/hg/release/icedtea7-2.6: Bump to 2.6.21.

andrew at icedtea.classpath.org andrew at icedtea.classpath.org
Wed Feb 26 20:01:51 UTC 2020


changeset f213ed00466c in /hg/release/icedtea7-2.6
details: http://icedtea.classpath.org/hg/release/icedtea7-2.6?cmd=changeset;node=f213ed00466c
author: Andrew John Hughes <gnu_andrew at member.fsf.org>
date: Wed Feb 26 20:01:35 2020 +0000

	Bump to 2.6.21.

	Upstream changes:
	  - Bump to icedtea-2.6.21
	  - S6675699: need comprehensive fix for unconstrained ConvI2L with narrowed type
	  - S6880619: reg tests for 6879540
	  - S7024771: "\\<>" in attribute value part of X500Principal constructor parameter makes strange effect
	  - S7111579: klist starttime, renewtill, ticket etype
	  - S7152176: More krb5 tests
	  - S7172701: KDC tests cleanup
	  - S7175041: HttpTimestamper should accept https URI
	  - S7184246: Simplify Config.get() of krb5
	  - S7184932: Remove the temporary Selector usage in the NIO socket adapters
	  - S8001326: Improve Kerberos caching
	  - S8011124: Make KerberosTime immutable
	  - S8012679: Let allow_weak_crypto default to false
	  - S8014310: JAAS/Krb5LoginModule using des encytypes failure with NPE after JDK-8012679
	  - S8017453: ReplayCache tests fail on multiple platforms
	  - S8017773: OpenJDK7 returns incorrect TrueType font metrics
	  - S8019410: sun/security/krb5/auto/ReplayCacheTestProc.java
	  - S8020971: Fix doclint issues in java.nio.*
	  - S8028049: Tidy warnings cleanup for packages java.nio/java.io
	  - S8031111: fix krb5 caddr
	  - S8031997: PPC64: Make the various POLL constants system dependant
	  - S8033271: Manual security tests have @ignore rather than @run main/manual
	  - S8036779: sun.security.krb5.KdcComm interprets kdc_timeout as msec instead of sec
	  - S8036971: krb5.conf does not accept directive lines before the first section
	  - S8037550: Update RFC references in javadoc to RFC 5280
	  - S8039132: cleanup @ignore JAAS/krb5 tests
	  - S8039438: Some tests depend on internal API sun.misc.IOUtils
	  - S8044500: Add kinit options and krb5.conf flags that allow users to obtain renewable tickets and specify ticket lifetimes
	  - S8058290: JAAS Krb5LoginModule has suspect ticket-renewal logic, relies on clockskew grace
	  - S8075297: Tests for RFEs 4515853 and 4745056
	  - S8075299: Additional tests for krb5 settings
	  - S8075301: Tests for sun.security.krb5.principal system property
	  - S8080835: Add blocking bulk read to sun.misc.IOUtils
	  - S8131051: KDC might issue a renewable ticket even if not requested
	  - S8132111: Do not request for addresses for forwarded TGT
	  - S8134232: KeyStore.load() throws an IOException with a wrong cause in case of wrong password
	  - S8135018, PR3774: AARCH64: Missing memory barriers for CMS collector
	  - S8138978: Examine usages of sun.misc.IOUtils
	  - S8139206: Add InputStream readNBytes(int len)
	  - S8147772: Update KerberosTicket to describe behavior if it has been destroyed and fix NullPointerExceptions
	  - S8149543: range check CastII nodes should not be split through Phi
	  - S8154831: CastII/ConvI2L for a range check is prematurely eliminated
	  - S8163104: Unexpected NPE still possible on some Kerberos ticket calls
	  - S8177095: Range check dependent CastII/ConvI2L is prematurely eliminated
	  - S8183591: Incorrect behavior when reading DER value with Integer.MAX_VALUE length
	  - S8186576: KerberosTicket does not properly handle renewable tickets at the end of their lifetime
	  - S8186831: Kerberos ignores PA-DATA with a non-null s2kparams
	  - S8186884: Test native KDC, Java krb5 lib, and native krb5 lib in one test
	  - S8187218: GSSCredential.getRemainingLifetime() returns negative value for TTL > 24 days.
	  - S8190690: Impact on krb5 test cases in the 8u-CPU nightly
	  - S8193832: Performance of InputStream.readAllBytes() could be improved
	  - S8196956: (ch) More channels cleanup
	  - S8197518: Kerberos krb5 authentication: AuthList's put method leads to performance issue
	  - S8200400: Restrict Sasl mechanisms
	  - S8201627: Kerberos sequence number issues
	  - S8214002: Cannot use italic font style if the font has embedded bitmap
	  - S8218854: FontMetrics.getMaxAdvance may be less than the maximum FontMetrics.charWidth
	  - S8221304: Problem list java/awt/FontMetrics/MaxAdvanceIsMax.java
	  - S8224909: Unlink Set of LinkedHashSets
	  - S8225261: Better method resolutions
	  - S8225279: Better XRender interpolation
	  - S8225425: java.lang.UnsatisfiedLinkError: net.dll: Can't find dependent libraries
	  - S8226352: Improve Kerberos interop capabilities
	  - S8227662: freetype seeks to index at the end of the font data
	  - S8227758: More valid PKIX processing
	  - S8227816: More Colorful ICC profiles
	  - S8228469: (tz) Upgrade time-zone data to tzdata2019b
	  - S8228548: Normalize normalization for all
	  - S8229767: Typo in java.security: Sasl.createClient and Sasl.createServer
	  - S8229951: Better Ticket Granting Services
	  - S8230085: (fs) FileStore::isReadOnly is always true on macOS Catalina
	  - S8230279: Improve Pack200 file reading
	  - S8230318: Better trust store usage
	  - S8230967: Improve Registry support of clients
	  - S8231098: (tz) Upgrade time-zone data to tzdata2019c
	  - S8231129: More glyph images
	  - S8231139: Improved keystore support
	  - S8231422: Better serial filter handling
	  - S8231795: Enhance datagram socket support
	  - S8232003: (fs) Files.write can leak file descriptor in the exception case
	  - S8232381: add result NULL-checking to freetypeScaler.c
	  - S8232419: Improve Registry registration
	  - S8232643: Building error in jdk7u241 after 7068616
	  - S8233839, PR3774: aarch64: missing memory barrier in NewObjectArrayStub and NewTypeArrayStub
	  - S8234037: Improve Object Identifier Processing
	  - S8235909: File.exists throws AccessControlException for invalid paths when a SecurityManager is installed
	  - S8236983: [TESTBUG] Remove pointless catch block in test/jdk/sun/security/util/DerValue/BadValue.java
	  - S8236984: Add compatibility wrapper for IOUtils.readFully
	  - S8237368: Problem with NullPointerException in RMI TCPEndpoint.read
	  - S8237604: [TEST_BUG] sun/security/tools/jarsigner/EntriesOrder.java not adapted for changes in JDK-7194449

