/hg/icedtea7: 6 new changesets
andrew at icedtea.classpath.org
andrew at icedtea.classpath.org
Wed Sep 28 06:37:17 UTC 2016
changeset 9b93a43eeae0 in /hg/icedtea7
details: http://icedtea.classpath.org/hg/icedtea7?cmd=changeset;node=9b93a43eeae0
author: Andrew John Hughes <gnu_andrew at member.fsf.org>
date: Mon Sep 19 17:04:34 2016 +0100
PR3131: PaX marking fails on filesystems which don't support extended attributes
2016-04-07 Andrew John Hughes <gnu_andrew at member.fsf.org>
PR3131: PaX marking fails on filesystems which
don't support extended attributes
* Makefile.am:
(icedtea): Pass true to pax-mark-vm to fail
if PaX marking fails.
(icedtea-debug): Likewise.
(icedtea-boot): Likewise.
(install-exec-local): Pass false to pax-mark-vm
so that only a warning is produced if PaX marking
fails on the installed version.
* NEWS: Updated.
* pax-mark-vm.in:
Add a second option, FAIL_ON_ERROR, which will
cause the script to exit if it can't PaX mark
when set to true, but just issue a warning when
set to false.
changeset 3b7a6bd3fba0 in /hg/icedtea7
details: http://icedtea.classpath.org/hg/icedtea7?cmd=changeset;node=3b7a6bd3fba0
author: Andrew John Hughes <gnu_andrew at member.fsf.org>
date: Mon Sep 19 17:05:44 2016 +0100
PR3128: pax-mark-vm script calls "exit -1" which is invalid in dash
2016-08-04 Andrew John Hughes <gnu.andrew at member.fsf.org>
PR3128: pax-mark-vm script calls "exit -1" which
is invalid in dash
* NEWS: Updated.
* pax-mark-vm.in:
Use POSIX-compliant exit value.
changeset 6861d9e23185 in /hg/icedtea7
details: http://icedtea.classpath.org/hg/icedtea7?cmd=changeset;node=6861d9e23185
author: Andrew John Hughes <gnu_andrew at member.fsf.org>
date: Mon Sep 19 18:51:18 2016 +0100
PR3135: Makefile.am rule stamps/add/tzdata-support-debug.stamp has a typo in add-tzdata dependency
2016-08-19 Andrew John Hughes <gnu.andrew at member.fsf.org>
PR3135: Makefile.am rule
stamps/add/tzdata-support-debug.stamp has a typo in
add-tzdata dependency
* NEWS: Updated.
2016-08-10 Tiago Sturmer Daitx <tdaitx at linux.vnet.ibm.com>
PR3135: Makefile.am rule
stamps/add/tzdata-support-debug.stamp has a typo in
add-tzdata dependency
* Makefile.am:
(icedtea-debug-stage2): Fix typo in
add-tzdata-support-debug dependency.
changeset 27857942e4d5 in /hg/icedtea7
details: http://icedtea.classpath.org/hg/icedtea7?cmd=changeset;node=27857942e4d5
author: Andrew John Hughes <gnu_andrew at member.fsf.org>
date: Mon Sep 19 18:55:31 2016 +0100
PR3141: Pass $(CC) and $(CXX) to OpenJDK build
2016-08-14 Andrew John Hughes <gnu.andrew at member.fsf.org>
PR3141: Pass $(CC) and $(CXX) to OpenJDK build
* Makefile.am:
(ICEDTEA_ENV): Set CC and CXX instead
of BUILD_GCC and BUILD_CXX.
* NEWS: Updated.
changeset dbc79f1b0445 in /hg/icedtea7
details: http://icedtea.classpath.org/hg/icedtea7?cmd=changeset;node=dbc79f1b0445
author: Andrew John Hughes <gnu_andrew at member.fsf.org>
date: Mon Sep 19 19:06:57 2016 +0100
PR3166: invalid zip timestamp handling leads to error building bootstrap-javac
2016-08-19 Andrew John Hughes <gnu.andrew at member.fsf.org>
PR3166: invalid zip timestamp handling leads to
error building bootstrap-javac
* AUTHORS: Add Ricardo Ribalda.
* NEWS: Updated.
2016-08-19 Ricardo Ribalda <ricardo.ribalda at gmail.com>
PR3166: invalid zip timestamp handling leads to
error building bootstrap-javac
* Makefile.am:
(rt): Don't use -u so files are always overwritten,
regardless of timestamps.
changeset 11416bb1b308 in /hg/icedtea7
details: http://icedtea.classpath.org/hg/icedtea7?cmd=changeset;node=11416bb1b308
author: Andrew John Hughes <gnu_andrew at member.fsf.org>
date: Wed Sep 28 07:32:57 2016 +0100
Bump to icedtea-2.7.0pre07.
