAVADOC_CMD = $(BOOT_JAVA_CMD) \
> "-Xbootclasspath/p:$(JAVADOC_JAR)$(CLASSPATH_SEPARATOR)$(JAVAC_JAR)$(CLASSPATH_SEPARATOR)$(DOCLETS_JAR)" \
> @@ -73,9 +71,8 @@
> endif
>
> # Override of what javac to use (see deploy workspace)
> -diff -Nru openjdk.orig/jdk/make/java/text/base/Makefile openjdk/jdk/make/java/text/base/Makefile
> ---- openjdk-boot.orig/jdk/make/java/text/base/Makefile 2010-07-29 21:55:27.000000000 +0100
> -+++ openjdk-boot/jdk/make/java/text/base/Makefile 2010-11-22 17:35:30.768201571 +0000
> +--- openjdk-boot/jdk/make/java/text/base/Makefile.orig
> ++++ openjdk-boot/jdk/make/java/text/base/Makefile
> @@ -81,8 +81,8 @@
> -sourcepath $(TEXT_SRCDIR) \
> $(TEXT_SOURCES)
> @@ -87,9 +84,8 @@
> -o $(TEXT_CLASSDIR) \
> -spec $(UNICODEDATA)/UnicodeData.txt
> @$(java-vm-cleanup)
> -diff -Nru openjdk.orig/jdk/make/sun/text/Makefile openjdk/jdk/make/sun/text/Makefile
> ---- openjdk-boot.orig/jdk/make/sun/text/Makefile 2010-07-29 21:55:29.000000000 +0100
> -+++ openjdk-boot/jdk/make/sun/text/Makefile 2010-11-22 17:35:30.768201571 +0000
> +--- openjdk-boot/jdk/make/sun/text/Makefile.orig
> ++++ openjdk-boot/jdk/make/sun/text/Makefile
> @@ -86,8 +86,9 @@
> $(BOOT_JAVAC_CMD) -d $(TEXT_CLASSES) \
> -sourcepath $(TEXT_SRCDIR) \
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/hotspot/default/icedtea-gcc-suffix.patch
> --- a/patches/hotspot/default/icedtea-gcc-suffix.patch Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/hotspot/default/icedtea-gcc-suffix.patch Wed Jan 26 01:12:41 2011 +0100
> @@ -1,6 +1,5 @@
> -diff -Nru openjdk.orig/hotspot/agent/src/os/linux/Makefile openjdk/hotspot/agent/src/os/linux/Makefile
> ---- openjdk.orig/hotspot/agent/src/os/linux/Makefile 2010-07-29 21:54:38.000000000 +0100
> -+++ openjdk/hotspot/agent/src/os/linux/Makefile 2010-08-31 17:54:44.523837437 +0100
> +--- openjdk/hotspot/agent/src/os/linux/Makefile.orig
> ++++ openjdk/hotspot/agent/src/os/linux/Makefile
> @@ -23,7 +23,7 @@
> #
>
> @@ -10,13 +9,12 @@
>
> JAVAH = ${JAVA_HOME}/bin/javah
>
> -diff -Nru openjdk.orig/hotspot/make/linux/makefiles/gcc.make openjdk/hotspot/make/linux/makefiles/gcc.make
> ---- openjdk.orig/hotspot/make/linux/makefiles/gcc.make 2010-08-31 17:24:48.000000000 +0100
> -+++ openjdk/hotspot/make/linux/makefiles/gcc.make 2010-08-31 17:55:09.288779769 +0100
> -@@ -26,11 +26,11 @@
> - # CC, CPP & AS
> -
> - ifdef ALT_COMPILER_PATH
> +--- openjdk/hotspot/make/linux/makefiles/gcc.make.orig
> ++++ openjdk/hotspot/make/linux/makefiles/gcc.make
> +@@ -28,11 +28,11 @@
> + # When cross-compiling the ALT_COMPILER_PATH points
> + # to the cross-compilation toolset
> + ifdef CROSS_COMPILE_ARCH
> -CPP = $(ALT_COMPILER_PATH)/g++
> -CC = $(ALT_COMPILER_PATH)/gcc
> +CPP = $(ALT_COMPILER_PATH)/g++$(GCC_SUFFIX)
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/hotspot/default/icedtea-includedb.patch
> --- a/patches/hotspot/default/icedtea-includedb.patch Wed Jan 26 01:03:53 2011 +0100