	ChangeLog:

	2020-02-26  Andrew John Hughes  <gnu_andrew at member.fsf.org>

		Bump to 2.6.21.
		* patches/8232643-pr3761.patch:
		Temporary copy of fix removed with upgrade
		to 7u251, where it's available upstream.
		* Makefile.am:
		(CORBA_CHANGESET): Update to icedtea-2.6.20.
		(JAXP_CHANGESET): Likewise.
		(JAXWS_CHANGESET): Likewise.
		(JDK_CHANGESET): Likewise.
		(LANGTOOLS_CHANGESET): Likewise.
		(OPENJDK_CHANGESET): Likewise.
		(CORBA_SHA256SUM): Likewise.
		(JAXP_SHA256SUM): Likewise.
		(JAXWS_SHA256SUM): Likewise.
		(JDK_SHA256SUM): Likewise.
		(LANGTOOLS_SHA256SUM): Likewise.
		(OPENJDK_SHA256SUM): Likewise.
		(ICEDTEA_PATCHES): Drop JDK-8232643/PR3761 patch.
		* NEWS: Updated.
		* acinclude.m4:
		(JDK_UPDATE_VERSION): Bump to 251.
		(BUILD_VERSION): Set to b02.
		* configure.ac: Bump to 2.6.21.
		* hotspot.map.in: Update to icedtea-2.6.21.
		* patches/boot/ecj-diamond.patch:
		Regenerated. Add new cases in
		sun.security.krb5.Config,
		sun.security.krb5.SCDynamicStoreConfig,
		sun.security.krb5.internal.rcache.MemoryCache,
		sun.security.krb5.internal.rcache.DflCache,
		sun.security.krb5.internal.rcache.AuthList,
		sun.security.x509.AVA,
		sun.security.x509.X500Name,
		sun.misc.IOUtils,
		javax.security.Sasl & com.sun.crypto.provider.JceKeyStore
		* patches/boot/ecj-multicatch.patch:
		Regenerated.
		* patches/boot/ecj-trywithresources.patch:
		Regenerated. Add new cases in java.nio.file.Files,
		sun.reflect.misc.MethodUtil, sun.security.krb5.Config &
		sun.security.krb5.internal.rcache.DflCache


diffstat:

 ChangeLog                               |    46 +-
 Makefile.am                             |    28 +-
 NEWS                                    |    93 +
 acinclude.m4                            |     4 +-
 configure.ac                            |     2 +-
 hotspot.map.in                          |     2 +-
 patches/8232643-pr3761.patch            |    24 -
 patches/boot/ecj-diamond.patch          |  2174 ++++++++++++++++--------------
 patches/boot/ecj-multicatch.patch       |   396 ++--
 patches/boot/ecj-trywithresources.patch |   347 +++-
 10 files changed, 1715 insertions(+), 1401 deletions(-)

diffs (truncated from 7655 to 500 lines):

diff -r 888139ad9b3b -r f213ed00466c ChangeLog
--- a/ChangeLog	Wed Nov 20 06:36:29 2019 +0000
+++ b/ChangeLog	Wed Feb 26 20:01:35 2020 +0000
@@ -1,3 +1,47 @@
+2020-02-26  Andrew John Hughes  <gnu_andrew at member.fsf.org>
+
+	Bump to 2.6.21.
+	* patches/8232643-pr3761.patch:
+	Temporary copy of fix removed with upgrade
+	to 7u251, where it's available upstream.
+	* Makefile.am:
+	(CORBA_CHANGESET): Update to icedtea-2.6.20.
+	(JAXP_CHANGESET): Likewise.
+	(JAXWS_CHANGESET): Likewise.
+	(JDK_CHANGESET): Likewise.
+	(LANGTOOLS_CHANGESET): Likewise.
+	(OPENJDK_CHANGESET): Likewise.
+	(CORBA_SHA256SUM): Likewise.
+	(JAXP_SHA256SUM): Likewise.
+	(JAXWS_SHA256SUM): Likewise.
+	(JDK_SHA256SUM): Likewise.
+	(LANGTOOLS_SHA256SUM): Likewise.
+	(OPENJDK_SHA256SUM): Likewise.
+	(ICEDTEA_PATCHES): Drop JDK-8232643/PR3761 patch.
+	* NEWS: Updated.
+	* acinclude.m4:
+	(JDK_UPDATE_VERSION): Bump to 251.
+	(BUILD_VERSION): Set to b02.
+	* configure.ac: Bump to 2.6.21.
+	* hotspot.map.in: Update to icedtea-2.6.21.
+	* patches/boot/ecj-diamond.patch:
+	Regenerated. Add new cases in
+	sun.security.krb5.Config,
+	sun.security.krb5.SCDynamicStoreConfig,
+	sun.security.krb5.internal.rcache.MemoryCache,
+	sun.security.krb5.internal.rcache.DflCache,
+	sun.security.krb5.internal.rcache.AuthList,
+	sun.security.x509.AVA,
+	sun.security.x509.X500Name,
+	sun.misc.IOUtils,
+	javax.security.Sasl & com.sun.crypto.provider.JceKeyStore
+	* patches/boot/ecj-multicatch.patch:
+	Regenerated.
+	* patches/boot/ecj-trywithresources.patch:
+	Regenerated. Add new cases in java.nio.file.Files,
+	sun.reflect.misc.MethodUtil, sun.security.krb5.Config &
+	sun.security.krb5.internal.rcache.DflCache
+
 2019-11-19  Andrew John Hughes  <gnu_andrew at member.fsf.org>
 
 	Start 2.6.21 release cycle.
@@ -24,7 +68,7 @@
 	* patches/rh1022017.patch:
 	Removed as included upstream as 8228825 / CVE-2019-2894.
 	* Makefile.am:
-	(CORBA_CHANGESET): Update to icedtea-2.6.19.
+	(CORBA_CHANGESET): Update to icedtea-2.6.20.
 	(JAXP_CHANGESET): Likewise.
 	(JAXWS_CHANGESET): Likewise.
 	(JDK_CHANGESET): Likewise.
diff -r 888139ad9b3b -r f213ed00466c Makefile.am
--- a/Makefile.am	Wed Nov 20 06:36:29 2019 +0000
+++ b/Makefile.am	Wed Feb 26 20:01:35 2020 +0000
@@ -1,18 +1,18 @@
 # Dependencies
 