Upstream changes:
- Bump to icedtea-2.7.0pre07
- PR2938: Fix build of 8148487 backport
- PR3102: Extend 8022594 to AixPollPort
- S4858370: JDWP: Memory Leak: GlobalRefs never deleted when processing invokeMethod command
- S4963723: Implement SHA-224
- S6414899: P11Digest should support cloning
- S6425769: Allow specifying an address to bind JMX remote connector
- S6854417: TESTBUG: java/util/regex/RegExTest.java fails intermittently
- S6953295: Move few sun.security.{util, x509, pkcs} classes used by keytool/jarsigner to another package
- S6956398: make ephemeral DH key match the length of the certificate key
- S6961123: setWMClass fails to null-terminate WM_CLASS string
- S6966259: Make PrincipalName and Realm immutable
- S7044060: Need to support NSA Suite B Cryptography algorithms
- S7060849: Eliminate pack200 build warnings
- S7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
- S7069870: Parts of the JDK erroneously rely on generic array initializers with diamond
- S7081817: test/sun/security/provider/certpath/X509CertPath/IllegalCertiticates.java failing
- S7102686: Restructure timestamp code so that jars and modules can more easily share the same code
- S7105780: Add SSLSocket client/SSLEngine server to templates directory
- S7127906: (launcher) convert the launcher regression tests to java
- S7142339: PKCS7.java is needlessly creating SHA1PRNG SecureRandom instances when timestamping is not done
- S7152582: PKCS11 tests should use the NSS libraries available in the OS
- S7167988: PKIX CertPathBuilder in reverse mode doesn't work if more than one trust anchor is specified
- S7192202: Make sure keytool prints both unknown and unparseable extensions
- S7194449: String resources for Key Tool and Policy Tool should be in their respective packages
- S7196855: autotest.sh fails on ubuntu because libsoftokn.so not found
- S7200682: TEST_BUG: keytool/autotest.sh still has problems with libsoftokn.so
- S8002116: This JdbReadTwiceTest.sh gets an exit 1
- S8002306: (se) Selector.open fails if invoked with thread interrupt status set [win]
- S8004007: test/sun/tools/jinfo/Basic.sh fails on when runSA is set to true
- S8005226: java/rmi/transport/pinClientSocketFactory/PinClientSocketFactory.java fails intermittently
- S8006935: Need to take care of long secret keys in HMAC/PRF compuation
- S8007890: [TESTBUG] JcmdWithNMTDisabled.java fails when invoked with NMT explicitly turned on
- S8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
- S8014097: add doPrivileged methods with limited privilege scope
- S8019341: Update CookieHttpsClientTest to use the newer framework.
- S8021191: Add isAuthorized check to limited doPrivileged methods
- S8022228: Intermittent test failures in sun/security/ssl/javax/net/ssl/NewAPIs
- S8022439: Fix lint warnings in sun.security.ec
- S8022594: Potential deadlock in <clinit> of sun.nio.ch.Util/IOUtil
- S8023546: sun/security/mscapi/ShortRSAKey1024.sh fails intermittently
- S8027705: com/sun/jdi/JdbMethodExitTest.sh fails when a background thread is generating events.
- S8028537: PPC64: Updated the JDK regression tests to run on AIX
- S8028780: JDK KRB5 module throws OutOfMemoryError when CCache is corrupt
- S8036132: Tab characters in test/com/sun/jdi files
- S8036612: [parfait] JNI exception pending in jdk/src/windows/native/sun/security/mscapi/security.cpp
- S8037557: test SessionCacheSizeTests.java timeout
- S8038837: Add support to jarsigner for specifying timestamp hash algorithm
- S8038963: com/sun/jdi tests fail because cygwin's ps sometimes misses processes
- S8039921: SHA1WithDSA with key > 1024 bits not working
- S8044419: TEST_BUG: com/sun/jdi/JdbReadTwiceTest.sh fails when run under root
- S8048030: Expectations should be consistent
- S8059054: Better URL processing
- S8059661: Test SoftReference and OOM behavior
- S8064331: JavaSecurityAccess.doIntersectionPrivilege() drops the information about the domain combiner of the stack ACC
- S8068761: [TEST_BUG] java/nio/channels/ServerSocketChannel/AdaptServerSocket.java failed with SocketTimeoutException
- S8068842: Better JAXP data handling
- S8072753: Nondeterministic wrong answer on arithmetic
- S8072932: Test fails with java.security.AccessControlException: access denied ("java.security.SecurityPermission" "getDomainCombiner")
- S8073735: [TEST_BUG] compiler/loopopts/CountedLoopProblem.java got OOME
- S8074068: Cleanup in src/share/classes/sun/security/x509/
- S8074146: [TEST_BUG] jdb has succeded to read an unreadable file
- S8075773: jps running as root fails after the fix of JDK-8050807
- S8076339: Better handling of remote object invocation
- S8076383: Better CORBA exception handling
- S8076387: Better CORBA value handling
- S8076392: Improve IIOPInputStream consistency
- S8076413: Better JRMP message handling
- S8076506: Increment minor version of HSx for 7u91 and initialize the build number
- S8078427: More supportive home environment
- S8078440: Safer managed types
- S8078822: 8068842 fix missed one new file PrimeNumberSequenceGenerator.java
- S8079323: Serialization compatibility for Templates: need to exclude Hashtable from serialization
- S8079410: Hotspot version to share the same update and build version from JDK
- S8079718: IIOP Input Stream Hooking
- S8080541: More direct property handling
- S8080688: Service for DGC services
- S8081297: SSL Problem with Tomcat
- S8081475: SystemTap does not work when JDK is compiled with GCC 5
- S8081760: Better group dynamics
- S8086092: More palette improvements
- S8086733: Improve namespace handling
- S8087118: Remove missing package from java.security files
- S8087120: [GCC5] java.lang.StackOverflowError on Zero JVM initialization on non x86 platforms.