> +++ /dev/null Thu Jan 01 00:00:00 1970 +0000
> @@ -1,12 +0,0 @@
> -diff -Nru openjdk.orig/hotspot/src/share/vm/gc_implementation/includeDB_gc_parallelScavenge openjdk/hotspot/src/share/vm/gc_implementation/includeDB_gc_parallelScavenge
> ---- openjdk.orig/hotspot/src/share/vm/gc_implementation/includeDB_gc_parallelScavenge 2009-02-19 08:40:26.000000000 +0000
> -+++ openjdk/hotspot/src/share/vm/gc_implementation/includeDB_gc_parallelScavenge 2009-02-23 21:09:49.000000000 +0000
> -@@ -308,6 +308,8 @@
> - psPermGen.cpp psMarkSweepDecorator.hpp
> - psPermGen.cpp psParallelCompact.hpp
> - psPermGen.cpp psPermGen.hpp
> -+psPermGen.cpp markOop.inline.hpp
> -+psPermGen.cpp markSweep.inline.hpp
> -
> - psPermGen.hpp psOldGen.hpp
> -
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/hotspot/default/icedtea-sparc-trapsfix.patch
> --- a/patches/hotspot/default/icedtea-sparc-trapsfix.patch Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/hotspot/default/icedtea-sparc-trapsfix.patch Wed Jan 26 01:12:41 2011 +0100
> @@ -1,9 +1,8 @@
> -diff -Nru openjdk.orig/hotspot/src/os_cpu/linux_sparc/vm/assembler_linux_sparc.cpp openjdk/hotspot/src/os_cpu/linux_sparc/vm/assembler_linux_sparc.cpp
> ---- openjdk.orig/hotspot/src/os_cpu/linux_sparc/vm/assembler_linux_sparc.cpp 2008-08-04 08:40:18.000000000 +0100
> -+++ openjdk/hotspot/src/os_cpu/linux_sparc/vm/assembler_linux_sparc.cpp 2008-08-09 01:29:51.000000000 +0100
> -@@ -25,7 +25,16 @@
> - #include "incls/_precompiled.incl"
> - #include "incls/_assembler_linux_sparc.cpp.incl"
> +--- openjdk/hotspot/src/os_cpu/linux_sparc/vm/assembler_linux_sparc.cpp.orig
> ++++ openjdk/hotspot/src/os_cpu/linux_sparc/vm/assembler_linux_sparc.cpp
> +@@ -28,7 +28,16 @@
> + #include "runtime/os.hpp"
> + #include "runtime/threadLocalStorage.hpp"
>
> -#include <asm-sparc/traps.h>
> +/* Headers for 32bit sparc with a 32bit userland end up in asm/
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/hotspot/default/icedtea-text-relocations.patch
> --- a/patches/hotspot/default/icedtea-text-relocations.patch Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/hotspot/default/icedtea-text-relocations.patch Wed Jan 26 01:12:41 2011 +0100
> @@ -1,7 +1,6 @@
> -diff -Nru openjdk.orig/hotspot/make/linux/makefiles/gcc.make openjdk/hotspot/make/linux/makefiles/gcc.make
> ---- openjdk.orig/hotspot/make/linux/makefiles/gcc.make 2008-07-17 08:40:27.000000000 +0100
> -+++ openjdk/hotspot/make/linux/makefiles/gcc.make 2008-07-21 23:10:50.000000000 +0100
> -@@ -46,7 +46,11 @@
> +--- openjdk/hotspot/make/linux/makefiles/gcc.make.orig
> ++++ openjdk/hotspot/make/linux/makefiles/gcc.make
> +@@ -58,7 +58,11 @@
> # Compiler flags
>
> # position-independent code
> @@ -13,9 +12,9 @@
>
> VM_PICFLAG/LIBJVM = $(PICFLAG)
> VM_PICFLAG/AOUT =
> ---- rules.make.orig 2008-12-12 11:23:31.000000000 -0500
> -+++ openjdk/hotspot/make/linux/makefiles/rules.make 2008-12-12 11:32:26.000000000 -0500
> -@@ -138,20 +138,10 @@