-CORBA_CHANGESET = 4493de9f3f0b
-JAXP_CHANGESET = 5e4ceb999239
-JAXWS_CHANGESET = b24931dd91c6
-JDK_CHANGESET = 89324d11814d
-LANGTOOLS_CHANGESET = 480d3ab02c36
-OPENJDK_CHANGESET = b04b11ab5066
-
-CORBA_SHA256SUM = 81e3ddac83b981400c062788bcd3005587d5984f18def588d8cd232b9b5b24ef
-JAXP_SHA256SUM = 21772ab65388c1890ff33f9a5dc2fd22f69fd0f0f0d336e1f8f64d920b308b90
-JAXWS_SHA256SUM = 3e27f2e6b92d0b15d544e06b897cf2b072bece695a0a8a79de6cd609f1a216ef
-JDK_SHA256SUM = 56aacc5bfeab0688a4042f9ffdc971b5764f99c9fdea0080f41e2bfaa27a08b0
-LANGTOOLS_SHA256SUM = 8057da4c87ecea91ec16b4b180ab006ae12be60a2f8387dfe2a7b18c8e303379
-OPENJDK_SHA256SUM = f1e430150f95073a3dc1f4f32bdfbf8cc6aa4b23cb940128f0224b7da90516aa
+CORBA_CHANGESET = e3f769a410e4
+JAXP_CHANGESET = 099ed3ab6415
+JAXWS_CHANGESET = c4230372ddc0
+JDK_CHANGESET = 5cfb0b2d8b78
+LANGTOOLS_CHANGESET = 0581b1282c3e
+OPENJDK_CHANGESET = de70c40573f2
+
+CORBA_SHA256SUM = 2675a6c3f151b4af73f8edca328d36e6a9fe0ae8d3c048c5e884ccdb57765584
+JAXP_SHA256SUM = 7873f5f596e32643dd5c0642cb4a6a6d8adbd4dfe36a3fc4e198f772aa3ae9ee
+JAXWS_SHA256SUM = 75db9f2c90a49fc9eda32bbff83c978a6b032859270c55aee8fcf053cfbcec73
+JDK_SHA256SUM = b8d99a271e5f946a70267bc1f174720d1c9584aa77dd454a0a87ec05259cc280
+LANGTOOLS_SHA256SUM = 3645b8e3cd5be93c5efbac8421da3159958e817ddb4db2cc82673ac3887b55d2
+OPENJDK_SHA256SUM = d649cec806eb0d12b24f0554fecf1382138a4fbab7cea62172f2aae3866cfd18
 
 DROP_URL = https://icedtea.classpath.org/download/drops
 
@@ -369,7 +369,7 @@
 
 # Patch list
 
-ICEDTEA_PATCHES = patches/8232643-pr3761.patch
+ICEDTEA_PATCHES =
 
 # Conditional patches
 
diff -r 888139ad9b3b -r f213ed00466c NEWS
--- a/NEWS	Wed Nov 20 06:36:29 2019 +0000
+++ b/NEWS	Wed Feb 26 20:01:35 2020 +0000
@@ -14,6 +14,99 @@
 
 New in release 2.6.21 (2020-01-XX):
 