- S8087350: Improve array conversions
- S8098547: (tz) Support tzdata2015e
- S8103671: More objective stream classes
- S8103675: Better Binary searches
- S8129952: Ensure thread consistency
- S8130078: Document better processing
- S8130193: Improve HTTP connections
- S8130253: ObjectStreamClass.getFields too restrictive
- S8130710: Better attributes processing
- S8130735: javax.swing.TimerQueue: timer fires late when another timer starts
- S8130864: Better server identity handling
- S8130891: (bf) More direct buffering
- S8131181: Increment minor version of HSx for 7u95 and initialize the build number
- S8131291: Perfect parameter patterning
- S8132042: Preserve layout presentation
- S8132051: Better byte behavior
- S8132082: Let OracleUcrypto accept RSAPrivateKey
- S8132210: Reinforce JMX collector internals
- S8132988: Better printing dialogues
- S8133321: (tz) Support tzdata2015f
- S8133962: More general limits
- S8134297: NPE in GSSNameElement nameType check
- S8134605: Partial rework of the fix for 8081297
- S8134650: Xsl transformation gives different results in 8u66
- S8134861: XSLT: Extension func call cause exception if namespace URI contains partial package name
- S8135043: ObjectStreamClass.getField(String) too restrictive
- S8135307: CompletionFailure thrown when calling FieldDoc.type, if the field's type is missing
- S8137060: JMX memory management improvements
- S8138593: Make DSA more fair
- S8138716: (tz) Support tzdata2015g
- S8139008: Better state table management
- S8139012: Better font substitutions
- S8139017: More stable image decoding
- S8139436: sun.security.mscapi.KeyStore might load incomplete data
- S8140244: Port fix of JDK-8075773 to MacOSX
- S8140244, PR3171: Port fix of JDK-8075773 to AIX
- S8140344: add support for 3 digit update release numbers
- S8140543: Arrange font actions
- S8141213: [Parfait]Potentially blocking function GetArrayLength called in JNI critical region at line 239 of jdk/src/share/native/sun/awt/image/jpeg/jpegdecoder.c in function GET_ARRAYS
- S8141229: [Parfait] Null pointer dereference in cmsstrcasecmp of cmserr.c
- S8141287: Add MD5 to jdk.certpath.disabledAlgorithms - Take 2
- S8142882: rebinding of the receiver of a DirectMethodHandle may allow a protected method to be accessed
- S8142928: [TEST_BUG] sun/security/provider/certpath/ReverseBuilder/ReverseBuild.java 8u71 failure
- S8143002: [Parfait] JNI exception pending in fontpath.c:1300
- S8143132: L10n resource file translation update
- S8143167: Better buffering of XML strings
- S8143185: Cleanup for handling proxies
- S8143941: Update splashscreen displays
- S8144313: Test SessionTimeOutTests can be timeout
- S8144430: Improve JMX connections
- S8144773: Further reduce use of MD5
- S8144955: Wrong changes were pushed with 8143942
- S8145017: Add support for 3 digit hotspot minor version numbers
- S8145446: Perfect pipe placement
- S8145551: Test failed with Crash for Improved font lookups
- S8145982: JMXInterfaceBindingTest is failing intermittently
- S8146015: JMXInterfaceBindingTest is failing intermittently for IPv6 addresses
- S8146387: Test SSLSession/SessionCacheSizeTests socket accept timed out
- S8146477: [TEST_BUG] ClientJSSEServerJSSE.java failing again
- S8146494: Better ligature substitution
- S8146498: Better device table adjustments
- S8146669: Test SessionTimeOutTests fails intermittently
- S8146967: [TEST_BUG] javax/security/auth/SubjectDomainCombiner/Optimize.java should use 4-args ProtectionDomain constructor
- S8146993: Several javax/management/remote/mandatory regression tests fail after JDK-8138811
- S8147466: Add -fno-strict-overflow to IndicRearrangementProcessor{,2}.cpp
- S8147567: InterpreterRuntime::post_field_access not updated for boolean in JDK-8132051
- S8147771: Construction of static protection domains under Javax custom policy
- S8147857: [TEST] RMIConnector logs attribute names incorrectly
- S8148446: (tz) Support tzdata2016a
- S8148475: Missing SA Bytecode updates.
- S8148487: PPC64: Better byte behavior
- S8148872: Complete name checking
- S8149170: Better byte behavior for native arguments
- S8149367: PolicyQualifierInfo/index_Ctor JCk test fails with IOE: Invalid encoding for PolicyQualifierInfo
- S8149962: Better delineation of XML processing
- S8150012: Better byte behavior for reflection
- S8150752: Share Class Data
- S8150790: 8u75 L10n resource file translation update
- S8151841: Build needs additional flags to compile with GCC 6
- S8151876: (tz) Support tzdata2016d
- S8151925: Font reference improvements
- S8152335: Improve MethodHandle consistency
- S8152479: Coded byte streams
- S8153673: [BACKOUT] JDWP: Memory Leak: GlobalRefs never deleted when processing invokeMethod command
- S8154210: Zero: Better byte behaviour
- S8154413: AArch64: Better byte behaviour
- S8155981: Bolster bytecode verification
- S8155985: Persistent Parameter Processing
- S8157077: 8u101 L10n resource file updates
- S8158571: Additional method handle validation
- S8161262: Fix jdk build with gcc 4.1.2: -fno-strict-overflow not known.
- S8162344: The API changes made by CR 7064075 need to be reverted
ChangeLog:
2016-09-24 Andrew John Hughes <gnu.andrew at member.fsf.org>
Bump to icedtea-2.7.0pre07.
* Makefile.am,
(JDK_UPDATE_VERSION): Set to 111.
(BUILD_VERSION): Set to b01.
(CORBA_CHANGESET): Update to icedtea-2.7.0pre07.
(JAXP_CHANGESET): Likewise.
(JAXWS_CHANGESET): Likewise.
(JDK_CHANGESET): Likewise.
(LANGTOOLS_CHANGESET): Likewise.
(OPENJDK_CHANGESET): Likewise.
(CORBA_SHA256SUM): Likewise.