> +--- openjdk/hotspot/make/linux/makefiles/rules.make.orig
> ++++ openjdk/hotspot/make/linux/makefiles/rules.make
> +@@ -146,20 +146,10 @@
> include $(GAMMADIR)/make/pic.make
> endif
>
> @@ -24,21 +23,21 @@
> %.o: %.cpp
> @echo Compiling $<
> $(QUIETLY) $(REMOVE_TARGET)
> - $(QUIETLY) $(COMPILE.CC) -o $@ $< $(COMPILE_DONE)
> + $(QUIETLY) $(COMPILE.CC) $(DEPFLAGS) -o $@ $< $(COMPILE_DONE)
> -else
> -%.o: %.cpp
> - @echo Compiling $<
> - $(QUIETLY) $(REMOVE_TARGET)
> - $(QUIETLY) $(if $(findstring $@, $(NONPIC_OBJ_FILES)), \
> -- $(subst $(VM_PICFLAG), ,$(COMPILE.CC)) -o $@ $< $(COMPILE_DONE), \
> -- $(COMPILE.CC) -o $@ $< $(COMPILE_DONE))
> +- $(subst $(VM_PICFLAG), ,$(COMPILE.CC)) $(DEPFLAGS) -o $@ $< $(COMPILE_DONE), \
> +- $(COMPILE.CC) $(DEPFLAGS) -o $@ $< $(COMPILE_DONE))
> -endif
>
> %.o: %.s
> @echo Assembling $<
> ---- rules.make.orig 2008-12-12 11:42:55.000000000 -0500
> -+++ openjdk/hotspot/make/solaris/makefiles/rules.make 2008-12-12 11:44:01.000000000 -0500
> -@@ -138,20 +138,10 @@
> +--- openjdk/hotspot/make/solaris/makefiles/rules.make.orig
> ++++ openjdk/hotspot/make/solaris/makefiles/rules.make
> +@@ -146,20 +146,10 @@
> include $(GAMMADIR)/make/pic.make
> endif
>
> @@ -47,14 +46,14 @@
> %.o: %.cpp
> @echo Compiling $<
> $(QUIETLY) $(REMOVE_TARGET)
> - $(QUIETLY) $(COMPILE.CC) -o $@ $< $(COMPILE_DONE)
> + $(QUIETLY) $(COMPILE.CC) $(DEPFLAGS) -o $@ $< $(COMPILE_DONE)
> -else
> -%.o: %.cpp
> - @echo Compiling $<
> - $(QUIETLY) $(REMOVE_TARGET)
> - $(QUIETLY) $(if $(findstring $@, $(NONPIC_OBJ_FILES)), \
> -- $(subst $(VM_PICFLAG), ,$(COMPILE.CC)) -o $@ $< $(COMPILE_DONE), \
> -- $(COMPILE.CC) -o $@ $< $(COMPILE_DONE))
> +- $(subst $(VM_PICFLAG), ,$(COMPILE.CC)) $(DEPFLAGS) -o $@ $< $(COMPILE_DONE), \
> +- $(COMPILE.CC) $(DEPFLAGS) -o $@ $< $(COMPILE_DONE))
> -endif
>
> %.o: %.s
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/icedtea-freetypeversion.patch
> --- a/patches/icedtea-freetypeversion.patch Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/icedtea-freetypeversion.patch Wed Jan 26 01:12:41 2011 +0100
> @@ -1,12 +1,11 @@
> -diff -Nru openjdk.orig/jdk/make/common/shared/Defs-versions.gmk openjdk/jdk/make/common/shared/Defs-versions.gmk
> ---- openjdk.orig/jdk/make/common/shared/Defs-versions.gmk 2010-08-27 19:16:10.000000000 +0100
> -+++ openjdk/jdk/make/common/shared/Defs-versions.gmk 2010-08-31 19:07:12.239786010 +0100
> -@@ -192,7 +192,7 @@
> +--- openjdk/jdk/make/common/shared/Defs-versions.gmk.orig
> ++++ openjdk/jdk/make/common/shared/Defs-versions.gmk
> +@@ -207,7 +207,7 @@
> # Generic
> REQUIRED_ANT_VER = 1.6.3
> REQUIRED_BOOT_VER = 1.6
> -REQUIRED_FREETYPE_VERSION = 2.3.0
> +REQUIRED_FREETYPE_VERSION = 2.2.1
> - REQUIRED_MAKE_VER = 3.78
> + REQUIRED_MAKE_VER = 3.81
> REQUIRED_UNZIP_VER = 5.12
> REQUIRED_ZIP_VER = 2.2
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/icedtea-javafiles.patch
> --- a/patches/icedtea-javafiles.patch Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/icedtea-javafiles.patch Wed Jan 26 01:12:41 2011 +0100