+* Security fixes
+  - S8224909, CVE-2020-2583: Unlink Set of LinkedHashSets
+  - S8225261: Better method resolutions
+  - S8225279: Better XRender interpolation
+  - S8226352, CVE-2020-2590: Improve Kerberos interop capabilities
+  - S8227758: More valid PKIX processing
+  - S8227816: More Colorful ICC profiles
+  - S8228548, CVE-2020-2593: Normalize normalization for all
+  - S8229951, CVE-2020-2601: Better Ticket Granting Services
+  - S8230279: Improve Pack200 file reading
+  - S8230318: Better trust store usage
+  - S8230967: Improve Registry support of clients
+  - S8231129: More glyph images
+  - S8231139: Improved keystore support
+  - S8231422, CVE-2020-2604: Better serial filter handling
+  - S8231795, CVE-2020-2659: Enhance datagram socket support
+  - S8232419: Improve Registry registration
+  - S8234037, CVE-2020-2654: Improve Object Identifier Processing
+* Import of OpenJDK 7 u251 build 1
+  - S8017773: OpenJDK7 returns incorrect TrueType font metrics
+  - S8214002: Cannot use italic font style if the font has embedded bitmap
+* Import of OpenJDK 7 u251 build 2
+  - S6675699: need comprehensive fix for unconstrained ConvI2L with narrowed type
+  - S6880619: reg tests for 6879540
+  - S7024771: "\\<>" in attribute value part of X500Principal constructor parameter makes strange effect
+  - S7111579: klist starttime, renewtill, ticket etype
+  - S7152176: More krb5 tests
+  - S7172701: KDC tests cleanup
+  - S7175041: HttpTimestamper should accept https URI
+  - S7184246: Simplify Config.get() of krb5
+  - S7184932: Remove the temporary Selector usage in the NIO socket adapters
+  - S8001326: Improve Kerberos caching
+  - S8011124: Make KerberosTime immutable
+  - S8012679: Let allow_weak_crypto default to false
+  - S8014310: JAAS/Krb5LoginModule using des encytypes failure with NPE after JDK-8012679
+  - S8017453: ReplayCache tests fail on multiple platforms
+  - S8019410: sun/security/krb5/auto/ReplayCacheTestProc.java
+  - S8020971: Fix doclint issues in java.nio.*
+  - S8028049: Tidy warnings cleanup for packages java.nio/java.io
+  - S8031111: fix krb5 caddr
+  - S8031997: PPC64: Make the various POLL constants system dependant
+  - S8033271: Manual security tests have @ignore rather than @run main/manual
+  - S8036779: sun.security.krb5.KdcComm interprets kdc_timeout as msec instead of sec
+  - S8036971: krb5.conf does not accept directive lines before the first section
+  - S8037550: Update RFC references in javadoc to RFC 5280
+  - S8039132: cleanup @ignore JAAS/krb5 tests
+  - S8039438: Some tests depend on internal API sun.misc.IOUtils
+  - S8044500: Add kinit options and krb5.conf flags that allow users to obtain renewable tickets and specify ticket lifetimes
+  - S8058290: JAAS Krb5LoginModule has suspect ticket-renewal logic, relies on clockskew grace
+  - S8075297: Tests for RFEs 4515853 and 4745056
+  - S8075299: Additional tests for krb5 settings
+  - S8075301: Tests for sun.security.krb5.principal system property
+  - S8080835: Add blocking bulk read to sun.misc.IOUtils
+  - S8131051: KDC might issue a renewable ticket even if not requested
+  - S8132111: Do not request for addresses for forwarded TGT
+  - S8134232: KeyStore.load() throws an IOException with a wrong cause in case of wrong password
+  - S8138978: Examine usages of sun.misc.IOUtils
+  - S8139206: Add InputStream readNBytes(int len)
+  - S8147772: Update KerberosTicket to describe behavior if it has been destroyed and fix NullPointerExceptions
+  - S8149543: range check CastII nodes should not be split through Phi
+  - S8154831: CastII/ConvI2L for a range check is prematurely eliminated
+  - S8163104: Unexpected NPE still possible on some Kerberos ticket calls
+  - S8177095: Range check dependent CastII/ConvI2L is prematurely eliminated
+  - S8183591: Incorrect behavior when reading DER value with Integer.MAX_VALUE length
+  - S8186576: KerberosTicket does not properly handle renewable tickets at the end of their lifetime
+  - S8186831: Kerberos ignores PA-DATA with a non-null s2kparams
+  - S8186884: Test native KDC, Java krb5 lib, and native krb5 lib in one test
+  - S8187218: GSSCredential.getRemainingLifetime() returns negative value for TTL > 24 days.
+  - S8190690: Impact on krb5 test cases in the 8u-CPU nightly
+  - S8193832: Performance of InputStream.readAllBytes() could be improved
+  - S8196956: (ch) More channels cleanup
+  - S8197518: Kerberos krb5 authentication: AuthList's put method leads to performance issue
+  - S8200400: Restrict Sasl mechanisms
+  - S8201627: Kerberos sequence number issues
+  - S8218854: FontMetrics.getMaxAdvance may be less than the maximum FontMetrics.charWidth
+  - S8221304: Problem list java/awt/FontMetrics/MaxAdvanceIsMax.java
+  - S8225425: java.lang.UnsatisfiedLinkError: net.dll: Can't find dependent libraries
+  - S8227662: freetype seeks to index at the end of the font data
+  - S8228469: (tz) Upgrade time-zone data to tzdata2019b
+  - S8229767: Typo in java.security: Sasl.createClient and Sasl.createServer
+  - S8230085: (fs) FileStore::isReadOnly is always true on macOS Catalina
+  - S8231098: (tz) Upgrade time-zone data to tzdata2019c
+  - S8232003: (fs) Files.write can leak file descriptor in the exception case
+  - S8232381: add result NULL-checking to freetypeScaler.c
+  - S8235909: File.exists throws AccessControlException for invalid paths when a SecurityManager is installed
+  - S8236983: [TESTBUG] Remove pointless catch block in test/jdk/sun/security/util/DerValue/BadValue.java
+  - S8236984: Add compatibility wrapper for IOUtils.readFully
+  - S8237368: Problem with NullPointerException in RMI TCPEndpoint.read
+  - S8237604: [TEST_BUG] sun/security/tools/jarsigner/EntriesOrder.java not adapted for changes in JDK-7194449
+* Bug fixes
+  - S8135018, PR3774: AARCH64: Missing memory barriers for CMS collector
+  - S8233839, PR3774: aarch64: missing memory barrier in NewObjectArrayStub and NewTypeArrayStub
+
 New in release 2.6.20 (2019-11-17):
 
