>>>>> Ivan Shmakov <[EMAIL PROTECTED]> writes:

[...]

 > Comparison of `strace's for i386 and amd64 Debian has revealed the
 > following suspicious syscall run on i386 Debian:

 > access("/usr/lib32/jvm/java-1.4.2-gcj-4.1-1.4.2.0/jre", F_OK) = -1 ENOENT

 > Apparently, javac deduces the path to its libraries from the
 > platform the kernel was built for:

 > $ uname -m 
 > x86_64
 > $ 

        ... BTW, as a crude work-around, the following helps:

# ln -vs lib /usr/lib32 

[...]




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to