> @@ -1,6 +1,5 @@
> -diff -Nru openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_encoding.jmk openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_encoding.jmk
> ---- openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_encoding.jmk 2010-07-29 21:54:09.000000000 +0100
> -+++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_encoding.jmk 2010-09-01 19:20:12.256298401 +0100
> +--- openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_encoding.jmk.orig
> ++++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_encoding.jmk
> @@ -62,7 +62,6 @@
> com/sun/corba/se/impl/encoding/TypeCodeInputStream.java \
> com/sun/corba/se/impl/encoding/TypeCodeOutputStream.java \
> @@ -12,9 +11,8 @@
> + com/sun/corba/se/impl/encoding/WrapperInputStream.java \
> + com/sun/corba/se/impl/encoding/IDLJavaSerializationInputStream.java \
> + com/sun/corba/se/impl/encoding/IDLJavaSerializationOutputStream.java
> -diff -Nru openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_ior.jmk openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_ior.jmk
> ---- openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_ior.jmk 2010-07-29 21:54:09.000000000 +0100
> -+++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_ior.jmk 2010-09-01 19:20:12.264297713 +0100
> +--- openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_ior.jmk.orig
> ++++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_ior.jmk
> @@ -66,4 +66,5 @@
> com/sun/corba/se/impl/ior/iiop/JavaSerializationComponent.java \
> com/sun/corba/se/impl/ior/iiop/MaxStreamFormatVersionComponentImpl.java \
> @@ -22,9 +20,8 @@
> - com/sun/corba/se/impl/ior/iiop/ORBTypeComponentImpl.java
> + com/sun/corba/se/impl/ior/iiop/ORBTypeComponentImpl.java \
> + com/sun/corba/se/impl/ior/iiop/JavaSerializationComponent.java
> -diff -Nru openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_orbutil.jmk openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_orbutil.jmk
> ---- openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_orbutil.jmk 2010-07-29 21:54:09.000000000 +0100
> -+++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_orbutil.jmk 2010-09-01 19:20:12.264297713 +0100
> +--- openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_orbutil.jmk.orig
> ++++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_orbutil.jmk
> @@ -81,4 +81,5 @@
> com/sun/corba/se/impl/orbutil/graph/Node.java \
> com/sun/corba/se/impl/orbutil/graph/NodeData.java \
> @@ -32,9 +29,8 @@
> - com/sun/corba/se/impl/orbutil/graph/GraphImpl.java
> + com/sun/corba/se/impl/orbutil/graph/GraphImpl.java \
> + com/sun/corba/se/impl/orbutil/GetPropertyAction.java
> -diff -Nru openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_protocol.jmk openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_protocol.jmk
> ---- openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_protocol.jmk 2010-07-29 21:54:09.000000000 +0100
