/hg/release/icedtea7-2.6: Bump to 2.6.21.
andrew at icedtea.classpath.org
andrew at icedtea.classpath.org
Wed Feb 26 20:01:51 UTC 2020
changeset f213ed00466c in /hg/release/icedtea7-2.6
details: http://icedtea.classpath.org/hg/release/icedtea7-2.6?cmd=changeset;node=f213ed00466c
author: Andrew John Hughes <gnu_andrew at member.fsf.org>
date: Wed Feb 26 20:01:35 2020 +0000
Bump to 2.6.21.
Upstream changes:
- Bump to icedtea-2.6.21
- S6675699: need comprehensive fix for unconstrained ConvI2L with narrowed type
- S6880619: reg tests for 6879540
- S7024771: "\\<>" in attribute value part of X500Principal constructor parameter makes strange effect
- S7111579: klist starttime, renewtill, ticket etype
- S7152176: More krb5 tests
- S7172701: KDC tests cleanup
- S7175041: HttpTimestamper should accept https URI
- S7184246: Simplify Config.get() of krb5
- S7184932: Remove the temporary Selector usage in the NIO socket adapters
- S8001326: Improve Kerberos caching
- S8011124: Make KerberosTime immutable
- S8012679: Let allow_weak_crypto default to false
- S8014310: JAAS/Krb5LoginModule using des encytypes failure with NPE after JDK-8012679
- S8017453: ReplayCache tests fail on multiple platforms
- S8017773: OpenJDK7 returns incorrect TrueType font metrics
- S8019410: sun/security/krb5/auto/ReplayCacheTestProc.java
- S8020971: Fix doclint issues in java.nio.*
- S8028049: Tidy warnings cleanup for packages java.nio/java.io
- S8031111: fix krb5 caddr
- S8031997: PPC64: Make the various POLL constants system dependant
- S8033271: Manual security tests have @ignore rather than @run main/manual
- S8036779: sun.security.krb5.KdcComm interprets kdc_timeout as msec instead of sec
- S8036971: krb5.conf does not accept directive lines before the first section
- S8037550: Update RFC references in javadoc to RFC 5280
- S8039132: cleanup @ignore JAAS/krb5 tests
- S8039438: Some tests depend on internal API sun.misc.IOUtils
- S8044500: Add kinit options and krb5.conf flags that allow users to obtain renewable tickets and specify ticket lifetimes
- S8058290: JAAS Krb5LoginModule has suspect ticket-renewal logic, relies on clockskew grace
- S8075297: Tests for RFEs 4515853 and 4745056
- S8075299: Additional tests for krb5 settings
- S8075301: Tests for sun.security.krb5.principal system property
- S8080835: Add blocking bulk read to sun.misc.IOUtils
- S8131051: KDC might issue a renewable ticket even if not requested
- S8132111: Do not request for addresses for forwarded TGT
- S8134232: KeyStore.load() throws an IOException with a wrong cause in case of wrong password
- S8135018, PR3774: AARCH64: Missing memory barriers for CMS collector
- S8138978: Examine usages of sun.misc.IOUtils
- S8139206: Add InputStream readNBytes(int len)
- S8147772: Update KerberosTicket to describe behavior if it has been destroyed and fix NullPointerExceptions
- S8149543: range check CastII nodes should not be split through Phi
- S8154831: CastII/ConvI2L for a range check is prematurely eliminated
- S8163104: Unexpected NPE still possible on some Kerberos ticket calls
- S8177095: Range check dependent CastII/ConvI2L is prematurely eliminated
- S8183591: Incorrect behavior when reading DER value with Integer.MAX_VALUE length
- S8186576: KerberosTicket does not properly handle renewable tickets at the end of their lifetime
- S8186831: Kerberos ignores PA-DATA with a non-null s2kparams
- S8186884: Test native KDC, Java krb5 lib, and native krb5 lib in one test
- S8187218: GSSCredential.getRemainingLifetime() returns negative value for TTL > 24 days.