 * Security fixes
diff -r 888139ad9b3b -r f213ed00466c acinclude.m4
--- a/acinclude.m4	Wed Nov 20 06:36:29 2019 +0000
+++ b/acinclude.m4	Wed Feb 26 20:01:35 2020 +0000
@@ -2948,8 +2948,8 @@
   AC_MSG_CHECKING([which branch and release of IcedTea is being built])
   JAVA_VER=1.7.0
   JAVA_VENDOR=openjdk
-  JDK_UPDATE_VERSION=241
-  BUILD_VERSION=b01
+  JDK_UPDATE_VERSION=251
+  BUILD_VERSION=b02
   MILESTONE=fcs
   if test "x${MILESTONE}" = "xfcs"; then
     COMBINED_VERSION=${JDK_UPDATE_VERSION}-${BUILD_VERSION}
diff -r 888139ad9b3b -r f213ed00466c configure.ac
--- a/configure.ac	Wed Nov 20 06:36:29 2019 +0000
+++ b/configure.ac	Wed Feb 26 20:01:35 2020 +0000
@@ -1,4 +1,4 @@
-AC_INIT([icedtea], [2.6.21pre00], [distro-pkg-dev at openjdk.java.net])
+AC_INIT([icedtea], [2.6.21], [distro-pkg-dev at openjdk.java.net])
 AC_CANONICAL_HOST
 AC_CANONICAL_TARGET
 AM_INIT_AUTOMAKE([1.9 tar-pax foreign])
diff -r 888139ad9b3b -r f213ed00466c hotspot.map.in
--- a/hotspot.map.in	Wed Nov 20 06:36:29 2019 +0000
+++ b/hotspot.map.in	Wed Feb 26 20:01:35 2020 +0000
@@ -1,2 +1,2 @@
 # version type(drop/hg) url changeset sha256sum
-default drop https://icedtea.classpath.org/download/drops/icedtea7/@ICEDTEA_RELEASE@ 8145b03db545 27cc76f3deb0efb84fb1422e9636cb0b09fce21648318671905c959b86cd5612
+default drop https://icedtea.classpath.org/download/drops/icedtea7/@ICEDTEA_RELEASE@ d89441a9ce98 25eab5aef4e2219d54e593cc0bdced274bbdd66ec69e46dc6e92d46e74ecccb9
diff -r 888139ad9b3b -r f213ed00466c patches/8232643-pr3761.patch
--- a/patches/8232643-pr3761.patch	Wed Nov 20 06:36:29 2019 +0000
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,24 +0,0 @@
-# HG changeset patch
-# User mbalao
-# Date 1571433044 10800
-#      Fri Oct 18 18:10:44 2019 -0300
-# Node ID 55de33c12fdcff9cc3fa391e9343a04d398c48e5
-# Parent  ce5e37056409870413d49cce681049b711220849
-8232643: Building error in jdk7u241 after 7068616
-Reviewed-by: andrew
-
-diff --git openjdk.orig/jdk/src/share/classes/sun/nio/cs/ext/DoubleByteDecoder.java openjdk/jdk/src/share/classes/sun/nio/cs/ext/DoubleByteDecoder.java
---- openjdk.orig/jdk/src/share/classes/sun/nio/cs/ext/DoubleByteDecoder.java
-+++ openjdk/jdk/src/share/classes/sun/nio/cs/ext/DoubleByteDecoder.java
-@@ -209,9 +209,9 @@
-         if (bugLevel == null) {
-             if (!sun.misc.VM.isBooted())
-                 return false;
--            java.security.PrivilegedAction pa =
-+            java.security.PrivilegedAction<String> pa =
-                 new GetPropertyAction("sun.nio.cs.bugLevel");
--            String value = (String)AccessController.doPrivileged(pa);
-+            String value = AccessController.doPrivileged(pa);
-             bugLevel = (value != null) ? value : "";
-         }
-         return bugLevel.equals(bl);
diff -r 888139ad9b3b -r f213ed00466c patches/boot/ecj-diamond.patch
--- a/patches/boot/ecj-diamond.patch	Wed Nov 20 06:36:29 2019 +0000
+++ b/patches/boot/ecj-diamond.patch	Wed Feb 26 20:01:35 2020 +0000
@@ -1,6 +1,6 @@
 diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java	2019-11-13 20:42:04.818282257 +0000
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java	2020-02-06 01:42:50.000000000 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java	2020-02-24 01:41:18.925742295 +0000
 @@ -58,7 +58,7 @@
      private CorbaConnection conn;
  