> -+++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_protocol.jmk 2010-09-01 19:20:12.264297713 +0100
> +--- openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_protocol.jmk.orig
> ++++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_impl_protocol.jmk
> @@ -81,5 +81,5 @@
> com/sun/corba/se/impl/protocol/giopmsgheaders/RequestMessage_1_1.java \
> com/sun/corba/se/impl/protocol/giopmsgheaders/RequestMessage_1_2.java \
> @@ -43,9 +39,8 @@
> -
> + com/sun/corba/se/impl/protocol/giopmsgheaders/TargetAddressHelper.java \
> + com/sun/corba/se/impl/protocol/giopmsgheaders/LocateReplyOrReplyMessage.java
> -diff -Nru openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_monitoring.jmk openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_monitoring.jmk
> ---- openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_monitoring.jmk 2010-07-29 21:54:09.000000000 +0100
> -+++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_monitoring.jmk 2010-09-01 19:20:12.264297713 +0100
> +--- openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_monitoring.jmk.orig
> ++++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_monitoring.jmk
> @@ -30,6 +30,7 @@
> com/sun/corba/se/spi/monitoring/StringMonitoredAttributeBase.java \
> com/sun/corba/se/spi/monitoring/LongMonitoredAttributeBase.java \
> @@ -54,9 +49,8 @@
> com/sun/corba/se/spi/monitoring/MonitoredAttributeInfo.java \
> com/sun/corba/se/spi/monitoring/MonitoredObject.java \
> com/sun/corba/se/spi/monitoring/MonitoredObjectFactory.java \
> -diff -Nru openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_presentation_rmi.jmk openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_presentation_rmi.jmk
> ---- openjdk.orig/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_presentation_rmi.jmk 2010-07-29 21:54:09.000000000 +0100
> -+++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_presentation_rmi.jmk 2010-09-01 19:20:12.264297713 +0100
> +--- openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_presentation_rmi.jmk.orig
> ++++ openjdk/corba/make/com/sun/corba/minclude/com_sun_corba_se_spi_presentation_rmi.jmk
> @@ -29,5 +29,6 @@
> com/sun/corba/se/spi/presentation/rmi/IDLNameTranslator.java \
> com/sun/corba/se/spi/presentation/rmi/PresentationDefaults.java \
> @@ -64,9 +58,8 @@
> + com/sun/corba/se/spi/presentation/rmi/PresentationDefaults.java \
> com/sun/corba/se/spi/presentation/rmi/StubAdapter.java
>
> -diff -Nru openjdk.orig/jdk/make/java/java/FILES_java.gmk openjdk/jdk/make/java/java/FILES_java.gmk
> ---- openjdk.orig/jdk/make/java/java/FILES_java.gmk 2010-07-29 21:55:26.000000000 +0100
> -+++ openjdk/jdk/make/java/java/FILES_java.gmk 2010-09-01 19:20:12.268297371 +0100
> +--- openjdk/jdk/make/java/java/FILES_java.gmk.orig
> ++++ openjdk/jdk/make/java/java/FILES_java.gmk
> @@ -29,6 +29,80 @@
> # will generate header files
> #
> @@ -148,9 +141,9 @@
> java/lang/Object.java \
> java/lang/AutoCloseable.java \