- S8190690: Impact on krb5 test cases in the 8u-CPU nightly
- S8193832: Performance of InputStream.readAllBytes() could be improved
- S8196956: (ch) More channels cleanup
- S8197518: Kerberos krb5 authentication: AuthList's put method leads to performance issue
- S8200400: Restrict Sasl mechanisms
- S8201627: Kerberos sequence number issues
- S8214002: Cannot use italic font style if the font has embedded bitmap
- S8218854: FontMetrics.getMaxAdvance may be less than the maximum FontMetrics.charWidth
- S8221304: Problem list java/awt/FontMetrics/MaxAdvanceIsMax.java
- S8224909: Unlink Set of LinkedHashSets
- S8225261: Better method resolutions
- S8225279: Better XRender interpolation
- S8225425: java.lang.UnsatisfiedLinkError: net.dll: Can't find dependent libraries
- S8226352: Improve Kerberos interop capabilities
- S8227662: freetype seeks to index at the end of the font data
- S8227758: More valid PKIX processing
- S8227816: More Colorful ICC profiles
- S8228469: (tz) Upgrade time-zone data to tzdata2019b
- S8228548: Normalize normalization for all
- S8229767: Typo in java.security: Sasl.createClient and Sasl.createServer
- S8229951: Better Ticket Granting Services
- S8230085: (fs) FileStore::isReadOnly is always true on macOS Catalina
- S8230279: Improve Pack200 file reading
- S8230318: Better trust store usage
- S8230967: Improve Registry support of clients
- S8231098: (tz) Upgrade time-zone data to tzdata2019c
- S8231129: More glyph images
- S8231139: Improved keystore support
- S8231422: Better serial filter handling
- S8231795: Enhance datagram socket support
- S8232003: (fs) Files.write can leak file descriptor in the exception case
- S8232381: add result NULL-checking to freetypeScaler.c
- S8232419: Improve Registry registration
- S8232643: Building error in jdk7u241 after 7068616
- S8233839, PR3774: aarch64: missing memory barrier in NewObjectArrayStub and NewTypeArrayStub
- S8234037: Improve Object Identifier Processing
- S8235909: File.exists throws AccessControlException for invalid paths when a SecurityManager is installed
- S8236983: [TESTBUG] Remove pointless catch block in test/jdk/sun/security/util/DerValue/BadValue.java
- S8236984: Add compatibility wrapper for IOUtils.readFully
- S8237368: Problem with NullPointerException in RMI TCPEndpoint.read
- S8237604: [TEST_BUG] sun/security/tools/jarsigner/EntriesOrder.java not adapted for changes in JDK-7194449
ChangeLog:
2020-02-26 Andrew John Hughes <gnu_andrew at member.fsf.org>
Bump to 2.6.21.
* patches/8232643-pr3761.patch:
Temporary copy of fix removed with upgrade
to 7u251, where it's available upstream.
* Makefile.am:
(CORBA_CHANGESET): Update to icedtea-2.6.20.
(JAXP_CHANGESET): Likewise.
(JAXWS_CHANGESET): Likewise.
(JDK_CHANGESET): Likewise.
(LANGTOOLS_CHANGESET): Likewise.
(OPENJDK_CHANGESET): Likewise.
(CORBA_SHA256SUM): Likewise.
(JAXP_SHA256SUM): Likewise.
(JAXWS_SHA256SUM): Likewise.
(JDK_SHA256SUM): Likewise.
(LANGTOOLS_SHA256SUM): Likewise.
(OPENJDK_SHA256SUM): Likewise.
(ICEDTEA_PATCHES): Drop JDK-8232643/PR3761 patch.
* NEWS: Updated.
* acinclude.m4:
(JDK_UPDATE_VERSION): Bump to 251.
(BUILD_VERSION): Set to b02.
* configure.ac: Bump to 2.6.21.
* hotspot.map.in: Update to icedtea-2.6.21.
* patches/boot/ecj-diamond.patch:
Regenerated. Add new cases in
sun.security.krb5.Config,
sun.security.krb5.SCDynamicStoreConfig,
sun.security.krb5.internal.rcache.MemoryCache,
sun.security.krb5.internal.rcache.DflCache,
sun.security.krb5.internal.rcache.AuthList,
sun.security.x509.AVA,
sun.security.x509.X500Name,
sun.misc.IOUtils,
javax.security.Sasl & com.sun.crypto.provider.JceKeyStore
* patches/boot/ecj-multicatch.patch:
Regenerated.
