From owner-freebsd-java@FreeBSD.ORG Mon Jul 15 11:06:46 2013 Return-Path: Delivered-To: freebsd-java@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id 74A28F5C for ; Mon, 15 Jul 2013 11:06:46 +0000 (UTC) (envelope-from owner-bugmaster@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id 50342FC4 for ; Mon, 15 Jul 2013 11:06:46 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id r6FB6knO084488 for ; Mon, 15 Jul 2013 11:06:46 GMT (envelope-from owner-bugmaster@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id r6FB6jOJ084484 for freebsd-java@FreeBSD.org; Mon, 15 Jul 2013 11:06:45 GMT (envelope-from owner-bugmaster@FreeBSD.org) Date: Mon, 15 Jul 2013 11:06:45 GMT Message-Id: <201307151106.r6FB6jOJ084484@freefall.freebsd.org> X-Authentication-Warning: freefall.freebsd.org: gnats set sender to owner-bugmaster@FreeBSD.org using -f From: FreeBSD bugmaster To: freebsd-java@FreeBSD.org Subject: Current problem reports assigned to freebsd-java@FreeBSD.org X-BeenThere: freebsd-java@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Porting Java to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 15 Jul 2013 11:06:46 -0000 Note: to view an individual PR, use: http://www.freebsd.org/cgi/query-pr.cgi?pr=(number). The following is a listing of current problems submitted by FreeBSD users. These represent problem reports covering all versions including experimental development code and obsolete releases. S Tracker Resp. Description -------------------------------------------------------------------------------- o ports/180541 java [PATCH] java/openjdk6 (add IcedTea6 patch S8005615 to o ports/180526 java java/icedtea-web java plugin doesn't work with openjdk o ports/179927 java java/jboss72 Can't start with rc script o ports/178856 java java/openjdk6, java/openjdk7: Java fails to print when o ports/178816 java java/netbeans does not build, compile error at java/op o ports/178728 java [UPDATE] devel/apache-ant to v1.9.0 o ports/178647 java java/openjdk6 does not build (without extra hack) o ports/178199 java java/openjdk6 regression amd64/clang o ports/177802 java Could not update openfire because of problem in java/o o ports/177067 java java/openjdk6 b27_2 bug o ports/175300 java java/jamvm fails to compile on ARM6 (raspberry-pi) o ports/174826 java java/openjdk6: gmake[5]: *** [/usr/ports/java/openjdk6 o ports/174825 java java/openjdk6: fails to build on i386 (64-bit mode not o ports/173603 java java/icedtea-web starts javaws incorrectly o ports/173592 java java/openjdk6 fails on FreeBSD_9_1_RC2 o ports/173210 java java/openjdk6 - use better src placement o java/172962 java Sig11 while compiling OpenJDK6-b26 using clang o ports/171014 java [patch] Correct java/openjdk6 Dependency Declaration o ports/167903 java [PATCH] java/openjdk6: Fix build failure in 8.3 jail r o ports/164941 java [UPDATE] [NEW PORTS] java/classpath-initial, including o ports/162991 java java/openjdk6 fails to build o java/162522 java OpenJDK 6 is not setting close on exec o java/160553 java Jaikoz java based audio tagger core dumps o ports/159787 java java/openjdk6 nio muti-thread bug o ports/154884 java java/openjdk6: Every NetBeans version on FreeBSD 8.1 c f java/147512 java Crash of RXTX-2.1-7 on AMD64 system o java/140002 java java/openjdk6: jconsole dumps tomcat when contacting j o java/128809 java JVM aborted when GNU RXTX write to serial port. o java/123555 java linux-sun-jdk15, linux-sun-jdk16 produce a coredump o java/122513 java native JDKs unbuildable with Linux ones o ports/119732 java java/linux-sun-jre16: linux-sun-jre16 plugin doesn't w o java/119063 java An unexpected error has been detected by Java Runtime o ports/116082 java java/linux-sun-jdk16 jconsole is unable to connect to 33 problems total. From owner-freebsd-java@FreeBSD.ORG Tue Jul 16 06:06:38 2013 Return-Path: Delivered-To: java@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) by hub.freebsd.org (Postfix) with ESMTP id 70D396E for ; Tue, 16 Jul 2013 06:06:38 +0000 (UTC) (envelope-from baptiste.daroussin@gmail.com) Received: from mail-we0-x236.google.com (mail-we0-x236.google.com [IPv6:2a00:1450:400c:c03::236]) by mx1.freebsd.org (Postfix) with ESMTP id 1268FFE4 for ; Tue, 16 Jul 2013 06:06:37 +0000 (UTC) Received: by mail-we0-f182.google.com with SMTP id p60so224090wes.13 for ; Mon, 15 Jul 2013 23:06:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=sender:date:from:to:subject:message-id:mime-version:content-type :content-disposition:user-agent; bh=/V+LpGD2+EfRG6kKBQn3iL6ZhMY8rDxLBUWuygMJnC0=; b=ZVnXgzA4aHIayJdme4C8qN1soX4IPJyMjPMAcf6qxHVGKTki2UgV8qngsbrAySM0Ft t1Gnj3ba0r9ue77Bv0pFXw4/EqF/u4wSEcEU09A4dBhdKUUfsvSHWx8Zq7hs495sgTYt /oIwneVO88z2rwkGATVjMWRW+0o/cnMtBcHo6b5RjsQDHdI7HgI0MGLYq5rT3Ve5aErU WcbDBf7mWR4C0bcoeb849ZoENFI+K0eEk/s5mfhjdtDh2qob57xNNV1dLo/dzn5N90vM OkgtlmIxwekUYOsE80N808olXk+Srxvped2pSlcjfe12KrtQZg4hXn9sRvoQ8QbVzxop Ktfg== X-Received: by 10.180.160.162 with SMTP id xl2mr5850502wib.2.1373954797159; Mon, 15 Jul 2013 23:06:37 -0700 (PDT) Received: from ithaqua.etoilebsd.net (ithaqua.etoilebsd.net. [37.59.37.188]) by mx.google.com with ESMTPSA id ev19sm25334766wid.2.2013.07.15.23.06.35 for (version=TLSv1 cipher=RC4-SHA bits=128/128); Mon, 15 Jul 2013 23:06:36 -0700 (PDT) Sender: Baptiste Daroussin Date: Tue, 16 Jul 2013 08:06:34 +0200 From: Baptiste Daroussin To: java@FreeBSD.org Subject: OpenJDK kills building cluster on HEAD amd64 Message-ID: <20130716060633.GB2704@ithaqua.etoilebsd.net> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="5I6of5zJg18YgZEa" Content-Disposition: inline User-Agent: Mutt/1.5.21 (2010-09-15) X-BeenThere: freebsd-java@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Porting Java to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 16 Jul 2013 06:06:38 -0000 --5I6of5zJg18YgZEa Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Hi, Is there any known problem with OpenJDK when running on head amd64? On the package building clusters we have been able to build packages for FreeBSD 8, 9, 10 i386 without problems, we have been able to build packages on 8 9 amd64 without problems But when building packages for the 10 amd64 target the cluster dies "out of swap." and this happens very quickly: after a first crash when rerunning the bulk of packages makes the server dies in a couple of minutes. Unfortunatly I have not been able to indentify which package build is eating all the memory. All I know right now is that OpenJDK itself manage to build OpenJDK 6 and 7 and the following packages: - jaf-1.1.1 - jakarta-commons-cli-1.2,1 - jakarta-commons-logging-1.1.1 - jdictionary-1.8_4 - jruby-1.7.4 - junit-4.10 - log4j-1.2.16 - tomcat-6.0.37 - xalan-j-2.7.1 - xerces-j-2.11.0 - xml-commons-1.4.01 So to build packages on head amd64 I had to mark openjdk6 has broken and I am planning to do so directly in the ports tree. Does that ring a bell to someone? This is really important to be able to bebug this if we want java packages available. regards, Bapt --5I6of5zJg18YgZEa Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (FreeBSD) iEYEARECAAYFAlHk4ukACgkQ8kTtMUmk6EzD6wCdEY7d+7adek6WSZV7dCVhdnd+ 3OoAmwY1Oq0KZyPqCbfHJAQD6TTPJmA8 =/3Kj -----END PGP SIGNATURE----- --5I6of5zJg18YgZEa-- From owner-freebsd-java@FreeBSD.ORG Tue Jul 16 21:10:02 2013 Return-Path: Delivered-To: freebsd-java@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id 2688380F for ; Tue, 16 Jul 2013 21:10:02 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id 16B9B1CD for ; Tue, 16 Jul 2013 21:10:02 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id r6GLA1dh038200 for ; Tue, 16 Jul 2013 21:10:01 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id r6GLA1uK038198; Tue, 16 Jul 2013 21:10:01 GMT (envelope-from gnats) Date: Tue, 16 Jul 2013 21:10:01 GMT Message-Id: <201307162110.r6GLA1uK038198@freefall.freebsd.org> To: freebsd-java@FreeBSD.org Cc: From: dfilter@FreeBSD.ORG (dfilter service) Subject: Re: ports/180541: commit references a PR X-BeenThere: freebsd-java@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list Reply-To: dfilter service List-Id: Porting Java to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 16 Jul 2013 21:10:02 -0000 The following reply was made to PR ports/180541; it has been noted by GNATS. From: dfilter@FreeBSD.ORG (dfilter service) To: bug-followup@FreeBSD.org Cc: Subject: Re: ports/180541: commit references a PR Date: Tue, 16 Jul 2013 21:07:35 +0000 (UTC) Author: jkim Date: Tue Jul 16 21:07:25 2013 New Revision: 323126 URL: http://svnweb.freebsd.org/changeset/ports/323126 Log: Add multiple security patches and improvements from IcedTea6 1.12.6. http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-July/023941.html Obtained from: IcedTea Project PR: ports/180541 Added: head/java/openjdk6/Makefile.icedtea (contents, props changed) head/java/openjdk6/files/icedtea/openjdk/6469266-xmlsec_1.4.2.patch (contents, props changed) head/java/openjdk6/files/icedtea/openjdk/6786028-wcag_bold_tags.patch (contents, props changed) head/java/openjdk6/files/icedtea/openjdk/6786682-wcag_lang.patch (contents, props changed) head/java/openjdk6/files/icedtea/openjdk/6786688-wcag_table.patch (contents, props changed) head/java/openjdk6/files/icedtea/openjdk/6786690-wcag_dl.patch (contents, props changed) head/java/openjdk6/files/icedtea/openjdk/6802694-no_deprecated.patch (contents, props changed) head/java/openjdk6/files/icedtea/openjdk/6851834-handle_renames.patch (contents, props changed) head/java/openjdk6/files/icedtea/openjdk/6851834-restructure.patch (contents, props changed) head/java/openjdk6/files/icedtea/openjdk/6888167-medialib_memory_leaks.patch (contents, props changed) head/java/openjdk6/files/icedtea/openjdk/6961178-doclet_xml.patch (contents, props changed) head/java/openjdk6/files/icedtea/openjdk/7006270-regressions.patch (contents, props changed) head/java/openjdk6/files/icedtea/openjdk/7195301-no_instanceof_node.patch (contents, props changed) head/java/openjdk6/files/icedtea/openjdk/8005615-failure_to_load_logger_implementation.patch (contents, props changed) head/java/openjdk6/files/icedtea/openjdk/8007393.patch (contents, props changed) head/java/openjdk6/files/icedtea/openjdk/8007611.