> java/lang/Class.java \
> -@@ -138,13 +212,6 @@
> - java/lang/Readable.java \
> +@@ -139,13 +213,6 @@
> java/lang/Override.java \
> + java/lang/SafeVarargs.java \
> java/lang/SuppressWarnings.java \
> - java/lang/ref/Reference.java \
> - java/lang/ref/SoftReference.java \
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/icedtea-lc_ctype.patch
> --- a/patches/icedtea-lc_ctype.patch Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/icedtea-lc_ctype.patch Wed Jan 26 01:12:41 2011 +0100
> @@ -1,31 +1,28 @@
> -diff -Nru openjdk.orig/jdk/src/solaris/native/java/lang/java_props_md.c openjdk/jdk/src/solaris/native/java/lang/java_props_md.c
> ---- openjdk.orig/jdk/src/solaris/native/java/lang/java_props_md.c 2010-11-12 01:20:49.000000000 +0000
> -+++ openjdk/jdk/src/solaris/native/java/lang/java_props_md.c 2010-11-12 18:31:00.049493600 +0000
> -@@ -118,7 +118,7 @@
> - #endif
> +--- openjdka/jdk/src/solaris/native/java/lang/java_props_md.c
> ++++ openjdk/jdk/src/solaris/native/java/lang/java_props_md.c
> +@@ -119,7 +119,7 @@
>
> - static int ParseLocale(int cat, char ** std_language, char ** std_country, char ** std_variant, char ** std_encoding) {
> + static int ParseLocale(int cat, char ** std_language, char ** std_script,
> + char ** std_country, char ** std_variant, char ** std_encoding) {
> - char temp[64];
> + char *temp;
> char *language = NULL, *country = NULL, *variant = NULL,
> *encoding = NULL;
> char *p, encoding_variant[64];
> -@@ -162,6 +162,7 @@
> +@@ -162,7 +162,7 @@
> + * <language name>_<country name>.<encoding name>@<variant name>
> * <country name>, <encoding name>, and <variant name> are optional.
> */
> -
> +-
> + temp = (char*) malloc(strlen(lc)+1);
> strcpy(temp, lc);
>
> /* Parse the language, country, encoding, and variant from the
> -@@ -282,6 +283,10 @@
> +@@ -301,6 +301,7 @@
> #endif
> }
>
> -+
> -+ /* Free temp */
> -+ free(temp);
> -+
> ++ free (temp);
> return 1;
> }
>
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/icedtea-signed-types.patch
> --- a/patches/icedtea-signed-types.patch Wed Jan 26 01:03:53 2011 +0100
> +++ b/patches/icedtea-signed-types.patch Wed Jan 26 01:12:41 2011 +0100
> @@ -1,7 +1,6 @@
> -diff -Nru openjdk.orig/hotspot/src/share/vm/asm/codeBuffer.hpp openjdk/hotspot/src/share/vm/asm/codeBuffer.hpp
> ---- openjdk.orig/hotspot/src/share/vm/asm/codeBuffer.hpp 2008-05-27 21:18:54.000000000 +0100
> -+++ openjdk/hotspot/src/share/vm/asm/codeBuffer.hpp 2008-05-27 21:56:42.000000000 +0100
> -@@ -81,7 +81,7 @@
> +--- openjdk/hotspot/src/share/vm/asm/codeBuffer.hpp.orig
> ++++ openjdk/hotspot/src/share/vm/asm/codeBuffer.hpp
> +@@ -93,7 +93,7 @@
> address _locs_point; // last relocated position (grows upward)
> bool _locs_own; // did I allocate the locs myself?
> bool _frozen; // no more expansion of this section
> @@ -10,22 +9,20 @@
> CodeBuffer* _outer; // enclosing CodeBuffer
>
> // (Note: _locs_point used to be called _last_reloc_offset.)