* patches/boot/ecj-trywithresources.patch:
Regenerated. Add new cases in java.nio.file.Files,
sun.reflect.misc.MethodUtil, sun.security.krb5.Config &
sun.security.krb5.internal.rcache.DflCache
diffstat:
ChangeLog | 46 +-
Makefile.am | 28 +-
NEWS | 93 +
acinclude.m4 | 4 +-
configure.ac | 2 +-
hotspot.map.in | 2 +-
patches/8232643-pr3761.patch | 24 -
patches/boot/ecj-diamond.patch | 2174 ++++++++++++++++--------------
patches/boot/ecj-multicatch.patch | 396 ++--
patches/boot/ecj-trywithresources.patch | 347 +++-
10 files changed, 1715 insertions(+), 1401 deletions(-)
diffs (truncated from 7655 to 500 lines):
diff -r 888139ad9b3b -r f213ed00466c ChangeLog
--- a/ChangeLog Wed Nov 20 06:36:29 2019 +0000
+++ b/ChangeLog Wed Feb 26 20:01:35 2020 +0000
@@ -1,3 +1,47 @@
+2020-02-26 Andrew John Hughes <gnu_andrew at member.fsf.org>
+
+ Bump to 2.6.21.
+ * patches/8232643-pr3761.patch:
+ Temporary copy of fix removed with upgrade
+ to 7u251, where it's available upstream.
+ * Makefile.am:
+ (CORBA_CHANGESET): Update to icedtea-2.6.20.
+ (JAXP_CHANGESET): Likewise.
+ (JAXWS_CHANGESET): Likewise.
+ (JDK_CHANGESET): Likewise.
+ (LANGTOOLS_CHANGESET): Likewise.
+ (OPENJDK_CHANGESET): Likewise.
+ (CORBA_SHA256SUM): Likewise.
+ (JAXP_SHA256SUM): Likewise.
+ (JAXWS_SHA256SUM): Likewise.
+ (JDK_SHA256SUM): Likewise.
+ (LANGTOOLS_SHA256SUM): Likewise.
+ (OPENJDK_SHA256SUM): Likewise.
+ (ICEDTEA_PATCHES): Drop JDK-8232643/PR3761 patch.
+ * NEWS: Updated.
+ * acinclude.m4:
+ (JDK_UPDATE_VERSION): Bump to 251.
+ (BUILD_VERSION): Set to b02.
+ * configure.ac: Bump to 2.6.21.
+ * hotspot.map.in: Update to icedtea-2.6.21.
+ * patches/boot/ecj-diamond.patch:
+ Regenerated. Add new cases in
+ sun.security.krb5.Config,
+ sun.security.krb5.SCDynamicStoreConfig,
+ sun.security.krb5.internal.rcache.MemoryCache,
+ sun.security.krb5.internal.rcache.DflCache,
+ sun.security.krb5.internal.rcache.AuthList,
+ sun.security.x509.AVA,
+ sun.security.x509.X500Name,
+ sun.misc.IOUtils,
+ javax.security.Sasl & com.sun.crypto.provider.JceKeyStore
+ * patches/boot/ecj-multicatch.patch:
+ Regenerated.
+ * patches/boot/ecj-trywithresources.patch:
+ Regenerated. Add new cases in java.nio.file.Files,
+ sun.reflect.misc.MethodUtil, sun.security.krb5.Config &
+ sun.security.krb5.internal.rcache.DflCache
+
2019-11-19 Andrew John Hughes <gnu_andrew at member.fsf.org>
Start 2.6.21 release cycle.
@@ -24,7 +68,7 @@
* patches/rh1022017.patch:
Removed as included upstream as 8228825 / CVE-2019-2894.
* Makefile.am:
- (CORBA_CHANGESET): Update to icedtea-2.6.19.
+ (CORBA_CHANGESET): Update to icedtea-2.6.20.
(JAXP_CHANGESET): Likewise.
(JAXWS_CHANGESET): Likewise.