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/ head/java/openjdk6/files/icedtea/security/20130618/6741606-apache_santuario.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/7158805-nested_subroutine_rewriting.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/7170730-windows_network_stack.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8000638-improve_deserialization.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8000642-better_transportation_handling.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8001032-restrict_object_access-corba.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8001033-refactor_address_handling.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8001034-memory_management.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8001038-resourcefully_handle_resources.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8001043-clarify_definition_restrictions.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8001309-better_handling_of_annotation_interfaces.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8001318-6_fixup.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8001318-socket_getlocaladdress_consistency.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8001330-checking_order_improvement.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8001330-improve_checking_order.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8003703-update_rmi_connection_dialog.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8004584-augment_applet_contextualization.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8005007-better_glyph_processing.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8006328-6_fixup.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8006328-sound_class_robustness.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8006611-improve_scripting.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8007467-improve_jmx_internal_api_robustness.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8007471-6_fixup.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8007471-improve_mbean_notifications.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8007812-getenclosingmethod.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8008120-improve_jmx_class_checking.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8008124-better_compliance_testing.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8008128-better_jmx_api_coherence.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8008132-better_serialization.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8008585-jmx_data_handling.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8008593-better_urlclassloader.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8008603-jmx_provider_provision.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8008611-6_fixup.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8008611-jmx_annotations.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8008615-jmx_internal_api_robustness.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8008623-mbeanserver_handling.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8008744-6741606_rework.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8008982-jmx_interface_changes.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8009004-rmi_connection_improvement.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8009013-t2k_glyphs.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8009034-jmx_notification_improvement.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8009038-jmx_notification_support_improvement.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8009067-improve_key_storing.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8009071-improve_shape_handling.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8009235-improve_tsa_data_handling.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8011243-improve_imaginglib.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8011248-better_component_rasters.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8011253-better_short_component_rasters.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8011257-better_byte_component_rasters.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8011557-improve_reflection.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8012375-javadoc_framing.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8012421-better_positioning.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8012438-better_image_validation.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8012597-better_image_channel_validation.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8012601-better_layout_validation.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8014281-better_xml_signature_checking.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/8015997-more_javadoc_framing.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/diamond_fix.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/handle_npe.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/javac_issue.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/langtools_generics.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/langtools_merge-01.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/langtools_merge-02.patch (contents, props changed) head/java/openjdk6/files/icedtea/security/20130618/langtools_merge-03.patch (contents, props changed) Modified: head/java/openjdk6/Makefile Modified: head/java/openjdk6/Makefile ============================================================================== --- head/java/openjdk6/Makefile Tue Jul 16 20:35:20 2013 (r323125) +++ head/java/openjdk6/Makefile Tue Jul 16 21:07:25 2013 (r323126) @@ -3,7 +3,7 @@ PORTNAME= openjdk6 PORTVERSION= b27 -PORTREVISION?= 3 +PORTREVISION?= 4 CATEGORIES= java devel MASTER_SITES= http://download.java.net/openjdk/jdk6/promoted/${PORTVERSION}/ \ http://download.java.net/jaxp/openjdk/jdk6/:jaxp \ @@ -39,84 +39,6 @@ RUN_DEPENDS= javavm:${PORTSDIR}/java/jav OPENJDK_BUILDDATE= 26_oct_2012 -EXTRA_PATCHES= ${FILESDIR}/icedtea/jaxp.patch \ - ${FILESDIR}/icedtea/jaxws.patch \ - ${FILESDIR}/icedtea/security/20120830/7182135-impossible_to_use_some_editors_directly.patch \ - ${FILESDIR}/icedtea/security/20130201/7201068.patch \ - ${FILESDIR}/icedtea/security/20130201/6563318.patch \ - ${FILESDIR}/icedtea/security/20130201/6664509.patch \ - ${FILESDIR}/icedtea/security/20130201/6776941.patch \ - ${FILESDIR}/icedtea/security/20130201/7141694.patch \ - ${FILESDIR}/icedtea/security/20130201/7173145.patch \ - ${FILESDIR}/icedtea/security/20130201/7186945.patch \ - ${FILESDIR}/icedtea/security/20130201/7186948.patch \ - ${FILESDIR}/icedtea/security/20130201/7186952.patch \ - ${FILESDIR}/icedtea/security/20130201/7186954.patch \ - ${FILESDIR}/icedtea/security/20130201/7192392.patch \ - ${FILESDIR}/icedtea/security/20130201/7192393.patch \ - ${FILESDIR}/icedtea/security/20130201/7192977.patch \ - ${FILESDIR}/icedtea/security/20130201/7197546.patch \ - ${FILESDIR}/icedtea/security/20130201/7200491.patch \ - ${FILESDIR}/icedtea/security/20130201/7200500.patch \ - ${FILESDIR}/icedtea/security/20130201/7201064.patch \ - ${FILESDIR}/icedtea/security/20130201/7201066.patch \ - ${FILESDIR}/icedtea/security/20130201/7201070.patch \ - ${FILESDIR}/icedtea/security/20130201/7201071.patch \ - ${FILESDIR}/icedtea/security/20130201/8000210.patch \ - ${FILESDIR}/icedtea/security/20130201/8000537.patch \ - ${FILESDIR}/icedtea/security/20130201/8000540.patch \ - ${FILESDIR}/icedtea/security/20130201/8000631.patch \ - ${FILESDIR}/icedtea/security/20130201/8001242.patch \ - ${FILESDIR}/icedtea/security/20130201/8001307.patch \ - ${FILESDIR}/icedtea/security/20130201/8001972.patch \ - ${FILESDIR}/icedtea/security/20130201/8002325.patch \ - ${FILESDIR}/icedtea/security/20130219/8006446.patch \ - ${FILESDIR}/icedtea/security/20130219/8006777.patch \ - ${FILESDIR}/icedtea/security/20130219/8007688.patch \ - ${FILESDIR}/icedtea/security/20130304/8007014.patch \ - ${FILESDIR}/icedtea/security/20130304/8007675.patch \ - ${FILESDIR}/icedtea/openjdk/7036559-concurrenthashmap_improvements.patch \ - ${FILESDIR}/icedtea/security/20130416/8009063.patch \ - ${FILESDIR}/icedtea/openjdk/8004302-soap_test_failure.patch \ - ${FILESDIR}/icedtea/security/20130416/6657673.patch \ - ${FILESDIR}/icedtea/security/20130416/6657673-fixup.patch \ - ${FILESDIR}/icedtea/openjdk/7133220-factory_finder_parser_transform_useBSClassLoader.patch \ - ${FILESDIR}/icedtea/security/20130416/6657673-factory_finder.patch \ - ${FILESDIR}/icedtea/openjdk/6669869-queries_per_appcontext.patch \ - ${FILESDIR}/icedtea/openjdk/5102804-memory_leak.patch \ - ${FILESDIR}/icedtea/openjdk/6963811-deadlock_fix.patch \ - ${FILESDIR}/icedtea/openjdk/7064279-resource_release.patch \ - ${FILESDIR}/icedtea/openjdk/7064279-fixup.patch \ - ${FILESDIR}/icedtea/security/20130416/7200507.patch \ - ${FILESDIR}/icedtea/security/20130416/8000724.patch \ - ${FILESDIR}/icedtea/security/20130416/8004986.patch \ - ${FILESDIR}/icedtea/openjdk/6501644-icu_sync.patch \ - ${FILESDIR}/icedtea/openjdk/6886358-layout_update.patch \ - ${FILESDIR}/icedtea/security/20130416/8001031.patch \ - ${FILESDIR}/icedtea/openjdk/7017324-kerning_crash.patch \ - ${FILESDIR}/icedtea/security/20130416/8001040.patch \ - ${FILESDIR}/icedtea/security/20130416/8001322.patch \ - ${FILESDIR}/icedtea/security/20130416/8001329.patch \ - ${FILESDIR}/icedtea/security/20130416/8003335.patch \ - ${FILESDIR}/icedtea/security/20130416/8003445.patch \ - ${FILESDIR}/icedtea/security/20130416/8003543.patch \ - ${FILESDIR}/icedtea/security/20130416/8004261.patch \ - ${FILESDIR}/icedtea/security/20130416/8004336.patch \ - ${FILESDIR}/icedtea/security/20130416/8005432.patch \ - ${FILESDIR}/icedtea/security/20130416/8005943.patch \ - ${FILESDIR}/icedtea/security/20130416/8006309.patch \ - ${FILESDIR}/icedtea/security/20130416/8006435.patch \ - ${FILESDIR}/icedtea/security/20130416/8006790.patch \ - ${FILESDIR}/icedtea/security/20130416/8006795.patch \ - ${FILESDIR}/icedtea/security/20130416/8007406.patch \ - ${FILESDIR}/icedtea/security/20130416/8007617.patch \ - ${FILESDIR}/icedtea/security/20130416/8007667.patch \ - ${FILESDIR}/icedtea/security/20130416/8007918.patch \ - ${FILESDIR}/icedtea/security/20130416/8009305.patch \ - ${FILESDIR}/icedtea/security/20130416/8009699.patch \ - ${FILESDIR}/icedtea/security/20130416/8009814.patch \ - ${FILESDIR}/icedtea/security/20130416/8009857.patch - OPTIONS_DEFINE= ICEDTEA IPV6 POLICY SOUND TZUPDATE OPTIONS_DEFAULT=ICEDTEA IPV6 TZUPDATE ICEDTEA_DESC= Apply additional patches from IcedTea @@ -134,6 +56,9 @@ TEST_DESC= Add support for running regre USES= gmake motif .include +.include "${.CURDIR}/Makefile.icedtea" + +EXTRA_PATCHES= ${ICEDTEA_PATCHES} # java extracts directly to the cwd WRKSRC= ${WRKDIR} @@ -231,12 +156,6 @@ MAKE_ENV+= SKIP_FASTDEBUG_BUILD=false MAKE_ENV+= SKIP_FASTDEBUG_BUILD=true .endif -.if ${PORT_OPTIONS:MICEDTEA} -EXTRA_PATCHES+= ${FILESDIR}/icedtea/openjdk/7032388-work_without_cmov_instruction.patch \ - ${FILESDIR}/icedtea/applet_hole.patch \ - ${FILESDIR}/icedtea/jpegclasses.patch -.endif - .if empty(PORT_OPTIONS:MIPV6) MAKE_ENV+= DONT_ENABLE_IPV6="YES" .endif Added: head/java/openjdk6/Makefile.icedtea ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/java/openjdk6/Makefile.icedtea Tue Jul 16 21:07:25 2013 (r323126) @@ -0,0 +1,170 @@ +# $FreeBSD$ + +_PATCHES= \ + jaxp.patch \ + jaxws.patch \ + security/20120830/7182135-impossible_to_use_some_editors_directly.patch \ + security/20130201/7201068.patch \ + security/20130201/6563318.patch \ + security/20130201/6664509.patch \ + security/20130201/6776941.patch \ + security/20130201/7141694.patch \ + security/20130201/7173145.patch \ + security/20130201/7186945.patch \ + security/20130201/7186948.patch \ + security/20130201/7186952.patch \ + security/20130201/7186954.patch \ + security/20130201/7192392.patch \ + security/20130201/7192393.patch \ + security/20130201/7192977.patch \ + security/20130201/7197546.patch \ + security/20130201/7200491.patch \ + security/20130201/7200500.patch \ + security/20130201/7201064.patch \ + security/20130201/7201066.patch \ + security/20130201/7201070.patch \ + security/20130201/7201071.patch \ + security/20130201/8000210.patch \ + security/20130201/8000537.patch \ + security/20130201/8000540.patch \ + security/20130201/8000631.patch \ + security/20130201/8001242.patch \ + security/20130201/8001307.patch \ + security/20130201/8001972.patch \ + security/20130201/8002325.patch \ + security/20130219/8006446.patch \ + security/20130219/8006777.patch \ + security/20130219/8007688.patch \ + security/20130304/8007014.patch \ + security/20130304/8007675.patch \ + openjdk/7036559-concurrenthashmap_improvements.patch \ + security/20130416/8009063.patch \ + openjdk/8004302-soap_test_failure.patch \ + security/20130416/6657673.patch \ + security/20130416/6657673-fixup.patch \ + openjdk/7133220-factory_finder_parser_transform_useBSClassLoader.patch \ + security/20130416/6657673-factory_finder.patch \ + openjdk/6669869-queries_per_appcontext.patch \ + openjdk/5102804-memory_leak.patch \ + openjdk/6963811-deadlock_fix.patch \ + openjdk/7064279-resource_release.patch \ + openjdk/7064279-fixup.patch \ + security/20130416/7200507.patch \ + security/20130416/8000724.patch \ + security/20130416/8004986.patch \ + openjdk/6501644-icu_sync.patch \ + openjdk/6886358-layout_update.patch \ + security/20130416/8001031.patch \ + openjdk/7017324-kerning_crash.patch \ + security/20130416/8001040.patch \ + security/20130416/8001322.patch \ + security/20130416/8001329.patch \ + security/20130416/8003335.patch \ + security/20130416/8003445.patch \ + security/20130416/8003543.patch \ + security/20130416/8004261.patch \ + security/20130416/8004336.patch \ + security/20130416/8005432.patch \ + security/20130416/8005943.patch \ + security/20130416/8006309.patch \ + security/20130416/8006435.patch \ + security/20130416/8006790.patch \ + security/20130416/8006795.patch \ + security/20130416/8007406.patch \ + security/20130416/8007617.patch \ + security/20130416/8007667.patch \ + security/20130416/8007918.patch \ + security/20130416/8009305.patch \ + security/20130416/8009699.patch \ + security/20130416/8009814.patch \ + security/20130416/8009857.patch \ + openjdk/7195301-no_instanceof_node.patch \ + openjdk/6469266-xmlsec_1.4.2.patch \ + security/20130618/6741606-apache_santuario.patch \ + security/20130618/7170730-windows_network_stack.patch \ + security/20130618/8000638-improve_deserialization.patch \ + security/20130618/8001032-restrict_object_access-corba.patch \ + security/20130618/8001033-refactor_address_handling.patch \ + security/20130618/8001034-memory_management.patch \ + security/20130618/8001038-resourcefully_handle_resources.patch \ + security/20130618/8001043-clarify_definition_restrictions.patch \ + security/20130618/8001309-better_handling_of_annotation_interfaces.patch \ + security/20130618/8001318-socket_getlocaladdress_consistency.patch \ + security/20130618/8001318-6_fixup.patch \ + security/20130618/8001330-improve_checking_order.patch \ + security/20130618/8003703-update_rmi_connection_dialog.patch \ + openjdk/8005615-failure_to_load_logger_implementation.patch \ + openjdk/8007393.patch \ + openjdk/8007611.patch \ + security/20130618/8004584-augment_applet_contextualization.patch \ + security/20130618/8005007-better_glyph_processing.patch \ + security/20130618/8006328-sound_class_robustness.patch \ + security/20130618/8006328-6_fixup.patch \ + security/20130618/8006611-improve_scripting.patch \ + security/20130618/8007467-improve_jmx_internal_api_robustness.patch \ + security/20130618/8007471-improve_mbean_notifications.patch \ + security/20130618/8007471-6_fixup.patch \ + security/20130618/8007812-getenclosingmethod.patch \ + security/20130618/8008120-improve_jmx_class_checking.patch \ + security/20130618/8008124-better_compliance_testing.patch \ + security/20130618/8008128-better_jmx_api_coherence.patch \ + security/20130618/8008132-better_serialization.patch \ + security/20130618/8008585-jmx_data_handling.patch \ + security/20130618/8008593-better_urlclassloader.patch \ + security/20130618/8008603-jmx_provider_provision.patch \ + security/20130618/8008611-jmx_annotations.patch \ + security/20130618/8008611-6_fixup.patch \ + security/20130618/8008615-jmx_internal_api_robustness.patch \ + security/20130618/8008623-mbeanserver_handling.patch \ + security/20130618/8008744-6741606_rework.patch \ + security/20130618/8008982-jmx_interface_changes.patch \ + security/20130618/8009004-rmi_connection_improvement.patch \ + security/20130618/8009013-t2k_glyphs.patch \ + security/20130618/8009034-jmx_notification_improvement.patch \ + security/20130618/8009038-jmx_notification_support_improvement.patch \ + security/20130618/8009067-improve_key_storing.patch \ + security/20130618/8009235-improve_tsa_data_handling.patch \ + openjdk/6888167-medialib_memory_leaks.patch \ + security/20130618/8011243-improve_imaginglib.patch \ + security/20130618/8011248-better_component_rasters.patch \ + security/20130618/8011253-better_short_component_rasters.patch \ + security/20130618/8011257-better_byte_component_rasters.patch \ + security/20130618/8011557-improve_reflection.patch \ + security/20130618/8012421-better_positioning.patch \ + security/20130618/8012438-better_image_validation.patch \ + security/20130618/8012597-better_image_channel_validation.patch \ + security/20130618/8012601-better_layout_validation.patch \ + security/20130618/8014281-better_xml_signature_checking.patch \ + security/20130618/diamond_fix.patch \ + security/20130618/handle_npe.patch \ + security/20130618/javac_issue.patch \ + security/20130618/7158805-nested_subroutine_rewriting.patch \ + security/20130618/8001330-checking_order_improvement.patch \ + security/20130618/8000642-better_transportation_handling.patch \ + openjdk/6786028-wcag_bold_tags.patch \ + openjdk/6786682-wcag_lang.patch \ + openjdk/6802694-no_deprecated.patch \ + openjdk/6786690-wcag_dl.patch \ + openjdk/6786688-wcag_table.patch \ + openjdk/6961178-doclet_xml.patch \ + openjdk/6851834-restructure.patch \ + openjdk/6851834-handle_renames.patch \ + openjdk/7006270-regressions.patch \ + security/20130618/8012375-javadoc_framing.patch \ + security/20130618/8015997-more_javadoc_framing.patch \ + security/20130618/langtools_merge-01.patch \ + security/20130618/langtools_merge-02.patch \ + security/20130618/langtools_generics.patch \ + security/20130618/langtools_merge-03.patch \ + security/20130618/8009071-improve_shape_handling.patch + +.if ${PORT_OPTIONS:MICEDTEA} +_PATCHES+= \ + openjdk/7032388-work_without_cmov_instruction.patch \ + applet_hole.patch \ + jpegclasses.patch +.endif + +.for p in ${_PATCHES} +ICEDTEA_PATCHES+= ${FILESDIR}/icedtea/${p} +.endfor Added: head/java/openjdk6/files/icedtea/openjdk/6469266-xmlsec_1.4.2.