(JAXP_SHA256SUM): Likewise.
(JAXWS_SHA256SUM): Likewise.
(JDK_SHA256SUM): Likewise.
(LANGTOOLS_SHA256SUM): Likewise.
(OPENJDK_SHA256SUM): Likewise.
* configure.ac: Bump to 2.7.0pre07.
* hotspot.map.in: Update to icedtea-2.7.0pre07.
* patches/boot/ecj-diamond.patch:
Add numerous cases in JAXP classes, along with
com.sun.java.util.jar.pack, java.security.Provider,
java.security.Security, javax.crypto.Cipher,
javax.crypto.CryptoAllPermission,
javax.crypto.CryptoPermissions,
javax.crypto.CryptoPolicyParser,
javax.crypto.JceSecurity, javax.crypto.JceSecurityManager,
javax.management.remote.rmi.RMIJRMPServerImpl,
sun.reflect.annotation.AnnotationInvocationHandler,
sun.security.krb5.Krb5ServiceLocator,
sun.security.provider.certpath.CertStoreHelper,
sun.security.provider.certpath.ssl.SSLServerCertStore,
sun.security.provider.certpath.URICertStore and
sun.security.ssl.DHCrypt
* patches/boot/ecj-multicatch.patch:
Add sun.security.krb5.PrincipalName,
java.lang.invoke.MemberName,
sun.invoke.util.VerifyAccess,
javax.crypto.EncryptedPrivateKeyInfo,
javax.crypto.SealedObject,
sun.security.provider.certpath.URICertStore,
sun.security.ssl.RSAClientKeyExchange,
sun.security.pkcs11.P11KeyStore,
sun.security.pkcs11.P11RSAKeyFactory and
sun.security.tools.keytool.Main
* patches/boot/ecj-stringswitch.patch:
Add cases in
sun.security.krb5.Config,
sun.security.provider.certpath.X509CertPath,
sun.security.ssl.HandshakeMessage,
sun.security.ssl.X509KeyManagerImpl,
sun.security.pkcs11.Config,
sun.security.pkcs11.P11Key,
sun.security.sasl.digest.DigestMD5Base,
sun.security.sasl.digest.DigestMD5Server,
sun.security.sasl.ntlm.NTLMClient,
sun.security.sasl.ntlm.NTLMServer and
sun.security.sasl.util.AbstractSaslImpl.
* patches/boot/ecj-trywithresources.patch:
Add cases in
sun.security.provider.certpath.URICertStore,
sun.security.tools.KeyStoreUtil,
sun.security.tools.keytool.Main.
diffstat:
AUTHORS | 1 +
ChangeLog | 132 +
Makefile.am | 46 +-
NEWS | 6 +
configure.ac | 2 +-
hotspot.map.in | 2 +-
patches/boot/ecj-diamond.patch | 3438 +++++++++++++++++++++++-------
patches/boot/ecj-multicatch.patch | 277 ++
patches/boot/ecj-stringswitch.patch | 700 +++++-
patches/boot/ecj-trywithresources.patch | 369 ++-
pax-mark-vm.in | 14 +-
11 files changed, 3996 insertions(+), 991 deletions(-)
diffs (truncated from 8309 to 500 lines):
diff -r 29f1530968d9 -r 11416bb1b308 AUTHORS
--- a/AUTHORS Fri Jul 29 07:40:56 2016 +0100
+++ b/AUTHORS Wed Sep 28 07:32:57 2016 +0100
@@ -35,6 +35,7 @@
Xerxes RÃ¥nby <xerxes at zafena.se>
Damien Raude-Morvan <drazzib at drazzib.com>
Mark Reinhold <mr at sun.com>
+Ricardo Ribalda <ricardo.ribalda at gmail.com>
Bernhard Rosenkränzer <bero at arklinux.org>
Marc Schoenefeld <mschoene at redhat.com>
Keith Seitz <keiths at redhat.com>
diff -r 29f1530968d9 -r 11416bb1b308 ChangeLog
--- a/ChangeLog Fri Jul 29 07:40:56 2016 +0100
+++ b/ChangeLog Wed Sep 28 07:32:57 2016 +0100
@@ -1,3 +1,134 @@
+2016-09-24 Andrew John Hughes <gnu.andrew at member.fsf.org>
+
+ Bump to icedtea-2.7.0pre07.
+ * Makefile.am,
+ (JDK_UPDATE_VERSION): Set to 111.
+ (BUILD_VERSION): Set to b01.
+ (CORBA_CHANGESET): Update to icedtea-2.7.0pre07.
+ (JAXP_CHANGESET): Likewise.
+ (JAXWS_CHANGESET): Likewise.
+ (JDK_CHANGESET): Likewise.
+ (LANGTOOLS_CHANGESET): Likewise.
+ (OPENJDK_CHANGESET): Likewise.
+ (CORBA_SHA256SUM): Likewise.
+ (JAXP_SHA256SUM): Likewise.
+ (JAXWS_SHA256SUM): Likewise.
+ (JDK_SHA256SUM): Likewise.
+ (LANGTOOLS_SHA256SUM): Likewise.
+ (OPENJDK_SHA256SUM): Likewise.
+ * configure.ac: Bump to 2.7.0pre07.
+ * hotspot.map.in: Update to icedtea-2.7.0pre07.