(JDK_CHANGESET): Likewise.
diff -r 888139ad9b3b -r f213ed00466c Makefile.am
--- a/Makefile.am Wed Nov 20 06:36:29 2019 +0000
+++ b/Makefile.am Wed Feb 26 20:01:35 2020 +0000
@@ -1,18 +1,18 @@
# Dependencies
-CORBA_CHANGESET = 4493de9f3f0b
-JAXP_CHANGESET = 5e4ceb999239
-JAXWS_CHANGESET = b24931dd91c6
-JDK_CHANGESET = 89324d11814d
-LANGTOOLS_CHANGESET = 480d3ab02c36
-OPENJDK_CHANGESET = b04b11ab5066
-
-CORBA_SHA256SUM = 81e3ddac83b981400c062788bcd3005587d5984f18def588d8cd232b9b5b24ef
-JAXP_SHA256SUM = 21772ab65388c1890ff33f9a5dc2fd22f69fd0f0f0d336e1f8f64d920b308b90
-JAXWS_SHA256SUM = 3e27f2e6b92d0b15d544e06b897cf2b072bece695a0a8a79de6cd609f1a216ef
-JDK_SHA256SUM = 56aacc5bfeab0688a4042f9ffdc971b5764f99c9fdea0080f41e2bfaa27a08b0
-LANGTOOLS_SHA256SUM = 8057da4c87ecea91ec16b4b180ab006ae12be60a2f8387dfe2a7b18c8e303379
-OPENJDK_SHA256SUM = f1e430150f95073a3dc1f4f32bdfbf8cc6aa4b23cb940128f0224b7da90516aa
+CORBA_CHANGESET = e3f769a410e4
+JAXP_CHANGESET = 099ed3ab6415
+JAXWS_CHANGESET = c4230372ddc0
+JDK_CHANGESET = 5cfb0b2d8b78
+LANGTOOLS_CHANGESET = 0581b1282c3e
+OPENJDK_CHANGESET = de70c40573f2
+
+CORBA_SHA256SUM = 2675a6c3f151b4af73f8edca328d36e6a9fe0ae8d3c048c5e884ccdb57765584
+JAXP_SHA256SUM = 7873f5f596e32643dd5c0642cb4a6a6d8adbd4dfe36a3fc4e198f772aa3ae9ee
+JAXWS_SHA256SUM = 75db9f2c90a49fc9eda32bbff83c978a6b032859270c55aee8fcf053cfbcec73
+JDK_SHA256SUM = b8d99a271e5f946a70267bc1f174720d1c9584aa77dd454a0a87ec05259cc280
+LANGTOOLS_SHA256SUM = 3645b8e3cd5be93c5efbac8421da3159958e817ddb4db2cc82673ac3887b55d2
+OPENJDK_SHA256SUM = d649cec806eb0d12b24f0554fecf1382138a4fbab7cea62172f2aae3866cfd18
DROP_URL = https://icedtea.classpath.org/download/drops
@@ -369,7 +369,7 @@
# Patch list
-ICEDTEA_PATCHES = patches/8232643-pr3761.patch
+ICEDTEA_PATCHES =
# Conditional patches
diff -r 888139ad9b3b -r f213ed00466c NEWS
--- a/NEWS Wed Nov 20 06:36:29 2019 +0000
+++ b/NEWS Wed Feb 26 20:01:35 2020 +0000
@@ -14,6 +14,99 @@
New in release 2.6.21 (2020-01-XX):
+* Security fixes
+ - S8224909, CVE-2020-2583: Unlink Set of LinkedHashSets
+ - S8225261: Better method resolutions
+ - S8225279: Better XRender interpolation
+ - S8226352, CVE-2020-2590: Improve Kerberos interop capabilities
+ - S8227758: More valid PKIX processing
+ - S8227816: More Colorful ICC profiles
+ - S8228548, CVE-2020-2593: Normalize normalization for all
+ - S8229951, CVE-2020-2601: Better Ticket Granting Services
+ - S8230279: Improve Pack200 file reading
+ - S8230318: Better trust store usage
+ - S8230967: Improve Registry support of clients
+ - S8231129: More glyph images
+ - S8231139: Improved keystore support
+ - S8231422, CVE-2020-2604: Better serial filter handling
+ - S8231795, CVE-2020-2659: Enhance datagram socket support
+ - S8232419: Improve Registry registration
+ - S8234037, CVE-2020-2654: Improve Object Identifier Processing
+* Import of OpenJDK 7 u251 build 1
+ - S8017773: OpenJDK7 returns incorrect TrueType font metrics
+ - S8214002: Cannot use italic font style if the font has embedded bitmap
+* Import of OpenJDK 7 u251 build 2