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/java/openjdk6/files/icedtea/openjdk/6469266-xmlsec_1.4.2.patch Tue Jul 16 21:07:25 2013 (r323126) @@ -0,0 +1,23876 @@ +# HG changeset patch +# User andrew +# Date 1371136223 -3600 +# Node ID a955a845f0d1b8e21e0780986d971b3712db26c7 +# Parent 2ae6d8da293f30c94c9478a6634c7a480328c5c5 +6469266: Integrate Apache XMLSec 1.4.2 into JDK 7 +Reviewed-by: valeriep + +diff --git a/src/share/classes/com/sun/org/apache/xml/internal/security/Init.java b/src/share/classes/com/sun/org/apache/xml/internal/security/Init.java +--- jdk/src/share/classes/com/sun/org/apache/xml/internal/security/Init.java ++++ jdk/src/share/classes/com/sun/org/apache/xml/internal/security/Init.java +@@ -20,12 +20,9 @@ + */ + package com.sun.org.apache.xml.internal.security; + +- +- + import java.io.InputStream; + import java.security.AccessController; + import java.security.PrivilegedAction; +- + import javax.xml.parsers.DocumentBuilder; + import javax.xml.parsers.DocumentBuilderFactory; + +@@ -51,7 +48,7 @@ + * done by calling {@link Init#init} which should be done in any static block + * of the files of this library. We ensure that this call is only executed once. + * +- * @author $Author: raul $ ++ * @author $Author: mullan $ + */ + public final class Init { + +@@ -113,20 +110,19 @@ + dbf.setValidating(false); + + DocumentBuilder db = dbf.newDocumentBuilder(); +- + // We don't allow users to override the Apache XML Security + // configuration in the JRE. Users should use the standard security + // provider mechanism instead if implementing their own + // transform or canonicalization algorithms. +- // String cfile = System.getProperty("com.sun.org.apache.xml.internal.security.resource.config"); +- // InputStream is = +- // Class.forName("com.sun.org.apache.xml.internal.security.Init") +- // .getResourceAsStream(cfile != null ? cfile : "resource/config.xml"); ++ // InputStream is = Class.forName("com.sun.org.apache.xml.internal.security.Init").getResourceAsStream("resource/config.xml"); + InputStream is = (InputStream) AccessController.doPrivileged( + new PrivilegedAction() { + public Object run() { ++// String cfile = System.getProperty ++// ("com.sun.org.apache.xml.internal.security.resource.config"); + return getClass().getResourceAsStream +- ("resource/config.xml"); ++// (cfile != null ? cfile : "resource/config.xml"); ++ ("resource/config.xml"); + } + }); + +@@ -167,7 +163,7 @@ + // + // if (tag.equals("ResourceBundles")){ + // XX_configure_i18n_start = System.currentTimeMillis(); +-// Element resource=(Element)el; ++// Element resource=(Element)el; + // /* configure internationalization */ + // Attr langAttr = resource.getAttributeNode("defaultLanguageCode"); + // Attr countryAttr = resource.getAttributeNode("defaultCountryCode"); +@@ -202,11 +198,11 @@ + + if (currMeth.getDeclaringClass().getName() + .equals(JAVACLASS)) { +- log.log(java.util.logging.Level.FINE, currMeth.getDeclaringClass().toString()); ++ log.log(java.util.logging.Level.FINE, currMeth.getDe claringClass().toString()); + } + }*/ +- if (true) +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, "Canonicalizer.register(" + URI + ", " ++ if (log.isLoggable(java.util.logging.Level.FINE)) ++ log.log(java.util.logging.Level.FINE, "Canonicalizer.register(" + URI + ", " + + JAVACLASS + ")"); + Canonicalizer.register(URI, JAVACLASS); + } catch (ClassNotFoundException e) { +@@ -233,9 +229,8 @@ + "JAVACLASS"); + try { + Class.forName(JAVACLASS); +- if (true) +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, "Transform.register(" + URI + ", " + JAVACLASS +- + ")"); ++ if (log.isLoggable(java.util.logging.Level.FINE)) ++ log.log(java.util.logging.Level.FINE, "Transform.register(" + URI + ", " + JAVACLASS + ")"); + Transform.register(URI, JAVACLASS); + } catch (ClassNotFoundException e) { + Object exArgs[] = { URI, JAVACLASS }; +@@ -284,12 +279,11 @@ + // + // if (currMeth.getDeclaringClass().getName() + // .equals(JAVACLASS)) { +-// log.log(java.util.logging.Level.FINE, currMeth.getDeclaringClass().toString()); ++// log.log(java.util.logging.Level.FINE, currMeth.getDe claringClass().toString()); + // } + // } +- if (true) +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, "SignatureAlgorithm.register(" + URI + ", " +- + JAVACLASS + ")"); ++ if (log.isLoggable(java.util.logging.Level.FINE)) ++ log.log(java.util.logging.Level.FINE, "SignatureAlgorithm.register(" + URI + ", " + JAVACLASS + ")"); + SignatureAlgorithm.register(URI, JAVACLASS); + } catch (ClassNotFoundException e) { + Object exArgs[] = { URI, JAVACLASS }; +@@ -320,13 +314,11 @@ + "DESCRIPTION"); + + if ((Description != null) && (Description.length() > 0)) { +- if (true) +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, "Register Resolver: " + JAVACLASS + ": " +- + Description); ++ if (log.isLoggable(java.util.logging.Level.FINE)) ++ log.log(java.util.logging.Level.FINE, "Register Resolver: " + JAVACLASS + ": " + Description); + } else { +- if (true) +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, "Register Resolver: " + JAVACLASS +- + ": For unknown purposes"); ++ if (log.isLoggable(java.util.logging.Level.FINE)) ++ log.log(java.util.logging.Level.FINE, "Register Resolver: " + JAVACLASS + ": For unknown purposes"); + } + try { + ResourceResolver.register(JAVACLASS); +@@ -359,13 +351,11 @@ + "DESCRIPTION"); + + if ((Description != null) && (Description.length() > 0)) { +- if (true) +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, "Register Resolver: " + JAVACLASS + ": " +- + Description); ++ if (log.isLoggable(java.util.logging.Level.FINE)) ++ log.log(java.util.logging.Level.FINE, "Register Resolver: " + JAVACLASS + ": " + Description); + } else { +- if (true) +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, "Register Resolver: " + JAVACLASS +- + ": For unknown purposes"); ++ if (log.isLoggable(java.util.logging.Level.FINE)) ++ log.log(java.util.logging.Level.FINE, "Register Resolver: " + JAVACLASS + ": For unknown purposes"); + } + + KeyResolver.register(JAVACLASS); +@@ -376,8 +366,8 @@ + + if (tag.equals("PrefixMappings")){ + XX_configure_reg_prefixes_start = System.currentTimeMillis(); +- if (true) +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, "Now I try to bind prefixes:"); ++ if (log.isLoggable(java.util.logging.Level.FINE)) ++ log.log(java.util.logging.Level.FINE, "Now I try to bind prefixes:"); + + Element[] nl = XMLUtils.selectNodes(el.getFirstChild(), CONF_NS,"PrefixMapping"); + +@@ -386,8 +376,8 @@ + "namespace"); + String prefix = nl[i].getAttributeNS(null, + "prefix"); +- if (true) +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, "Now I try to bind " + prefix + " to " + namespace); ++ if (log.isLoggable(java.util.logging.Level.FINE)) ++ log.log(java.util.logging.Level.FINE, "Now I try to bind " + prefix + " to " + namespace); + com.sun.org.apache.xml.internal.security.utils.ElementProxy + .setDefaultPrefix(namespace, prefix); + } +@@ -398,19 +388,19 @@ + long XX_init_end = System.currentTimeMillis(); + + //J- +- if (true) { +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, "XX_init " + ((int)(XX_init_end - XX_init_start)) + " ms"); +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, " XX_prng " + ((int)(XX_prng_end - XX_prng_start)) + " ms"); +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, " XX_parsing " + ((int)(XX_parsing_end - XX_parsing_start)) + " ms"); +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, " XX_configure_i18n " + ((int)(XX_configure_i18n_end- XX_configure_i18n_start)) + " ms"); +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, " XX_configure_reg_c14n " + ((int)(XX_configure_reg_c14n_end- XX_configure_reg_c14n_start)) + " ms"); +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, " XX_configure_reg_jcemapper " + ((int)(XX_configure_reg_jcemapper_end- XX_configure_reg_jcemapper_start)) + " ms"); +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, " XX_configure_reg_keyInfo " + ((int)(XX_configure_reg_keyInfo_end- XX_configure_reg_keyInfo_start)) + " ms"); +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, " XX_configure_reg_keyResolver " + ((int)(XX_configure_reg_keyResolver_end- XX_configure_reg_keyResolver_start)) + " ms"); +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, " XX_configure_reg_prefixes " + ((int)(XX_configure_reg_prefixes_end- XX_configure_reg_prefixes_start)) + " ms"); +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, " XX_configure_reg_resourceresolver " + ((int)(XX_configure_reg_resourceresolver_end- XX_configure_reg_resourceresolver_start)) + " ms"); +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, " XX_configure_reg_sigalgos " + ((int)(XX_configure_reg_sigalgos_end- XX_configure_reg_sigalgos_start)) + " ms"); +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, " XX_configure_reg_transforms " + ((int)(XX_configure_reg_transforms_end- XX_configure_reg_transforms_start)) + " ms"); ++ if (log.isLoggable(java.util.logging.Level.FINE)) { ++ log.log(java.util.logging.Level.FINE, "XX_init " + ((int)(XX_init_end - XX_init_start)) + " ms"); ++ log.log(java.util.logging.Level.FINE, " XX_prng " + ((int)(XX_prng_end - XX_prng_start)) + " ms"); ++ log.log(java.util.logging.Level.FINE, " XX_parsing " + ((int)(XX_parsing_end - XX_parsing_start)) + " ms"); ++ log.log(java.util.logging.Level.FINE, " XX_configure_i18n " + ((int)(XX_configure_i18n_end- XX_configure_i18n_start)) + " ms"); ++ log.log(java.util.logging.Level.FINE, " XX_configure_reg_c14n " + ((int)(XX_configure_reg_c14n_end- XX_configure_reg_c14n_start)) + " ms"); ++ log.log(java.util.logging.Level.FINE, " XX_configure_reg_jcemapper " + ((int)(XX_configure_reg_jcemapper_end- XX_configure_reg_jcemapper_start)) + " ms"); ++ log.log(java.util.logging.Level.FINE, " XX_configure_reg_keyInfo " + ((int)(XX_configure_reg_keyInfo_end- XX_configure_reg_keyInfo_start)) + " ms"); ++ log.log(java.util.logging.Level.FINE, " XX_configure_reg_keyResolver " + ((int)(XX_configure_reg_keyResolver_end- XX_configure_reg_keyResolver_start)) + " ms"); ++ log.log(java.util.logging.Level.FINE, " XX_configure_reg_prefixes " + ((int)(XX_configure_reg_prefixes_end- XX_configure_reg_prefixes_start)) + " ms"); ++ log.log(java.util.logging.Level.FINE, " XX_configure_reg_resourceresolver " + ((int)(XX_configure_reg_resourceresolver_end- XX_configure_reg_resourceresolver_start)) + " ms"); ++ log.log(java.util.logging.Level.FINE, " XX_configure_reg_sigalgos " + ((int)(XX_configure_reg_sigalgos_end- XX_configure_reg_sigalgos_start)) + " ms"); ++ log.log(java.util.logging.Level.FINE, " XX_configure_reg_transforms " + ((int)(XX_configure_reg_transforms_end- XX_configure_reg_transforms_start)) + " ms"); + } + } catch (Exception e) { + log.log(java.util.logging.Level.SEVERE, "Bad: ", e); +diff --git a/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/Algorithm.java b/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/Algorithm.java +--- jdk/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/Algorithm.java ++++ jdk/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/Algorithm.java +@@ -24,7 +24,7 @@ + + import com.sun.org.apache.xml.internal.security.exceptions.XMLSecurityException; + import com.sun.org.apache.xml.internal.security.utils.Constants; +-import com.sun.org.apache.xml.internal.security.utils.ElementProxy; ++import com.sun.org.apache.xml.internal.security.utils.SignatureElementProxy; + import org.w3c.dom.Document; + import org.w3c.dom.Element; + +@@ -33,11 +33,7 @@ + * The Algorithm class which stores the Algorithm URI as a string. + * + */ +-public abstract class Algorithm extends ElementProxy { +- +- /** {@link java.util.logging} logging facility */ +- static java.util.logging.Logger log = +- java.util.logging.Logger.getLogger(Algorithm.class.getName()); ++public abstract class Algorithm extends SignatureElementProxy { + + /** + * +@@ -79,7 +75,7 @@ + */ + protected void setAlgorithmURI(String algorithmURI) { + +- if ((this._state == MODE_CREATE) && (algorithmURI != null)) { ++ if ( (algorithmURI != null)) { + this._constructionElement.setAttributeNS(null, Constants._ATT_ALGORITHM, + algorithmURI); + } +diff --git a/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/JCEMapper.java b/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/JCEMapper.java +--- jdk/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/JCEMapper.java ++++ jdk/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/JCEMapper.java +@@ -35,7 +35,7 @@ + /** + * This class maps algorithm identifier URIs to JAVA JCE class names. + * +- * @author $Author: raul $ ++ * @author $Author: mullan $ + */ + public class JCEMapper { + +@@ -45,9 +45,9 @@ + + + +- private static Map uriToJCEName = new HashMap(); ++ private static Map uriToJCEName; + +- private static Map algorithmsMap = new HashMap(); ++ private static Map algorithmsMap; + + private static String providerName = null; + /** +@@ -63,6 +63,8 @@ + + static void loadAlgorithms( Element algorithmsEl) { + Element[] algorithms = XMLUtils.selectNodes(algorithmsEl.getFirstChild(),Init.CONF_NS,"Algorithm"); ++ uriToJCEName = new HashMap( algorithms.length * 2); ++ algorithmsMap = new HashMap( algorithms.length * 2); + for (int i = 0 ;i < algorithms.length ;i ++) { + Element el = algorithms[i]; + String id = el.getAttribute("URI"); +@@ -70,6 +72,7 @@ + uriToJCEName.put(id, jceName); + algorithmsMap.put(id, new Algorithm(el)); + } ++ + } + + static Algorithm getAlgorithmMapping(String algoURI) { +@@ -84,8 +87,8 @@ + * + */ + public static String translateURItoJCEID(String AlgorithmURI) { +- if (true) +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, "Request for URI " + AlgorithmURI); ++ if (log.isLoggable(java.util.logging.Level.FINE)) ++ log.log(java.util.logging.Level.FINE, "Request for URI " + AlgorithmURI); + + String jceName = (String) uriToJCEName.get(AlgorithmURI); + return jceName; +@@ -100,8 +103,8 @@ + * + */ + public static String getAlgorithmClassFromURI(String AlgorithmURI) { +- if (true) +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, "Request for URI " + AlgorithmURI); ++ if (log.isLoggable(java.util.logging.Level.FINE)) ++ log.log(java.util.logging.Level.FINE, "Request for URI " + AlgorithmURI); + + return ((Algorithm) algorithmsMap.get(AlgorithmURI)).algorithmClass; + } +diff --git a/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/MessageDigestAlgorithm.java b/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/MessageDigestAlgorithm.java +--- jdk/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/MessageDigestAlgorithm.java ++++ jdk/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/MessageDigestAlgorithm.java +@@ -20,10 +20,10 @@ + */ + package com.sun.org.apache.xml.internal.security.algorithms; + +- +- + import java.security.MessageDigest; + import java.security.NoSuchProviderException; ++import java.util.HashMap; ++import java.util.Map; + + import com.sun.org.apache.xml.internal.security.signature.XMLSignatureException; + import com.sun.org.apache.xml.internal.security.utils.Constants; +@@ -41,11 +41,6 @@ + */ + public class MessageDigestAlgorithm extends Algorithm { + +- /** {@link java.util.logging} logging facility */ +- static java.util.logging.Logger log = +- java.util.logging.Logger.getLogger( +- MessageDigestAlgorithm.class.getName()); +- + /** Message Digest - NOT RECOMMENDED MD5*/ + public static final String ALGO_ID_DIGEST_NOT_RECOMMENDED_MD5 = Constants.MoreAlgorithmsSpecNS + "md5"; + /** Digest - Required SHA1*/ +@@ -76,6 +71,12 @@ + this.algorithm = messageDigest; + } + ++ static ThreadLocal instances=new ThreadLocal() { ++ protected Object initialValue() { ++ return new HashMap(); ++ }; ++ }; ++ + /** + * Factory method for constructing a message digest algorithm by name. + * +@@ -86,8 +87,15 @@ + */ + public static MessageDigestAlgorithm getInstance( + Document doc, String algorithmURI) throws XMLSignatureException { ++ MessageDigest md = getDigestInstance(algorithmURI); ++ return new MessageDigestAlgorithm(doc, md, algorithmURI); ++ } + +- String algorithmID = JCEMapper.translateURItoJCEID(algorithmURI); ++private static MessageDigest getDigestInstance(String algorithmURI) throws XMLSignatureException { ++ MessageDigest result=(MessageDigest) ((Map)instances.get()).get(algorithmURI); ++ if (result!=null) ++ return result; ++ String algorithmID = JCEMapper.translateURItoJCEID(algorithmURI); + + if (algorithmID == null) { + Object[] exArgs = { algorithmURI }; +@@ -113,8 +121,9 @@ + + throw new XMLSignatureException("algorithms.NoSuchAlgorithm", exArgs); + } +- return new MessageDigestAlgorithm(doc, md, algorithmURI); +- } ++ ((Map)instances.get()).put(algorithmURI, md); ++ return md; ++} + + /** + * Returns the actual {@link java.security.MessageDigest} algorithm object +diff --git a/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/SignatureAlgorithm.java b/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/SignatureAlgorithm.java +--- jdk/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/SignatureAlgorithm.java ++++ jdk/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/SignatureAlgorithm.java +@@ -25,6 +25,7 @@ + import java.security.SecureRandom; + import java.security.spec.AlgorithmParameterSpec; + import java.util.HashMap; ++import java.util.Map; + + import com.sun.org.apache.xml.internal.security.algorithms.implementations.IntegrityHmac; + import com.sun.org.apache.xml.internal.security.exceptions.AlgorithmAlreadyRegisteredException; +@@ -52,9 +53,35 @@ + /** All available algorithm classes are registered here */ + static HashMap _algorithmHash = null; + ++ static ThreadLocal instancesSigning=new ThreadLocal() { ++ protected Object initialValue() { ++ return new HashMap(); ++ }; ++ }; ++ ++ static ThreadLocal instancesVerify=new ThreadLocal() { ++ protected Object initialValue() { ++ return new HashMap(); ++ }; ++ }; ++ ++ static ThreadLocal keysSigning=new ThreadLocal() { ++ protected Object initialValue() { ++ return new HashMap(); ++ }; ++ }; ++ static ThreadLocal keysVerify=new ThreadLocal() { ++ protected Object initialValue() { ++ return new HashMap(); ++ }; ++ }; ++// boolean isForSigning=false; ++ + /** Field _signatureAlgorithm */ + protected SignatureAlgorithmSpi _signatureAlgorithm = null; + ++ private String algorithmURI; ++ + /** + * Constructor SignatureAlgorithm + * +@@ -64,18 +91,49 @@ + */ + public SignatureAlgorithm(Document doc, String algorithmURI) + throws XMLSecurityException { ++ super(doc, algorithmURI); ++ this.algorithmURI = algorithmURI; ++ } + +- super(doc, algorithmURI); + +- try { ++ private void initializeAlgorithm(boolean isForSigning) throws XMLSignatureException { ++ if (_signatureAlgorithm!