+ * patches/boot/ecj-diamond.patch:
+ Add numerous cases in JAXP classes, along with
+ com.sun.java.util.jar.pack, java.security.Provider,
+ java.security.Security, javax.crypto.Cipher,
+ javax.crypto.CryptoAllPermission,
+ javax.crypto.CryptoPermissions,
+ javax.crypto.CryptoPolicyParser,
+ javax.crypto.JceSecurity, javax.crypto.JceSecurityManager,
+ javax.management.remote.rmi.RMIJRMPServerImpl,
+ sun.reflect.annotation.AnnotationInvocationHandler,
+ sun.security.krb5.Krb5ServiceLocator,
+ sun.security.provider.certpath.CertStoreHelper,
+ sun.security.provider.certpath.ssl.SSLServerCertStore,
+ sun.security.provider.certpath.URICertStore and
+ sun.security.ssl.DHCrypt
+ * patches/boot/ecj-multicatch.patch:
+ Add sun.security.krb5.PrincipalName,
+ java.lang.invoke.MemberName,
+ sun.invoke.util.VerifyAccess,
+ javax.crypto.EncryptedPrivateKeyInfo,
+ javax.crypto.SealedObject,
+ sun.security.provider.certpath.URICertStore,
+ sun.security.ssl.RSAClientKeyExchange,
+ sun.security.pkcs11.P11KeyStore,
+ sun.security.pkcs11.P11RSAKeyFactory and
+ sun.security.tools.keytool.Main
+ * patches/boot/ecj-stringswitch.patch:
+ Add cases in
+ sun.security.krb5.Config,
+ sun.security.provider.certpath.X509CertPath,
+ sun.security.ssl.HandshakeMessage,
+ sun.security.ssl.X509KeyManagerImpl,
+ sun.security.pkcs11.Config,
+ sun.security.pkcs11.P11Key,
+ sun.security.sasl.digest.DigestMD5Base,
+ sun.security.sasl.digest.DigestMD5Server,
+ sun.security.sasl.ntlm.NTLMClient,
+ sun.security.sasl.ntlm.NTLMServer and
+ sun.security.sasl.util.AbstractSaslImpl.
+ * patches/boot/ecj-trywithresources.patch:
+ Add cases in
+ sun.security.provider.certpath.URICertStore,
+ sun.security.tools.KeyStoreUtil,
+ sun.security.tools.keytool.Main.
+
+2016-08-19 Andrew John Hughes <gnu.andrew at member.fsf.org>
+
+ PR3166: invalid zip timestamp handling leads to
+ error building bootstrap-javac
+ * AUTHORS: Add Ricardo Ribalda.
+ * NEWS: Updated.
+
+2016-08-19 Ricardo Ribalda <ricardo.ribalda at gmail.com>
+
+ PR3166: invalid zip timestamp handling leads to
+ error building bootstrap-javac
+ * Makefile.am:
+ (rt): Don't use -u so files are always overwritten,
+ regardless of timestamps.
+
+2016-08-14 Andrew John Hughes <gnu.andrew at member.fsf.org>
+
+ PR3141: Pass $(CC) and $(CXX) to OpenJDK build
+ * Makefile.am:
+ (ICEDTEA_ENV): Set CC and CXX instead
+ of BUILD_GCC and BUILD_CXX.
+ * NEWS: Updated.
+
+2016-08-19 Andrew John Hughes <gnu.andrew at member.fsf.org>
+
+ PR3135: Makefile.am rule
+ stamps/add/tzdata-support-debug.stamp has a typo in
+ add-tzdata dependency
+ * NEWS: Updated.
+
+2016-08-10 Tiago Sturmer Daitx <tdaitx at linux.vnet.ibm.com>
+
+ PR3135: Makefile.am rule
+ stamps/add/tzdata-support-debug.stamp has a typo in
+ add-tzdata dependency
+ * Makefile.am:
+ (icedtea-debug-stage2): Fix typo in
+ add-tzdata-support-debug dependency.
+
+2016-08-04 Andrew John Hughes <gnu.andrew at member.fsf.org>
+
+ PR3128: pax-mark-vm script calls "exit -1" which
+ is invalid in dash
+ * NEWS: Updated.
+ * pax-mark-vm.in:
+ Use POSIX-compliant exit value.
+
+2016-04-07 Andrew John Hughes <gnu_andrew at member.fsf.org>
+
+ PR3131: PaX marking fails on filesystems which
+ don't support extended attributes
+ * Makefile.am:
+ (icedtea): Pass true to pax-mark-vm to fail
+ if PaX marking fails.
+ (icedtea-debug): Likewise.
+ (icedtea-boot): Likewise.
+ (install-exec-local): Pass false to pax-mark-vm
+ so that only a warning is produced if PaX marking
+ fails on the installed version.
+ * NEWS: Updated.
+ * pax-mark-vm.in:
+ Add a second option, FAIL_ON_ERROR, which will
+ cause the script to exit if it can't PaX mark
+ when set to true, but just issue a warning when
+ set to false.
+
2016-07-28 Andrew John Hughes <gnu.andrew at member.fsf.org>
* NEWS: Add 2.6.7 release notes.
@@ -224,6 +355,7 @@
2016-07-20 Andrew John Hughes <gnu.andrew at member.fsf.org>
+ Bump to icedtea-2.7.0pre06.
* Makefile.am,
(CORBA_CHANGESET): Update to icedtea-2.7.0pre06.