+ - S6675699: need comprehensive fix for unconstrained ConvI2L with narrowed type
+ - S6880619: reg tests for 6879540
+ - S7024771: "\\<>" in attribute value part of X500Principal constructor parameter makes strange effect
+ - S7111579: klist starttime, renewtill, ticket etype
+ - S7152176: More krb5 tests
+ - S7172701: KDC tests cleanup
+ - S7175041: HttpTimestamper should accept https URI
+ - S7184246: Simplify Config.get() of krb5
+ - S7184932: Remove the temporary Selector usage in the NIO socket adapters
+ - S8001326: Improve Kerberos caching
+ - S8011124: Make KerberosTime immutable
+ - S8012679: Let allow_weak_crypto default to false
+ - S8014310: JAAS/Krb5LoginModule using des encytypes failure with NPE after JDK-8012679
+ - S8017453: ReplayCache tests fail on multiple platforms
+ - S8019410: sun/security/krb5/auto/ReplayCacheTestProc.java
+ - S8020971: Fix doclint issues in java.nio.*
+ - S8028049: Tidy warnings cleanup for packages java.nio/java.io
+ - S8031111: fix krb5 caddr
+ - S8031997: PPC64: Make the various POLL constants system dependant
+ - S8033271: Manual security tests have @ignore rather than @run main/manual
+ - S8036779: sun.security.krb5.KdcComm interprets kdc_timeout as msec instead of sec
+ - S8036971: krb5.conf does not accept directive lines before the first section
+ - S8037550: Update RFC references in javadoc to RFC 5280
+ - S8039132: cleanup @ignore JAAS/krb5 tests
+ - S8039438: Some tests depend on internal API sun.misc.IOUtils
+ - S8044500: Add kinit options and krb5.conf flags that allow users to obtain renewable tickets and specify ticket lifetimes
+ - S8058290: JAAS Krb5LoginModule has suspect ticket-renewal logic, relies on clockskew grace
+ - S8075297: Tests for RFEs 4515853 and 4745056
+ - S8075299: Additional tests for krb5 settings
+ - S8075301: Tests for sun.security.krb5.principal system property
+ - S8080835: Add blocking bulk read to sun.misc.IOUtils
+ - S8131051: KDC might issue a renewable ticket even if not requested
+ - S8132111: Do not request for addresses for forwarded TGT
+ - S8134232: KeyStore.load() throws an IOException with a wrong cause in case of wrong password
+ - S8138978: Examine usages of sun.misc.IOUtils
+ - S8139206: Add InputStream readNBytes(int len)
+ - S8147772: Update KerberosTicket to describe behavior if it has been destroyed and fix NullPointerExceptions
+ - S8149543: range check CastII nodes should not be split through Phi
+ - S8154831: CastII/ConvI2L for a range check is prematurely eliminated
+ - S8163104: Unexpected NPE still possible on some Kerberos ticket calls
+ - S8177095: Range check dependent CastII/ConvI2L is prematurely eliminated
+ - S8183591: Incorrect behavior when reading DER value with Integer.MAX_VALUE length
+ - S8186576: KerberosTicket does not properly handle renewable tickets at the end of their lifetime
+ - S8186831: Kerberos ignores PA-DATA with a non-null s2kparams
+ - S8186884: Test native KDC, Java krb5 lib, and native krb5 lib in one test
+ - S8187218: GSSCredential.getRemainingLifetime() returns negative value for TTL > 24 days.