=null) { ++ return; ++ } ++ _signatureAlgorithm=isForSigning ? getInstanceForSigning(algorithmURI) : getInstanceForVerify(algorithmURI); ++ this._signatureAlgorithm ++ .engineGetContextFromElement(this._constructionElement); ++ } ++ private static SignatureAlgorithmSpi getInstanceForSigning(String algorithmURI) throws XMLSignatureException { ++ SignatureAlgorithmSpi result=(SignatureAlgorithmSpi) ((Map)instancesSigning.get()).get(algorithmURI); ++ if (result!=null) { ++ result.reset(); ++ return result; ++ } ++ result=buildSigner(algorithmURI, result); ++ ((Map)instancesSigning.get()).put(algorithmURI,result); ++ return result; ++ } ++ private static SignatureAlgorithmSpi getInstanceForVerify(String algorithmURI) throws XMLSignatureException { ++ SignatureAlgorithmSpi result=(SignatureAlgorithmSpi) ((Map)instancesVerify.get()).get(algorithmURI); ++ if (result!=null) { ++ result.reset(); ++ return result; ++ } ++ result=buildSigner(algorithmURI, result); ++ ((Map)instancesVerify.get()).put(algorithmURI,result); ++ return result; ++ } ++ ++ private static SignatureAlgorithmSpi buildSigner(String algorithmURI, SignatureAlgorithmSpi result) throws XMLSignatureException { ++ try { + Class implementingClass = + SignatureAlgorithm.getImplementingClass(algorithmURI); +- if (true) +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, "Create URI \"" + algorithmURI + "\" class \"" ++ if (log.isLoggable(java.util.logging.Level.FINE)) ++ log.log(java.util.logging.Level.FINE, "Create URI \"" + algorithmURI + "\" class \"" + + implementingClass + "\""); +- +- this._signatureAlgorithm = +- (SignatureAlgorithmSpi) implementingClass.newInstance(); ++ result=(SignatureAlgorithmSpi) implementingClass.newInstance(); ++ return result; + } catch (IllegalAccessException ex) { + Object exArgs[] = { algorithmURI, ex.getMessage() }; + +@@ -92,7 +150,7 @@ + throw new XMLSignatureException("algorithms.NoSuchAlgorithm", exArgs, + ex); + } +- } ++} + + /** + * Constructor SignatureAlgorithm +@@ -107,7 +165,8 @@ + throws XMLSecurityException { + + this(doc, algorithmURI); +- ++ this.algorithmURI=algorithmURI; ++ initializeAlgorithm(true); + this._signatureAlgorithm.engineSetHMACOutputLength(HMACOutputLength); + ((IntegrityHmac)this._signatureAlgorithm) + .engineAddContextToElement(this._constructionElement); +@@ -124,37 +183,7 @@ + throws XMLSecurityException { + + super(element, BaseURI); +- +- String algorithmURI = this.getURI(); +- +- try { +- Class implementingClass = +- SignatureAlgorithm.getImplementingClass(algorithmURI); +- if (true) +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, "Create URI \"" + algorithmURI + "\" class \"" +- + implementingClass + "\""); +- +- this._signatureAlgorithm = +- (SignatureAlgorithmSpi) implementingClass.newInstance(); +- +- this._signatureAlgorithm +- .engineGetContextFromElement(this._constructionElement); +- } catch (IllegalAccessException ex) { +- Object exArgs[] = { algorithmURI, ex.getMessage() }; +- +- throw new XMLSignatureException("algorithms.NoSuchAlgorithm", exArgs, +- ex); +- } catch (InstantiationException ex) { +- Object exArgs[] = { algorithmURI, ex.getMessage() }; +- +- throw new XMLSignatureException("algorithms.NoSuchAlgorithm", exArgs, +- ex); +- } catch (NullPointerException ex) { +- Object exArgs[] = { algorithmURI, ex.getMessage() }; +- +- throw new XMLSignatureException("algorithms.NoSuchAlgorithm", exArgs, +- ex); +- } ++ algorithmURI = this.getURI(); + } + + /** +@@ -175,7 +204,12 @@ + * @return the result of the {@link java.security.Signature#getAlgorithm} method + */ + public String getJCEAlgorithmString() { +- return this._signatureAlgorithm.engineGetJCEAlgorithmString(); ++ try { ++ return getInstanceForVerify(algorithmURI).engineGetJCEAlgorithmString(); ++ } catch (XMLSignatureException e) { ++ //Ignore. ++ return null; ++ } + } + + /** +@@ -184,7 +218,11 @@ + * @return The Provider of this Signature Alogrithm + */ + public String getJCEProviderName() { +- return this._signatureAlgorithm.engineGetJCEProviderName(); ++ try { ++ return getInstanceForVerify(algorithmURI).engineGetJCEProviderName(); ++ } catch (XMLSignatureException e) { ++ return null; ++ } + } + + /** +@@ -231,7 +269,13 @@ + * @throws XMLSignatureException + */ + public void initSign(Key signingKey) throws XMLSignatureException { +- this._signatureAlgorithm.engineInitSign(signingKey); ++ initializeAlgorithm(true); ++ Map map=(Map)keysSigning.get(); ++ if (map.get(this.algorithmURI)==signingKey) { ++ return; ++ } ++ map.put(this.algorithmURI,signingKey); ++ this._signatureAlgorithm.engineInitSign(signingKey); + } + + /** +@@ -244,6 +288,7 @@ + */ + public void initSign(Key signingKey, SecureRandom secureRandom) + throws XMLSignatureException { ++ initializeAlgorithm(true); + this._signatureAlgorithm.engineInitSign(signingKey, secureRandom); + } + +@@ -258,6 +303,7 @@ + public void initSign( + Key signingKey, AlgorithmParameterSpec algorithmParameterSpec) + throws XMLSignatureException { ++ initializeAlgorithm(true); + this._signatureAlgorithm.engineInitSign(signingKey, + algorithmParameterSpec); + } +@@ -282,7 +328,13 @@ + * @throws XMLSignatureException + */ + public void initVerify(Key verificationKey) throws XMLSignatureException { +- this._signatureAlgorithm.engineInitVerify(verificationKey); ++ initializeAlgorithm(false); ++ Map map=(Map)keysVerify.get(); ++ if (map.get(this.algorithmURI)==verificationKey) { ++ return; ++ } ++ map.put(this.algorithmURI,verificationKey); ++ this._signatureAlgorithm.engineInitVerify(verificationKey); + } + + /** +@@ -320,7 +372,7 @@ + .getLogger(SignatureAlgorithm.class.getName()); + } + +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, "Init() called"); ++ log.log(java.util.logging.Level.FINE, "Init() called"); + + if (!SignatureAlgorithm._alreadyInitialized) { + SignatureAlgorithm._algorithmHash = new HashMap(10); +@@ -340,8 +392,8 @@ + throws AlgorithmAlreadyRegisteredException,XMLSignatureException { + + { +- if (true) +- if (log.isLoggable(java.util.logging.Level.FINE)) log.log(java.util.logging.Level.FINE, "Try to register " + algorithmURI + " " + implementingClass); ++ if (log.isLoggable(java.util.logging.Level.FINE)) ++ log.log(java.util.logging.Level.FINE, "Try to register " + algorithmURI + " " + implementingClass); + + // are we already registered? + Class registeredClassClass = +diff --git a/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/SignatureAlgorithmSpi.java b/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/SignatureAlgorithmSpi.java +--- jdk/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/SignatureAlgorithmSpi.java ++++ jdk/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/SignatureAlgorithmSpi.java +@@ -20,27 +20,20 @@ + */ + package com.sun.org.apache.xml.internal.security.algorithms; + +- +- + import java.security.Key; + import java.security.SecureRandom; + import java.security.spec.AlgorithmParameterSpec; + + import com.sun.org.apache.xml.internal.security.signature.XMLSignatureException; +-import org.w3c.dom.Document; + import org.w3c.dom.Element; + + + /** + * +- * @author $Author: raul $ ++ * @author $Author: mullan $ + */ + public abstract class SignatureAlgorithmSpi { + +- /** {@link java.util.logging} logging facility */ +- static java.util.logging.Logger log = +- java.util.logging.Logger.getLogger(SignatureAlgorithmSpi.class.getName()); +- + /** + * Returns the URI representation of Transformation algorithm + * +@@ -167,20 +160,6 @@ + protected abstract void engineSetParameter(AlgorithmParameterSpec params) + throws XMLSignatureException; + +- /** Field _doc */ +- Document _doc = null; +- +- /** +- * Method engineSetDocument +- * +- * @param doc +- */ +- protected void engineSetDocument(Document doc) { +- this._doc = doc; +- } +- +- /** Field _constructionElement */ +- Element _constructionElement = null; + + /** + * Method engineGetContextFromElement +@@ -188,7 +167,6 @@ + * @param element + */ + protected void engineGetContextFromElement(Element element) { +- this._constructionElement = element; + } + + /** +@@ -199,4 +177,7 @@ + */ + protected abstract void engineSetHMACOutputLength(int HMACOutputLength) + throws XMLSignatureException; ++ ++ public void reset() { ++ } + } +diff --git