(JAXP_CHANGESET): Likewise.
diff -r 29f1530968d9 -r 11416bb1b308 Makefile.am
--- a/Makefile.am Fri Jul 29 07:40:56 2016 +0100
+++ b/Makefile.am Wed Sep 28 07:32:57 2016 +0100
@@ -1,22 +1,22 @@
# Dependencies
-JDK_UPDATE_VERSION = 85
-BUILD_VERSION = b02
+JDK_UPDATE_VERSION = 111
+BUILD_VERSION = b01
COMBINED_VERSION = $(JDK_UPDATE_VERSION)-$(BUILD_VERSION)
-CORBA_CHANGESET = b6bef4d9a428
-JAXP_CHANGESET = a2cd36a76d22
-JAXWS_CHANGESET = 5c8bb4727c60
-JDK_CHANGESET = d35404fe9590
-LANGTOOLS_CHANGESET = bd3480b6d64a
-OPENJDK_CHANGESET = 05d8ac2f0610
-
-CORBA_SHA256SUM = b867a0abce87e74decaa8a3b3376f31cca1f53b9a2915ed6fa449b071215fe73
-JAXP_SHA256SUM = c82f8df09f60ba56c149f4e115cc286f836158ae45964c438757a6c27c9cdeb5
-JAXWS_SHA256SUM = bcd111e8fffd5fd5409af96d8cb7bd4ef1a79e21c7f52b76d7dec3de0b5b8a4e
-JDK_SHA256SUM = 8c61ecafde4c3f5f68ceaaeea40b77b00dafb5597505f004c86c3cb5df76445d
-LANGTOOLS_SHA256SUM = 20d515c4c71055c1f3632d7b9f054f866e8b77dce8214d4618d17ec5e9752999
-OPENJDK_SHA256SUM = b692c2f521c6880f9ddfff642ad44cc258abae5d8f47ddc614761f2b95be1f88
+CORBA_CHANGESET = 205f6d4b66fe
+JAXP_CHANGESET = 80897e67a1b3
+JAXWS_CHANGESET = cee876f061b3
+JDK_CHANGESET = 5e3d7e2b2a00
+LANGTOOLS_CHANGESET = e5b9f24eecf6
+OPENJDK_CHANGESET = 0c642b015379
+
+CORBA_SHA256SUM = f0c395f05fc5134044596ce6953fb95c27cef19d3c42acbd8ffa42355f983567
+JAXP_SHA256SUM = 7d357b8815f6f6371db0ea9d6aae1ff0f973a4befaf8ce27dd89533b8291e3fb
+JAXWS_SHA256SUM = 266133740e9b018edb7b004d8923c1f9f3fe8bf778e597d561614d194ba6c98b
+JDK_SHA256SUM = 6122cde4d043c89b6de5333e0b7aeff605dd350fd2ba7e9bc95a1aca25af7051
+LANGTOOLS_SHA256SUM = 37a84be24c950dcfc95c52e4949c1ac2ef67e375022104ee48aa412bc4c8fffd
+OPENJDK_SHA256SUM = 509256e03441e832791589717947af3e9b6d35baeb4dc75a78af79e22534f9fe
DROP_URL = http://icedtea.classpath.org/download/drops
@@ -618,8 +618,8 @@
ALT_OUTPUTDIR="$(BUILD_OUTPUT_DIR)" \
VERBOSE="$(VERBOSE)" \
STATIC_CXX="false" \
- BUILD_GCC="$(CC)" \
- BUILD_CXX="$(CXX)" \
+ CC="$(CC)" \
+ CXX="$(CXX)" \
SYSTEM_CUPS="${ENABLE_SYSTEM_CUPS}" \
CUPS_LIBS="${CUPS_LIBS}" \
CUPS_CFLAGS="${CUPS_CFLAGS}" \
@@ -2032,7 +2032,7 @@
$(ICEDTEA_ENV) \
-C openjdk/ \
$(ICEDTEA_BUILD_TARGET)
- $(abs_top_builddir)/pax-mark-vm $(BUILD_SDK_DIR)
+ $(abs_top_builddir)/pax-mark-vm $(BUILD_SDK_DIR) true
mkdir -p $(BUILD_SDK_DIR)/jre/lib/$(INSTALL_ARCH_DIR)
mkdir -p $(BUILD_JRE_DIR)/lib/$(INSTALL_ARCH_DIR)
mkdir -p $(BUILD_SDK_DIR)/jre/lib/ext
@@ -2184,7 +2184,7 @@
$(ICEDTEA_ENV) \
-C openjdk/ \
$(ICEDTEA_DEBUG_BUILD_TARGET)
- $(abs_top_builddir)/pax-mark-vm $(BUILD_DEBUG_SDK_DIR)
+ $(abs_top_builddir)/pax-mark-vm $(BUILD_DEBUG_SDK_DIR) true
mkdir -p $(BUILD_DEBUG_SDK_DIR)/jre/lib/$(INSTALL_ARCH_DIR)
mkdir -p $(BUILD_DEBUG_JRE_DIR)/lib/$(INSTALL_ARCH_DIR)
mkdir -p $(BUILD_DEBUG_SDK_DIR)/jre/lib/ext
@@ -2338,7 +2338,7 @@
stamps/icedtea-debug-stage2.stamp: stamps/icedtea-debug.stamp \
stamps/add-cacao-debug.stamp stamps/add-zero-debug.stamp stamps/add-jamvm-debug.stamp \
- stamps/add-systemtap-debug.stamp stamps/add/tzdata-support-debug.stamp \
+ stamps/add-systemtap-debug.stamp stamps/add-tzdata-support-debug.stamp \
stamps/check-crypto-debug.stamp stamps/add-archive-debug.stamp stamps/split-debuginfo-debug.stamp \
stamps/add-mime-types-file-debug.stamp
mkdir -p stamps
@@ -2358,7 +2358,7 @@
$(ICEDTEA_ENV_BOOT) \
-C openjdk-boot \
$(ICEDTEA_BUILD_TARGET)
- $(abs_top_builddir)/pax-mark-vm $(BUILD_BOOT_SDK_DIR)
+ $(abs_top_builddir)/pax-mark-vm $(BUILD_BOOT_SDK_DIR) true
# Fix permissions on JARs updated during build if PR1437 bug is present
if PR1437_PRESENT