> -diff -Nru openjdk.orig/hotspot/src/share/vm/utilities/ostream.cpp openjdk/hotspot/src/share/vm/utilities/ostream.cpp
> ---- openjdk.orig/hotspot/src/share/vm/utilities/ostream.cpp 2008-05-27 21:18:54.000000000 +0100
> -+++ openjdk/hotspot/src/share/vm/utilities/ostream.cpp 2008-05-27 21:59:01.000000000 +0100
> -@@ -829,7 +829,7 @@
> +--- openjdk/hotspot/src/share/vm/utilities/ostream.cpp.orig
> ++++ openjdk/hotspot/src/share/vm/utilities/ostream.cpp
> +@@ -915,7 +915,7 @@
> server.sin_port = htons(port);
>
> server.sin_addr.s_addr = inet_addr(ip);
> - if (server.sin_addr.s_addr == (uint32_t)-1) {
> + if (server.sin_addr.s_addr == (in_addr_t)-1) {
> - #ifdef _WINDOWS
> - struct hostent* host = hpi::get_host_by_name((char*)ip);
> - #else
> -diff -r ca98ea212429 openjdk/hotspot/src/share/vm/ci/ciTypeFlow.cpp
> ---- openjdk/hotspot/src/share/vm/ci/ciTypeFlow.cpp Fri Aug 08 16:06:52 2008 +0100
> -+++ openjdk/hotspot/src/share/vm/ci/ciTypeFlow.cpp Fri Aug 08 16:15:45 2008 +0100
> -@@ -388,7 +388,7 @@ const ciTypeFlow::StateVector* ciTypeFlo
> + struct hostent* host = os::get_host_by_name((char*)ip);
> + if (host != NULL) {
> + memcpy(&server.sin_addr, host->h_addr_list[0], host->h_length);
> +--- openjdk/hotspot/src/share/vm/ci/ciTypeFlow.cpp.orig
> ++++ openjdk/hotspot/src/share/vm/ci/ciTypeFlow.cpp
> +@@ -403,7 +403,7 @@
> // Set the rest of the locals to bottom.
> Cell cell = state->next_cell(state->tos());
> state->set_stack_size(0);
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/icedtea-ssl.patch
> --- a/patches/icedtea-ssl.patch Wed Jan 26 01:03:53 2011 +0100
> +++ /dev/null Thu Jan 01 00:00:00 1970 +0000
> @@ -1,43 +0,0 @@
> ---- ../openjdkb23/openjdk/jdk/src/share/classes/sun/security/ssl/Handshaker.java 2007-10-30 04:38:10.000000000 -0400
> -+++ openjdk/jdk/src/share/classes/sun/security/ssl/Handshaker.java 2007-11-13 13:06:01.000000000 -0500
> -@@ -36,6 +36,7 @@
> - import java.security.PrivilegedExceptionAction;
> - import java.security.PrivilegedActionException;
> - import java.security.cert.X509Certificate;
> -+import java.security.spec.AlgorithmParameterSpec;
> -
> - import javax.crypto.*;
> - import javax.crypto.spec.*;
> -@@ -688,8 +683,8 @@
> - SecretKey masterSecret;
> - try {
> - KeyGenerator kg = JsseJce.getKeyGenerator("SunTlsMasterSecret");
> -- kg.init(spec);
> -- masterSecret = kg.generateKey();
> -+ kg.init((AlgorithmParameterSpec) spec);
> -+ masterSecret = kg.generateKey();
> - } catch (GeneralSecurityException e) {
> - // For RSA premaster secrets, do not signal a protocol error
> - // due to the Bleichenbacher attack. See comments further down.