a/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/implementations/IntegrityHmac.java b/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/implementations/IntegrityHmac.java +--- jdk/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/implementations/IntegrityHmac.java ++++ jdk/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/implementations/IntegrityHmac.java +@@ -45,7 +45,7 @@ + + /** + * +- * @author $Author: raul $ ++ * @author $Author: mullan $ + */ + public abstract class IntegrityHmac extends SignatureAlgorithmSpi { + *** DIFF OUTPUT TRUNCATED AT 1000 LINES *** _______________________________________________ svn-ports-all@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/svn-ports-all To unsubscribe, send any mail to "svn-ports-all-unsubscribe@freebsd.org" From owner-freebsd-java@FreeBSD.ORG Tue Jul 16 21:28:42 2013 Return-Path: Delivered-To: freebsd-java@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) by hub.freebsd.org (Postfix) with ESMTP id 3A5CEC0F; Tue, 16 Jul 2013 21:28:42 +0000 (UTC) (envelope-from jkim@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id 138C527A; Tue, 16 Jul 2013 21:28:42 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id r6GLSf0V042796; Tue, 16 Jul 2013 21:28:41 GMT (envelope-from jkim@freefall.freebsd.org) Received: (from jkim@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id r6GLSfhL042795; Tue, 16 Jul 2013 21:28:41 GMT (envelope-from jkim) Date: Tue, 16 Jul 2013 21:28:41 GMT Message-Id: <201307162128.r6GLSfhL042795@freefall.freebsd.org> To: matthias@petermann-it.de, jkim@FreeBSD.org, freebsd-java@FreeBSD.org From: jkim@FreeBSD.org Subject: Re: ports/180541: [PATCH] java/openjdk6 (add IcedTea6 patch S8005615 to fix Java Logger fails to load tomcat logger implementation (JULI)) X-BeenThere: freebsd-java@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Porting Java to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 16 Jul 2013 21:28:42 -0000 Synopsis: [PATCH] java/openjdk6 (add IcedTea6 patch S8005615 to fix Java Logger fails to load tomcat logger implementation (JULI)) State-Changed-From-To: open->closed State-Changed-By: jkim State-Changed-When: Tue Jul 16 21:28:20 UTC 2013 State-Changed-Why: Committed, thanks! http://www.freebsd.org/cgi/query-pr.cgi?pr=180541 From owner-freebsd-java@FreeBSD.ORG Tue Jul 16 21:40:02 2013 Return-Path: Delivered-To: freebsd-java@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id 6F4A1FA4 for ; Tue, 16 Jul 2013 21:40:02 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id 620FB305 for ; Tue, 16 Jul 2013 21:40:02 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id r6GLe2MG044688 for ; Tue, 16 Jul 2013 21:40:02 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id r6GLe2Z6044687; Tue, 16 Jul 2013 21:40:02 GMT (envelope-from gnats) Date: Tue, 16 Jul 2013 21:40:02 GMT Message-Id: <201307162140.r6GLe2Z6044687@freefall.freebsd.org> To: freebsd-java@FreeBSD.org Cc: From: Jung-uk Kim Subject: Re: ports/177067: java/openjdk6 b27_2 bug X-BeenThere: freebsd-java@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list Reply-To: Jung-uk Kim List-Id: Porting Java to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 16 Jul 2013 21:40:02 -0000 The following reply was made to PR ports/177067; it has been noted by GNATS. From: Jung-uk Kim To: bug-followup@FreeBSD.org, nr1c0re@gmail.com Cc: Subject: Re: ports/177067: java/openjdk6 b27_2 bug Date: Tue, 16 Jul 2013 17:32:32 -0400 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 It should be fixed now. Please try openjdk6-b27_4. Thanks! Jung-uk Kim -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.20 (FreeBSD) iQEcBAEBAgAGBQJR5bvwAAoJECXpabHZMqHO9WMH/jy1n6FnHZ83XhN9UgA7xfiD 39JVfPIuVfE1frB+EdaPpiReB4h45Nvsv2vwr5ujdLY57Ej37utNJw7JMK/n2hXe OkX+GC0RcOR0J7YS1yYGobkDABGZ6iFQEuHsvQMHIzrFz/AA1rocyEyBpMUfqGz0 nf13r8tmYSdBfWow3iO++nWjM0V3ljDhhxznagFaO9hbE5Z7fG9e1PNOwznojzYM Pvt6v9Q4FNqLonk5MlXC297rcWuzz/MdO84hzKVL/2DmsC11VxNUfxSf9CxKfGKB sw/JiakjbhVBglxy3eUKn0TS5KumHkFWCcFw1+C/Cz/o3Pvav/OlEM4DhxR6jwU= =ZD8M -----END PGP SIGNATURE----- From owner-freebsd-java@FreeBSD.ORG Tue Jul 16 23:42:56 2013 Return-Path: Delivered-To: freebsd-java@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id D02A1A6C; Tue, 16 Jul 2013 23:42:56 +0000 (UTC) (envelope-from jkim@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id AAC658E9; Tue, 16 Jul 2013 23:42:56 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id r6GNguai069862; Tue, 16 Jul 2013 23:42:56 GMT (envelope-from jkim@freefall.freebsd.org) Received: (from jkim@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id r6GNgtvp069861; Tue, 16 Jul 2013 23:42:55 GMT (envelope-from jkim) Date: Tue, 16 Jul 2013 23:42:55 GMT Message-Id: <201307162342.r6GNgtvp069861@freefall.freebsd.org> To: dmk@ncf.ca, jkim@FreeBSD.org, freebsd-java@FreeBSD.org From: jkim@FreeBSD.org Subject: Re: ports/180526: java/icedtea-web java plugin doesn't work with openjdk7.25 X-BeenThere: freebsd-java@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Porting Java to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 16 Jul 2013 23:42:56 -0000 Synopsis: java/icedtea-web java plugin doesn't work with openjdk7.25 State-Changed-From-To: open->closed State-Changed-By: jkim State-Changed-When: Tue Jul 16 23:42:37 UTC 2013 State-Changed-Why: Committed, thanks! http://www.freebsd.org/cgi/query-pr.cgi?pr=180526 From owner-freebsd-java@FreeBSD.ORG Tue Jul 16 23:48:27 2013 Return-Path: Delivered-To: freebsd-java@freebsd.org Received: from hammer.pct.niksun.com (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by hub.freebsd.org (Postfix) with ESMTP id 55D51CB5 for ; Tue, 16 Jul 2013 23:48:27 +0000 (UTC) (envelope-from jkim@FreeBSD.org) Message-ID: <51E5DB8B.1020704@FreeBSD.org> Date: Tue, 16 Jul 2013 19:47:23 -0400 From: Jung-uk Kim User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:17.0) Gecko/20130715 Thunderbird/17.0.7 MIME-Version: 1.0 To: freebsd-java@freebsd.org Subject: Re: icedtea-web not working in Firefox 22.0 9.1-RELEASE amd64 References: <1813573.4tr9PY2aYG@hudson.internal.iinfraxu.ca> <51CE0B55.2010607@FreeBSD.org> In-Reply-To: <51CE0B55.2010607@FreeBSD.org> X-Enigmail-Version: 1.5.1 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-java@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Porting Java to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 16 Jul 2013 23:48:27 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 2013-06-28 18:16:53 -0400, Jung-uk Kim wrote: > On 2013-06-28 14:03:53 -0400, Dwayne MacKinnon wrote: >> Hi all, > >> Applets won't seem to work with icedtea-web & Firefox 22.0 on >> FreeBSD 9.1- RELEASE amd64. It appears to be working just fine >> on 9.1-RELEASE i386. > >> Here's the output I get if I run firefox in a konsole: > ... > > It is a known problem: > > http://blog.fuseyism.com/index.php/2013/06/19/imminent-icedtea-web-breakage/ > > If you are impatient for some reason, you may try this fix in the > mean time: > > http://icedtea.classpath.org/hg/icedtea-web/raw-rev/2469bedc6d63 I expected a new release with the fix but it didn't happen. Therefore, I had no choice but to commit it. Please try icedtea-web-1.4_1. Sorry for the delay, Jung-uk Kim -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.20 (FreeBSD) iQEcBAEBAgAGBQJR5duLAAoJECXpabHZMqHOdBAH/RvYSvlTZJkIz3eQ0lqT4x5A KlZWSwX99d9pxGH6ZKEXTCw5hrslUrlFOIAZd9RFhv5qE+E/2bILawlznxSqh4+/ +F+B7MvcWBTvVZB8qazWCFdSQnua9B0NSduQcjhvYDBf31if7RGtsFllOicNcJ0S qVM+Gl125ntsSpSTpfeckgxKWNnxX8iqoE69oDKOQD/0dQnw5j8rxVVmMLXoZJGW D6DPysqsP8jleKH6q6S5dWVKXCx2GBRh316Wgp1fk6I9G8/mVRtY/JULWUU8zJ2I vYNkPPuKYq+N+AlN1yum+3s1tTnBoCBeR4Yt84k+CapzzDRZoDeD9LLaV9xKGC0= =91UN -----END PGP SIGNATURE----- From owner-freebsd-java@FreeBSD.ORG Wed Jul 17 07:00:02 2013 Return-Path: Delivered-To: freebsd-java@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id 98DBBF6B for ; Wed, 17 Jul 2013 07:00:02 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id 722F4966 for ; Wed, 17 Jul 2013 07:00:02 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id r6H701dO068255 for ; Wed, 17 Jul 2013 07:00:01 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id r6H701bb068254; Wed, 17 Jul 2013 07:00:01 GMT (envelope-from gnats) Date: Wed, 17 Jul 2013 07:00:01 GMT Message-Id: <201307170700.r6H701bb068254@freefall.freebsd.org> To: freebsd-java@FreeBSD.org Cc: From: Matthias Petermann Subject: Re: ports/177067: java/openjdk6 b27_2 bug X-BeenThere: freebsd-java@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list Reply-To: Matthias Petermann List-Id: Porting Java to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 17 Jul 2013 07:00:02 -0000 The following reply was made to PR ports/177067; it has been noted by GNATS. From: Matthias Petermann To: bug-followup@freebsd.org, nr1c0re@gmail.com Cc: Subject: Re: ports/177067: java/openjdk6 b27_2 bug Date: Wed, 17 Jul 2013 08:50:05 +0200 Confirmed - the problem is solved with openjdk6-b27_4. Thanks for the quick response & kind regards, Matthias -- Matthias Petermann Ihr Partner für anspruchsvolle IT-Lösungen www.petermann-it.de - lösungsorientiert, innovativ und erfolgreich From owner-freebsd-java@FreeBSD.ORG Thu Jul 18 02:05:50 2013 Return-Path: Delivered-To: freebsd-java@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id 18465B9B; Thu, 18 Jul 2013 02:05:50 +0000 (UTC) (envelope-from linimon@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id