@@ -11,8 +11,8 @@
      public static synchronized void cleanCache( ORB orb ) {
          synchronized (iorMapLock) {
 diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java	2019-11-13 20:33:32.210186098 +0000
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java	2019-11-13 20:42:04.818282257 +0000
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java	2020-02-23 05:10:04.663315044 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java	2020-02-24 01:41:18.925742295 +0000
 @@ -481,7 +481,7 @@
              while (cls != fnscl) {
                  ProtectionDomain pd = cls.getProtectionDomain();
@@ -32,8 +32,8 @@
                      pds.add(noPermissionsDomain());
                      break;
 diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java	2019-11-13 20:42:04.818282257 +0000
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java	2020-02-06 01:42:50.000000000 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java	2020-02-24 01:41:18.925742295 +0000
 @@ -50,7 +50,7 @@
       */
      private class HookPutFields extends ObjectOutputStream.PutField
@@ -44,8 +44,8 @@
          /**
           * Put the value of the named boolean field into the persistent field.
 diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/ior/IORTypeCheckRegistryImpl.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/ior/IORTypeCheckRegistryImpl.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/ior/IORTypeCheckRegistryImpl.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/ior/IORTypeCheckRegistryImpl.java	2019-11-13 20:42:04.818282257 +0000
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/ior/IORTypeCheckRegistryImpl.java	2020-02-06 01:42:50.000000000 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/ior/IORTypeCheckRegistryImpl.java	2020-02-24 01:41:18.925742295 +0000
 @@ -103,7 +103,7 @@
          Set<String> _iorTypeNames = null;
          if (filterProperty != null) {
@@ -74,8 +74,8 @@
      }
  
 diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java	2019-11-13 20:42:04.818282257 +0000
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java	2020-02-06 01:42:50.000000000 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java	2020-02-24 01:41:18.925742295 +0000
 @@ -1323,7 +1323,7 @@
      protected void shutdownServants(boolean wait_for_completion) {
          Set<ObjectAdapterFactory> oaset;
@@ -86,8 +86,8 @@
  
          for (ObjectAdapterFactory oaf : oaset)
 diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java	2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java	2020-02-06 01:42:50.000000000 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java	2020-02-24 01:41:18.925742295 +0000
 @@ -108,7 +108,7 @@
      private ThreadGroup threadGroup;
  
@@ -107,8 +107,8 @@
  
          for (WorkerThread wt : copy) {
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java	2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java	2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java	2020-02-24 01:41:18.925742295 +0000
 @@ -192,7 +192,7 @@
      NodeSet dist = new NodeSet();
      dist.setShouldCacheNodes(true);
@@ -119,8 +119,8 @@
      for (int i = 0; i < nl.getLength(); i++)
      {
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/utils/XMLSecurityManager.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/utils/XMLSecurityManager.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/utils/XMLSecurityManager.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/utils/XMLSecurityManager.java	2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/utils/XMLSecurityManager.java	2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/utils/XMLSecurityManager.java	2020-02-24 01:41:18.925742295 +0000
 @@ -420,7 +420,7 @@
      }
  