+ - S8190690: Impact on krb5 test cases in the 8u-CPU nightly
+ - S8193832: Performance of InputStream.readAllBytes() could be improved
+ - S8196956: (ch) More channels cleanup
+ - S8197518: Kerberos krb5 authentication: AuthList's put method leads to performance issue
+ - S8200400: Restrict Sasl mechanisms
+ - S8201627: Kerberos sequence number issues
+ - S8218854: FontMetrics.getMaxAdvance may be less than the maximum FontMetrics.charWidth
+ - S8221304: Problem list java/awt/FontMetrics/MaxAdvanceIsMax.java
+ - S8225425: java.lang.UnsatisfiedLinkError: net.dll: Can't find dependent libraries
+ - S8227662: freetype seeks to index at the end of the font data
+ - S8228469: (tz) Upgrade time-zone data to tzdata2019b
+ - S8229767: Typo in java.security: Sasl.createClient and Sasl.createServer
+ - S8230085: (fs) FileStore::isReadOnly is always true on macOS Catalina
+ - S8231098: (tz) Upgrade time-zone data to tzdata2019c
+ - S8232003: (fs) Files.write can leak file descriptor in the exception case
+ - S8232381: add result NULL-checking to freetypeScaler.c
+ - S8235909: File.exists throws AccessControlException for invalid paths when a SecurityManager is installed
+ - S8236983: [TESTBUG] Remove pointless catch block in test/jdk/sun/security/util/DerValue/BadValue.java
+ - S8236984: Add compatibility wrapper for IOUtils.readFully
+ - S8237368: Problem with NullPointerException in RMI TCPEndpoint.read
+ - S8237604: [TEST_BUG] sun/security/tools/jarsigner/EntriesOrder.java not adapted for changes in JDK-7194449
+* Bug fixes
+ - S8135018, PR3774: AARCH64: Missing memory barriers for CMS collector
+ - S8233839, PR3774: aarch64: missing memory barrier in NewObjectArrayStub and NewTypeArrayStub
+
New in release 2.6.20 (2019-11-17):
* Security fixes
diff -r 888139ad9b3b -r f213ed00466c acinclude.m4
--- a/acinclude.m4 Wed Nov 20 06:36:29 2019 +0000
+++ b/acinclude.m4 Wed Feb 26 20:01:35 2020 +0000
@@ -2948,8 +2948,8 @@
AC_MSG_CHECKING([which branch and release of IcedTea is being built])
JAVA_VER=1.7.0
JAVA_VENDOR=openjdk
- JDK_UPDATE_VERSION=241
- BUILD_VERSION=b01
+ JDK_UPDATE_VERSION=251
+ BUILD_VERSION=b02
MILESTONE=fcs
if test "x${MILESTONE}" = "xfcs"; then
COMBINED_VERSION=${JDK_UPDATE_VERSION}-${BUILD_VERSION}
diff -r 888139ad9b3b -r f213ed00466c configure.ac
--- a/configure.ac Wed Nov 20 06:36:29 2019 +0000
+++ b/configure.ac Wed Feb 26 20:01:35 2020 +0000
@@ -1,4 +1,4 @@
-AC_INIT([icedtea], [2.6.21pre00], [distro-pkg-dev at openjdk.java.net])
+AC_INIT([icedtea], [2.6.21], [distro-pkg-dev at openjdk.java.net])
AC_CANONICAL_HOST
AC_CANONICAL_TARGET
AM_INIT_AUTOMAKE([1.9 tar-pax foreign])
diff -r 888139ad9b3b -r f213ed00466c hotspot.map.in
--- a/hotspot.map.in Wed Nov 20 06:36:29 2019 +0000
+++ b/hotspot.map.in Wed Feb 26 20:01:35 2020 +0000
@@ -1,2 +1,2 @@
# version type(drop/hg) url changeset sha256sum
-default drop https://icedtea.classpath.org/download/drops/icedtea7/@ICEDTEA_RELEASE@ 8145b03db545 27cc76f3deb0efb84fb1422e9636cb0b09fce21648318671905c959b86cd5612
+default drop https://icedtea.classpath.org/download/drops/icedtea7/@ICEDTEA_RELEASE@ d89441a9ce98 25eab5aef4e2219d54e593cc0bdced274bbdd66ec69e46dc6e92d46e74ecccb9
diff -r 888139ad9b3b -r f213ed00466c patches/8232643-pr3761.patch
--- a/patches/8232643-pr3761.patch Wed Nov 20 06:36:29 2019 +0000
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,24 +0,0 @@
-# HG changeset patch
-# User mbalao
-# Date 1571433044 10800
-# Fri Oct 18 18:10:44 2019 -0300
-# Node ID 55de33c12fdcff9cc3fa391e9343a04d398c48e5
-# Parent ce5e37056409870413d49cce681049b711220849
-8232643: Building error in jdk7u241 after 7068616
-Reviewed-by: andrew
-
-diff --git openjdk.orig/jdk/src/share/classes/sun/nio/cs/ext/DoubleByteDecoder.java openjdk/jdk/src/share/classes/sun/nio/cs/ext/DoubleByteDecoder.java
---- openjdk.orig/jdk/src/share/classes/sun/nio/cs/ext/DoubleByteDecoder.java
-+++ openjdk/jdk/src/share/classes/sun/nio/cs/ext/DoubleByteDecoder.java
-@@ -209,9 +209,9 @@
- if (bugLevel == null) {
- if (!sun.misc.VM.isBooted())
- return false;
-- java.security.PrivilegedAction pa =
-+ java.security.PrivilegedAction<String> pa =
- new GetPropertyAction("sun.nio.cs.bugLevel");