E7185BD1; Thu, 18 Jul 2013 02:05:49 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id r6I25ngv018138; Thu, 18 Jul 2013 02:05:49 GMT (envelope-from linimon@freefall.freebsd.org) Received: (from linimon@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id r6I25nCQ018137; Thu, 18 Jul 2013 02:05:49 GMT (envelope-from linimon) Date: Thu, 18 Jul 2013 02:05:49 GMT Message-Id: <201307180205.r6I25nCQ018137@freefall.freebsd.org> To: nr1c0re@gmail.com, linimon@FreeBSD.org, freebsd-java@FreeBSD.org From: linimon@FreeBSD.org Subject: Re: ports/177067: java/openjdk6 b27_2 bug X-BeenThere: freebsd-java@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Porting Java to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 18 Jul 2013 02:05:50 -0000 Synopsis: java/openjdk6 b27_2 bug State-Changed-From-To: open->closed State-Changed-By: linimon State-Changed-When: Thu Jul 18 02:05:33 UTC 2013 State-Changed-Why: fixed by latest update. http://www.freebsd.org/cgi/query-pr.cgi?pr=177067 From owner-freebsd-java@FreeBSD.ORG Thu Jul 18 22:04:33 2013 Return-Path: Delivered-To: freebsd-java@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id 04760324 for ; Thu, 18 Jul 2013 22:04:33 +0000 (UTC) (envelope-from jonc@chen.org.nz) Received: from mail-qa0-f44.google.com (mail-qa0-f44.google.com [209.85.216.44]) by mx1.freebsd.org (Postfix) with ESMTP id C10ADBB2 for ; Thu, 18 Jul 2013 22:04:32 +0000 (UTC) Received: by mail-qa0-f44.google.com with SMTP id o13so3877422qaj.10 for ; Thu, 18 Jul 2013 15:04:26 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-originating-ip:date:message-id:subject:from:to:cc :content-type:x-gm-message-state; bh=PsOhrazqWFpGUmgZivxFbS6M9SFRdeGqEYxwEYfe+IE=; b=RwILTjHEwyHzYOMgBYvbsQoOn4Jn+9KD8xHPi7IFiQDnn1oiNtsNPj7ekXwflUGvAj 7roMFxEfo0+7kdPZVnLtmcUuGtdZ6bUOZwPGjaSVjQ4re4ADFb5fPGP4lFX9QoVCvs4D sS7JdSzeAIpKbYHNfynLPAbSFcQ5WkLBFVsipz7rMnUPYU6N0VzAmaoKZaeelor7ZeWc fgkk43yKXqNXxRrHJg3+1lFvUDyai/dIatllh7fNyq3C53Jxe38s1yB5760Dax4njuZ9 kxJ6jR+GsQ8WRH+OYKK+GkWnQUfS+Pq+u37wfNOHlVdlj4gknDyOBdD/2E14D6why6dg BCOw== MIME-Version: 1.0 X-Received: by 10.224.63.7 with SMTP id z7mr16037470qah.51.1374185065991; Thu, 18 Jul 2013 15:04:25 -0700 (PDT) Received: by 10.49.12.35 with HTTP; Thu, 18 Jul 2013 15:04:25 -0700 (PDT) X-Originating-IP: [203.99.129.1] Date: Fri, 19 Jul 2013 10:04:25 +1200 Message-ID: Subject: java/166844: openjdk7 can't open library when remote debug enabled From: Jonathan Chen To: glewis@freebsd.org Content-Type: text/plain; charset=ISO-8859-1 X-Gm-Message-State: ALoCoQmC7fX4oMAoTjMUCYergKi1ADEWr/ZIKvL/fsevNzsF7MZOLAqTNhQkeNmiWAGu2ZR+MHZa Cc: freebsd-java@freebsd.org X-BeenThere: freebsd-java@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Porting Java to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 18 Jul 2013 22:04:33 -0000 Hi Greg, I noticed that you've picked up this PR (yay!). Would it be too much to hope that you've managed to find the cause for it and a possible fix? Or is the javavmwrapper work-around the only recourse for now? Cheers -- Jonathan Chen From owner-freebsd-java@FreeBSD.ORG Thu Jul 18 23:00:10 2013 Return-Path: Delivered-To: freebsd-java@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id C501450B; Thu, 18 Jul 2013 23:00:10 +0000 (UTC) (envelope-from edwin@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id A07F7E10; Thu, 18 Jul 2013 23:00:10 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id r6IN0AwL082005; Thu, 18 Jul 2013 23:00:10 GMT (envelope-from edwin@freefall.freebsd.org) Received: (from edwin@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id r6IN0AvI082004; Thu, 18 Jul 2013 23:00:10 GMT (envelope-from edwin) Date: Thu, 18 Jul 2013 23:00:10 GMT Message-Id: <201307182300.r6IN0AvI082004@freefall.freebsd.org> To: edwin@FreeBSD.org, freebsd-ports-bugs@FreeBSD.org, freebsd-java@FreeBSD.org From: edwin@FreeBSD.org Subject: Re: ports/180643: java/openjdk6 build fails on amd64 -current X-BeenThere: freebsd-java@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Porting Java to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 18 Jul 2013 23:00:10 -0000 Synopsis: java/openjdk6 build fails on amd64 -current Responsible-Changed-From-To: freebsd-ports-bugs->freebsd-java Responsible-Changed-By: edwin Responsible-Changed-When: Thu Jul 18 23:00:10 UTC 2013 Responsible-Changed-Why: Over to maintainer (via the GNATS Auto Assign Tool) http://www.freebsd.org/cgi/query-pr.cgi?pr=180643 From owner-freebsd-java@FreeBSD.ORG Fri Jul 19 09:28:12 2013 Return-Path: Delivered-To: java@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id D213D3F4 for ; Fri, 19 Jul 2013 09:28:12 +0000 (UTC) (envelope-from ml@netfence.it) Received: from smtp.eutelia.it (mp1-smtp-6.eutelia.it [62.94.10.166]) by mx1.freebsd.org (Postfix) with ESMTP id 8C75FC19 for ; Fri, 19 Jul 2013 09:28:11 +0000 (UTC) Received: from ns2.biolchim.it (ip-188-188.sn2.eutelia.it [83.211.188.188]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.eutelia.it (Eutelia) with ESMTP id BF48B662247 for ; Fri, 19 Jul 2013 11:28:09 +0200 (CEST) Received: from soth.ventu (adsl-ull-104-180.41-151.net24.it [151.41.180.104]) (authenticated bits=0) by ns2.biolchim.it (8.14.7/8.14.7) with ESMTP id r6J9S41D008331 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Fri, 19 Jul 2013 11:28:06 +0200 (CEST) (envelope-from ml@netfence.it) X-Authentication-Warning: ns2.biolchim.it: Host adsl-ull-104-180.41-151.net24.it [151.41.180.104] claimed to be soth.ventu Received: from alamar.ventu (alamar.ventu [10.1.2.18]) by soth.ventu (8.14.7/8.14.5) with ESMTP id r6J9RuhW064780 for ; Fri, 19 Jul 2013 11:27:56 +0200 (CEST) (envelope-from ml@netfence.it) Message-ID: <51E9069C.5090506@netfence.it> Date: Fri, 19 Jul 2013 11:27:56 +0200 From: Andrea Venturoli User-Agent: Mozilla/5.0 (X11; FreeBSD i386; rv:17.0) Gecko/20130626 Thunderbird/17.0.7 MIME-Version: 1.0 To: java@freebsd.org Subject: Cannot upgrade openjdk6 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.73 X-Scanned-By: MIMEDefang 2.73 on 10.1.2.13 X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.4.3 (ns2.biolchim.it [192.168.2.203]); Fri, 19 Jul 2013 11:28:06 +0200 (CEST) X-BeenThere: freebsd-java@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Porting Java to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 19 Jul 2013 09:28:12 -0000 Hello. On a 9.1/i386 box I cannot update openjdk6. Compilation fails with: > cpio: Can't update time for /usr/local/local/storage/alamartmp/usr/ports/java/openjdk6/work/build/bsd-i586/j2sdk-image/jre I searched for this error, but found nothing. Any hint? bye & Thanks av. From owner-freebsd-java@FreeBSD.ORG Sat Jul 20 21:53:53 2013 Return-Path: Delivered-To: java@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) by hub.freebsd.org (Postfix) with ESMTP id 8F1284AC for ; Sat, 20 Jul 2013 21:53:53 +0000 (UTC) (envelope-from yuri@rawbw.com) Received: from shell0.rawbw.com (shell0.rawbw.com [198.144.192.45]) by mx1.freebsd.org (Postfix) with ESMTP id 7D1F06D7 for ; Sat, 20 Jul 2013 21:53:53 +0000 (UTC) Received: from eagle.yuri.org (stunnel@localhost [127.0.0.1]) (authenticated bits=0) by shell0.rawbw.com (8.14.4/8.14.4) with ESMTP id r6KLrliX029372 for ; Sat, 20 Jul 2013 14:53:47 -0700 (PDT) (envelope-from yuri@rawbw.com) Message-ID: <51EB06EB.3060303@rawbw.com> Date: Sat, 20 Jul 2013 14:53:47 -0700 From: Yuri User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:17.0) Gecko/20130628 Thunderbird/17.0.7 MIME-Version: 1.0 To: java@freebsd.org Subject: Build of openoffice-3 causes openjdk6-b27-4 build (instead of openjdk7), and fails there Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-java@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Porting Java to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 20 Jul 2013 21:53:53 -0000 When I try to build openoffice-3 it proceeds to openjdk6 dependency and fails: ---log--- gmake[3]: Entering directory `/usr/ports/java/openjdk6/work/hotspot/make' Makefile:375: target `/Xusage.txt' given more than once in the same rule. mkdir -p /usr/ports/java/openjdk6/work/build/bsd-amd64/hotspot/outputdir cd /usr/ports/java/openjdk6/work/build/bsd-amd64/hotspot/outputdir; \ gmake -f /usr/ports/java/openjdk6/work/hotspot/make/bsd/Makefile \ LP64=1 JAVA_HOME=/usr/local/bootstrap-openjdk OUTPUTDIR=/usr/ports/java/openjdk6/work/build/bsd-amd64/hotspot/outputdir GAMMADIR=/usr/ports/java/openjdk6/work/hotspot MAKE_VERBOSE=y HOTSPOT_RELEASE_VERSION=20.0-b12 JRE_RELEASE_VERSION=1.6.0_32-b27 HOTSPOT_BUILD_VERSION= product gmake[4]: Entering directory `/usr/ports/java/openjdk6/work/build/bsd-amd64/hotspot/outputdir' cd bsd_amd64_compiler2/product && gmake -w " LP64=1 " gmake[5]: Entering directory `/usr/ports/java/openjdk6/work/build/bsd-amd64/hotspot/outputdir/bsd_amd64_compiler2/product' gmake[6]: Entering directory `/usr/ports/java/openjdk6/work/build/bsd-amd64/hotspot/outputdir/bsd_amd64_compiler2/product' gmake[6]: *** No rule to make target `/usr/ports/java/openjdk6/work/hotspot/src/cpu/amd64/vm/x86_64.ad', needed by `../generated/adfiles/bsd_x86_64.ad'. Stop. gmake[6]: Leaving directory `/usr/ports/java/openjdk6/work/build/bsd-amd64/hotspot/outputdir/bsd_amd64_compiler2/product' On another machine I see that openoffice-3 depends on openjdk7. This isn't right that the older version openjdk6 is the default for build. Yuri