if [ -e $(BUILD_BOOT_SDK_DIR)/lib/sa-jdi.jar ] ; then \
@@ -3025,7 +3025,7 @@
cp -a ../../$$dirs $$destpath ; \
done ; \
if [ -w $(STAGE1_BOOT_RUNTIME) ] ; then \
- $(ZIP) -qur $(STAGE1_BOOT_RUNTIME) com java javax sun ; \
+ $(ZIP) -qr $(STAGE1_BOOT_RUNTIME) com java javax sun ; \
fi ; ) \
fi
mkdir -p stamps
@@ -3256,7 +3256,7 @@
for files in $(BUILD_SDK_DIR)/tapset/*.stp; do \
$(call install_file,$${files},$(DESTDIR)${prefix}/tapset,$(INSTALL_DATA));\
done
- $(abs_top_builddir)/pax-mark-vm $(DESTDIR)${prefix}
+ $(abs_top_builddir)/pax-mark-vm $(DESTDIR)${prefix} false
install-data-local:
${mkinstalldirs} $(DESTDIR)${prefix}
diff -r 29f1530968d9 -r 11416bb1b308 NEWS
--- a/NEWS Fri Jul 29 07:40:56 2016 +0100
+++ b/NEWS Wed Sep 28 07:32:57 2016 +0100
@@ -16,6 +16,12 @@
* Backports
- S8076221, PR2809, RH1302385: Disable RC4 cipher suites
+* Bug fixes
+ - PR3128: pax-mark-vm script calls "exit -1" which is invalid in dash
+ - PR3131: PaX marking fails on filesystems which don't support extended attributes
+ - PR3135: Makefile.am rule stamps/add/tzdata-support-debug.stamp has a typo in add-tzdata dependency
+ - PR3141: Pass $(CC) and $(CXX) to OpenJDK build
+ - PR3166: invalid zip timestamp handling leads to error building bootstrap-javac
New in release 2.6.7 (2016-07-28):
diff -r 29f1530968d9 -r 11416bb1b308 configure.ac
--- a/configure.ac Fri Jul 29 07:40:56 2016 +0100
+++ b/configure.ac Wed Sep 28 07:32:57 2016 +0100
@@ -1,4 +1,4 @@
-AC_INIT([icedtea], [2.7.0pre06], [distro-pkg-dev at openjdk.java.net])
+AC_INIT([icedtea], [2.7.0pre07], [distro-pkg-dev at openjdk.java.net])
AM_INIT_AUTOMAKE([1.9 tar-pax foreign])
AM_MAINTAINER_MODE([enable])
AC_CONFIG_FILES([Makefile])
diff -r 29f1530968d9 -r 11416bb1b308 hotspot.map.in
--- a/hotspot.map.in Fri Jul 29 07:40:56 2016 +0100
+++ b/hotspot.map.in Wed Sep 28 07:32:57 2016 +0100
@@ -1,2 +1,2 @@
# version type(drop/hg) url changeset sha256sum
-default drop http://icedtea.classpath.org/download/drops/icedtea7/@ICEDTEA_RELEASE@ 601fbf4bf8c1 598f983e760f1f439444c837d1baa7fd6e5f3483c14a88a0862b1b6fb8aad595
+default drop http://icedtea.classpath.org/download/drops/icedtea7/@ICEDTEA_RELEASE@ b6971126dc0f 01f6d8f58e2eb729038f313a0e07c482d85a9cdb093c1aadd3624397a9ee28cb
diff -r 29f1530968d9 -r 11416bb1b308 patches/boot/ecj-diamond.patch
--- a/patches/boot/ecj-diamond.patch Fri Jul 29 07:40:56 2016 +0100
+++ b/patches/boot/ecj-diamond.patch Wed Sep 28 07:32:57 2016 +0100
@@ -1,6 +1,6 @@
diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2015-07-19 18:19:26.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2015-09-08 10:49:08.166659745 +0100
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2016-09-07 06:06:54.000000000 +0100
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2016-09-21 06:38:08.152139860 +0100
@@ -58,7 +58,7 @@
private CorbaConnection conn;
@@ -11,8 +11,8 @@
public static synchronized void cleanCache( ORB orb ) {
synchronized (iorMapLock) {
diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2015-07-19 18:19:26.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2015-09-08 10:49:08.166659745 +0100
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2016-09-07 06:06:54.000000000 +0100
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2016-09-21 06:38:08.152139860 +0100
@@ -50,7 +50,7 @@
*/
private class HookPutFields extends ObjectOutputStream.PutField
@@ -23,8 +23,8 @@
/**
* Put the value of the named boolean field into the persistent field.
diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2015-07-19 18:19:26.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2015-09-08 10:49:08.166659745 +0100
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2016-09-07 06:06:54.000000000 +0100
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2016-09-21 06:38:08.152139860 +0100
@@ -1315,7 +1315,7 @@
protected void shutdownServants(boolean wait_for_completion) {
Set<ObjectAdapterFactory> oaset;
@@ -35,8 +35,8 @@
for (ObjectAdapterFactory oaf : oaset)
diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2015-07-19 18:19:26.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2015-09-08 10:49:08.170659672 +0100
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2016-09-07 06:06:54.000000000 +0100
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2016-09-21 06:38:08.152139860 +0100
@@ -108,7 +108,7 @@
private ThreadGroup threadGroup;
@@ -55,10 +55,522 @@
}
for (WorkerThread wt : copy) {
+diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java 2016-09-22 04:46:16.819711160 +0100
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java 2016-09-22 17:56:43.942660332 +0100
+@@ -192,7 +192,7 @@
+ NodeSet dist = new NodeSet();
+ dist.setShouldCacheNodes(true);
+
+- Map<String, Node> stringTable = new HashMap<>();
++ Map<String, Node> stringTable = new HashMap<String, Node>();
+
+ for (int i = 0; i < nl.getLength(); i++)
+ {
+diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java 2016-09-22 04:46:16.987708418 +0100
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java 2016-09-23 05:30:11.423894063 +0100
+@@ -220,7 +220,7 @@
+ public Map<String, Object> getEnvironmentHash()
+ {
+ // Setup a hash to store various environment information in
+- Map<String, Object> hash = new HashMap<>();
++ Map<String, Object> hash = new HashMap<String, Object>();
+
+ // Call various worker methods to fill in the hash
+ // These are explicitly separate for maintenance and so
+@@ -523,7 +523,7 @@
+ {
+
+ if (null == h)
+- h = new HashMap<>();
++ h = new HashMap<String, Object>();
+
+ // Grab java version for later use
+ try
+@@ -551,7 +551,7 @@
+
+ h.put("java.class.path", cp);
+
+- List<Map> classpathJars = checkPathForJars(cp, jarNames);
++ List<Map<String,String>> classpathJars = checkPathForJars(cp, jarNames);
+
+ if (null != classpathJars) {
+ h.put(FOUNDCLASSES + "java.class.path", classpathJars);
+@@ -613,14 +613,14 @@
+ * @see #appendFoundJars(Node, Document, Map, String )
+ * @see #getApparentVersion(String, long)
+ */
+- protected List<Map> checkPathForJars(String cp, String[] jars)
++ protected List<Map<String, String>> checkPathForJars(String cp, String[] jars)
+ {
+
+ if ((null == cp) || (null == jars) || (0 == cp.length())
+ || (0 == jars.length))
+ return null;
+
+- List<Map> v = new ArrayList<>();
++ List<Map<String, String>> v = new ArrayList<Map<String, String>>();
+ StringTokenizer st = new StringTokenizer(cp, File.pathSeparator);
+
+ while (st.hasMoreTokens())
+@@ -641,7 +641,7 @@
+ // If any requested jarName exists, report on
+ // the details of that .jar file
+ try {
+- Map<String, String> h = new HashMap<>(2);
++ Map<String, String> h = new HashMap<String, String>(2);
+ // Note "-" char is looked for in appendFoundJars
+ h.put(jars[i] + "-path", f.getAbsolutePath());
+
+@@ -660,7 +660,7 @@
+ /* no-op, don't add it */
+ }
+ } else {
+- Map<String, String> h = new HashMap<>(2);
++ Map<String, String> h = new HashMap<String, String>(2);
+ // Note "-" char is looked for in appendFoundJars
+ h.put(jars[i] + "-path", WARNING + " Classpath entry: "
+ + filename + " does not exist");
+@@ -737,7 +737,7 @@
+ {
+
+ if (null == h)
+- h = new HashMap<>();
++ h = new HashMap<String, Object>();
+
+ Class clazz = null;
+
+@@ -768,7 +768,7 @@
+ {
+
+ if (null == h)
+- h = new HashMap<>();
++ h = new HashMap<String, Object>();
+
+ try
+ {
+@@ -854,7 +854,7 @@
+ {
+
+ if (null == h)
+- h = new HashMap<>();
++ h = new HashMap<String, Object>();
+
+ try
+ {
+@@ -915,7 +915,7 @@
+ {
+
+ if (null == h)
+- h = new HashMap<>();
++ h = new HashMap<String, Object>();
+
+ try
+ {
+@@ -945,7 +945,7 @@
+ {
+
+ if (null == h)
+- h = new HashMap<>();
++ h = new HashMap<String, Object>();
+
+ final String DOM_CLASS = "org.w3c.dom.Document";
+ final String DOM_LEVEL3_METHOD = "getDoctype"; // no parameter
+@@ -980,7 +980,7 @@
+ {
+
+ if (null == h)
+- h = new HashMap<>();
++ h = new HashMap<String, Object>();
+
+ final String DOM_LEVEL2_CLASS = "org.w3c.dom.Document";
+ final String DOM_LEVEL2_METHOD = "createElementNS"; // String, String
+@@ -1056,7 +1056,7 @@
+ {
+
+ if (null == h)
+- h = new HashMap<>();
++ h = new HashMap<String, Object>();
+
+ final String SAX_VERSION1_CLASS = "org.xml.sax.Parser";
+ final String SAX_VERSION1_METHOD = "parse"; // String
+@@ -1146,7 +1146,7 @@
+ */
+ static
+ {
+- Map<Long, String> jarVersions = new HashMap<>();
++ Map<Long, String> jarVersions = new HashMap<Long, String>();
+ jarVersions.put(new Long(857192), "xalan.jar from xalan-j_1_1");
+ jarVersions.put(new Long(440237), "xalan.jar from xalan-j_1_2");
+ jarVersions.put(new Long(436094), "xalan.jar from xalan-j_1_2_1");
+diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java 2016-09-22 04:46:16.831710964 +0100
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java 2016-09-22 12:44:07.539848777 +0100
+@@ -51,7 +51,7 @@
+ /**
+ * Legal conversions between internal types.
+ */
More information about the distro-pkg-dev
mailing list