>>>>> Ivan Shmakov <[EMAIL PROTECTED]> writes: [...]
> Comparison of `strace's for i386 and amd64 Debian has revealed the > following suspicious syscall run on i386 Debian: > access("/usr/lib32/jvm/java-1.4.2-gcj-4.1-1.4.2.0/jre", F_OK) = -1 ENOENT > Apparently, javac deduces the path to its libraries from the > platform the kernel was built for: > $ uname -m > x86_64 > $ ... BTW, as a crude work-around, the following helps: # ln -vs lib /usr/lib32 [...] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]