-- String value = (String)AccessController.doPrivileged(pa);
-+ String value = AccessController.doPrivileged(pa);
- bugLevel = (value != null) ? value : "";
- }
- return bugLevel.equals(bl);
diff -r 888139ad9b3b -r f213ed00466c patches/boot/ecj-diamond.patch
--- a/patches/boot/ecj-diamond.patch Wed Nov 20 06:36:29 2019 +0000
+++ b/patches/boot/ecj-diamond.patch Wed Feb 26 20:01:35 2020 +0000
@@ -1,6 +1,6 @@
diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2019-11-13 20:42:04.818282257 +0000
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2020-02-06 01:42:50.000000000 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2020-02-24 01:41:18.925742295 +0000
@@ -58,7 +58,7 @@
private CorbaConnection conn;
@@ -11,8 +11,8 @@
public static synchronized void cleanCache( ORB orb ) {
synchronized (iorMapLock) {
diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java 2019-11-13 20:33:32.210186098 +0000
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java 2019-11-13 20:42:04.818282257 +0000
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java 2020-02-23 05:10:04.663315044 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java 2020-02-24 01:41:18.925742295 +0000
@@ -481,7 +481,7 @@
while (cls != fnscl) {
ProtectionDomain pd = cls.getProtectionDomain();
@@ -32,8 +32,8 @@
pds.add(noPermissionsDomain());
break;
diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2019-11-13 20:42:04.818282257 +0000
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2020-02-06 01:42:50.000000000 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2020-02-24 01:41:18.925742295 +0000
@@ -50,7 +50,7 @@
*/
private class HookPutFields extends ObjectOutputStream.PutField
@@ -44,8 +44,8 @@
/**
* Put the value of the named boolean field into the persistent field.
diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/ior/IORTypeCheckRegistryImpl.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/ior/IORTypeCheckRegistryImpl.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/ior/IORTypeCheckRegistryImpl.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/ior/IORTypeCheckRegistryImpl.java 2019-11-13 20:42:04.818282257 +0000
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/ior/IORTypeCheckRegistryImpl.java 2020-02-06 01:42:50.000000000 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/ior/IORTypeCheckRegistryImpl.java 2020-02-24 01:41:18.925742295 +0000
@@ -103,7 +103,7 @@
Set<String> _iorTypeNames = null;
if (filterProperty != null) {
@@ -74,8 +74,8 @@
}
diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2019-11-13 20:42:04.818282257 +0000
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2020-02-06 01:42:50.000000000 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2020-02-24 01:41:18.925742295 +0000
@@ -1323,7 +1323,7 @@
protected void shutdownServants(boolean wait_for_completion) {
Set<ObjectAdapterFactory> oaset;
@@ -86,8 +86,8 @@
for (ObjectAdapterFactory oaf : oaset)
diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2020-02-06 01:42:50.000000000 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2020-02-24 01:41:18.925742295 +0000
@@ -108,7 +108,7 @@
private ThreadGroup threadGroup;
@@ -107,8 +107,8 @@
for (WorkerThread wt : copy) {
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java 2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java 2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java 2020-02-24 01:41:18.925742295 +0000
@@ -192,7 +192,7 @@
NodeSet dist = new NodeSet();
dist.setShouldCacheNodes(true);
@@ -119,8 +119,8 @@
for (int i = 0; i < nl.getLength(); i++)
{
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/utils/XMLSecurityManager.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/utils/XMLSecurityManager.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/utils/XMLSecurityManager.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/utils/XMLSecurityManager.java 2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/utils/XMLSecurityManager.java 2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/utils/XMLSecurityManager.java 2020-02-24 01:41:18.925742295 +0000
@@ -420,7 +420,7 @@
}
@@ -131,8 +131,8 @@
/**
* Prints out warnings if a parser does not support the specified feature/property.