> ---- ../openjdkb23/openjdk/jdk/src/share/classes/sun/security/ssl/RSAClientKeyExchange.java 2007-10-30 04:38:10.000000000 -0400
> -+++ openjdk/jdk/src/share/classes/sun/security/ssl/RSAClientKeyExchange.java 2007-11-13 13:06:42.000000000 -0500
> -@@ -36,6 +36,8 @@
> - import javax.net.ssl.*;
> -
> - import sun.security.internal.spec.TlsRsaPremasterSecretParameterSpec;
> -+import java.security.spec.AlgorithmParameterSpec;
> -+
> -
> - /**
> - * This is the client key exchange message (CLIENT --> SERVER) used with
> -@@ -104,8 +106,8 @@
> -
> - try {
> - KeyGenerator kg = JsseJce.getKeyGenerator("SunTlsRsaPremasterSecret");
> -- kg.init(new TlsRsaPremasterSecretParameterSpec(major, minor));
> -- preMaster = kg.generateKey();
> -+ kg.init((AlgorithmParameterSpec) (new TlsRsaPremasterSecretParameterSpec(major, minor)));
> -+ preMaster = kg.generateKey();
> -
> - Cipher cipher = JsseJce.getCipher(JsseJce.CIPHER_RSA_PKCS1);
> - cipher.init(Cipher.WRAP_MODE, publicKey, generator);
> diff -r e5b43d618ab5 -r 43fd56d0ce89 patches/no-precompiled.patch
> --- a/patches/no-precompiled.patch Wed Jan 26 01:03:53 2011 +0100
> +++ /dev/null Thu Jan 01 00:00:00 1970 +0000
> @@ -1,35 +0,0 @@
> ---- openjdk/hotspot/make/linux/makefiles/gcc.make~ 2009-10-30 11:54:26.000000000 +0100
> -+++ openjdk/hotspot/make/linux/makefiles/gcc.make 2009-10-30 11:55:34.000000000 +0100
> -@@ -34,13 +34,14 @@
> - CC_VER_MAJOR := $(shell $(CC) -dumpversion | sed 's/egcs-//' | cut -d'.' -f1)
> - CC_VER_MINOR := $(shell $(CC) -dumpversion | sed 's/egcs-//' | cut -d'.' -f2)
> -
> -+ifeq (,$(DISABLE_PRECOMPILED_HEADER))
> - # check for precompiled headers support
> - ifneq "$(shell expr \( $(CC_VER_MAJOR) \> 3 \) \| \( \( $(CC_VER_MAJOR) = 3 \) \& \( $(CC_VER_MINOR) \>= 4 \) \))" "0"
> - USE_PRECOMPILED_HEADER=1
> - PRECOMPILED_HEADER_DIR=.
> - PRECOMPILED_HEADER=$(PRECOMPILED_HEADER_DIR)/incls/_precompiled.incl.gch
> - endif
> --
> -+endif
> -
> - #------------------------------------------------------------------------
> - # Compiler flags
> ---- openjdk/hotspot/make/solaris/makefiles/gcc.make~ 2009-10-30 11:54:26.000000000 +0100
> -+++ openjdk/hotspot/make/solaris/makefiles/gcc.make 2009-10-30 11:56:05.000000000 +0100
> -@@ -45,12 +45,14 @@
> - $(shell $(CC) -dumpversion | sed 's/egcs-//' | cut -d'.' -f2)
> -
> -
> -+ifeq (,$(DISABLE_PRECOMPILED_HEADER))
> - # check for precompiled headers support
> - ifneq "$(shell expr \( $(CC_VER_MAJOR) \> 3 \) \| \( \( $(CC_VER_MAJOR) = 3 \) \& \( $(CC_VER_MINOR) \>= 4 \) \))" "0"
> - USE_PRECOMPILED_HEADER=1
> - PRECOMPILED_HEADER_DIR=.
> - PRECOMPILED_HEADER=$(PRECOMPILED_HEADER_DIR)/incls/_precompiled.incl.gch
> - endif
> -+endif
> -
> -
> - #------------------------------------------------------------------------
--
Andrew :)
Free Java Software Engineer
Red Hat, Inc. (http://www.redhat.com)
Support Free Java!
Contribute to GNU Classpath and IcedTea
http://www.gnu.org/software/classpath
http://icedtea.classpath.org
PGP Key: 94EFD9D8 (http://subkeys.pgp.net)
Fingerprint = F8EF F1EA 401E 2E60 15FA 7927 142C 2591 94EF D9D8
More information about the distro-pkg-dev
mailing list