@@ -131,8 +131,8 @@
      /**
       * Prints out warnings if a parser does not support the specified feature/property.
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java	2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java	2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java	2020-02-24 01:41:18.925742295 +0000
 @@ -220,7 +220,7 @@
    public Map<String, Object> getEnvironmentHash()
    {
@@ -251,8 +251,8 @@
      jarVersions.put(new Long(440237), "xalan.jar from xalan-j_1_2");
      jarVersions.put(new Long(436094), "xalan.jar from xalan-j_1_2_1");
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java	2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java	2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java	2020-02-24 01:41:18.925742295 +0000
 @@ -51,7 +51,7 @@
      /**
       * Legal conversions between internal types.
@@ -263,8 +263,8 @@
      static {
          // Possible type conversions between internal types
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java	2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java	2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java	2020-02-24 01:41:18.925742295 +0000
 @@ -139,7 +139,7 @@
      private boolean       _isStatic = false;
  
@@ -288,8 +288,8 @@
          // Possible conversions between Java and internal types
          java2Internal.put(Boolean.TYPE, Type.Boolean);
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java	2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java	2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java	2020-02-24 01:41:18.925742295 +0000
 @@ -107,7 +107,7 @@
  
          // Check if we have any declared namespaces
@@ -336,8 +336,8 @@
                               SyntaxTreeNode n = _attributeElements.get(k);
                               if (n instanceof LiteralAttribute) {
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java	2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java	2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java	2020-02-24 01:41:18.929742233 +0000
 @@ -129,22 +129,22 @@
      /**
       * A mapping between templates and test sequences.
@@ -390,8 +390,8 @@
          _rootPattern = null;
  
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java	2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java	2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java	2020-02-24 01:41:18.929742233 +0000
 @@ -102,11 +102,11 @@
      }
  
@@ -428,8 +428,8 @@
          _prefixMapping.put(prefix, uri);
      }
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java	2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java	2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java	2020-02-24 01:41:18.929742233 +0000
 @@ -122,7 +122,7 @@
      /**
       * Mapping between mode names and Mode instances.
@@ -458,8 +458,8 @@
      /**
       * A reference to the SourceLoader set by the user (a URIResolver
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java	2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java	2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java	2020-02-24 01:41:18.929742233 +0000
 @@ -38,8 +38,8 @@
  final class SymbolTable {
  
@@ -542,8 +542,8 @@
          // Register the namespace URI
          Integer refcnt = _excludedURI.get(uri);
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java	2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java	2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java	2020-02-24 01:41:18.929742233 +0000
 @@ -70,7 +70,7 @@
      protected SyntaxTreeNode _parent;          // Parent node
      private Stylesheet       _stylesheet;      // Stylesheet ancestor node
@@ -572,8 +572,8 @@
                  locals.add(varOrParamName);
              }
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java	2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java	2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java	2020-02-24 01:41:18.929742233 +0000
 @@ -127,7 +127,7 @@
                   * times. Note that patterns whose kernels are "*", "node()"
                   * and "@*" can between shared by test sequences.
@@ -584,8 +584,8 @@
  
      public MethodGenerator(int access_flags, Type return_type,
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java	2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java	2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java	2020-02-24 01:41:18.929742233 +0000
 @@ -37,7 +37,7 @@
  public final class MultiHashtable<K,V> {
      static final long serialVersionUID = -6151608290510033572L;
@@ -605,8 +605,8 @@
              }
              set.add(value);
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java	2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java	2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java	2020-02-24 01:41:18.929742233 +0000
 @@ -171,7 +171,7 @@
          _parser = new Parser(this, _overrideDefaultParser);
          _xmlFeatures = featureManager;
@@ -635,8 +635,8 @@
          _parser.init();
          //_variableSerial     = 1;
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java	2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java	2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java	2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java	2020-02-24 01:41:18.929742233 +0000
 @@ -169,7 +169,7 @@
          _count = 0;
          _current = 0;
@@ -647,8 +647,8 @@
  
          try {


More information about the distro-pkg-dev mailing list