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java 2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java 2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java 2020-02-24 01:41:18.925742295 +0000
@@ -220,7 +220,7 @@
public Map<String, Object> getEnvironmentHash()
{
@@ -251,8 +251,8 @@
jarVersions.put(new Long(440237), "xalan.jar from xalan-j_1_2");
jarVersions.put(new Long(436094), "xalan.jar from xalan-j_1_2_1");
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java 2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java 2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java 2020-02-24 01:41:18.925742295 +0000
@@ -51,7 +51,7 @@
/**
* Legal conversions between internal types.
@@ -263,8 +263,8 @@
static {
// Possible type conversions between internal types
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java 2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java 2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java 2020-02-24 01:41:18.925742295 +0000
@@ -139,7 +139,7 @@
private boolean _isStatic = false;
@@ -288,8 +288,8 @@
// Possible conversions between Java and internal types
java2Internal.put(Boolean.TYPE, Type.Boolean);
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java 2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java 2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java 2020-02-24 01:41:18.925742295 +0000
@@ -107,7 +107,7 @@
// Check if we have any declared namespaces
@@ -336,8 +336,8 @@
SyntaxTreeNode n = _attributeElements.get(k);
if (n instanceof LiteralAttribute) {
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java 2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java 2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java 2020-02-24 01:41:18.929742233 +0000
@@ -129,22 +129,22 @@
/**
* A mapping between templates and test sequences.
@@ -390,8 +390,8 @@
_rootPattern = null;
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java 2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java 2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java 2020-02-24 01:41:18.929742233 +0000
@@ -102,11 +102,11 @@
}
@@ -428,8 +428,8 @@
_prefixMapping.put(prefix, uri);
}
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java 2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java 2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java 2020-02-24 01:41:18.929742233 +0000
@@ -122,7 +122,7 @@
/**
* Mapping between mode names and Mode instances.
@@ -458,8 +458,8 @@
/**
* A reference to the SourceLoader set by the user (a URIResolver
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java 2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java 2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java 2020-02-24 01:41:18.929742233 +0000
@@ -38,8 +38,8 @@
final class SymbolTable {
@@ -542,8 +542,8 @@
// Register the namespace URI
Integer refcnt = _excludedURI.get(uri);
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java 2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java 2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java 2020-02-24 01:41:18.929742233 +0000
@@ -70,7 +70,7 @@
protected SyntaxTreeNode _parent; // Parent node
private Stylesheet _stylesheet; // Stylesheet ancestor node
@@ -572,8 +572,8 @@
locals.add(varOrParamName);
}
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java 2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java 2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java 2020-02-24 01:41:18.929742233 +0000
@@ -127,7 +127,7 @@
* times. Note that patterns whose kernels are "*", "node()"
* and "@*" can between shared by test sequences.
@@ -584,8 +584,8 @@
public MethodGenerator(int access_flags, Type return_type,
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java 2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java 2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java 2020-02-24 01:41:18.929742233 +0000
@@ -37,7 +37,7 @@
public final class MultiHashtable<K,V> {
static final long serialVersionUID = -6151608290510033572L;
@@ -605,8 +605,8 @@
}
set.add(value);
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java 2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java 2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java 2020-02-24 01:41:18.929742233 +0000
@@ -171,7 +171,7 @@
_parser = new Parser(this, _overrideDefaultParser);
_xmlFeatures = featureManager;
@@ -635,8 +635,8 @@
_parser.init();
//_variableSerial = 1;
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java 2019-10-14 19:21:38.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java 2019-11-13 20:42:04.822282195 +0000
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java 2020-02-06 01:42:52.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java 2020-02-24 01:41:18.929742233 +0000
@@ -169,7 +169,7 @@
_count = 0;
_current = 0;
@@ -647,8 +647,8 @@
try {
More information about the distro-pkg-dev
mailing list