--- old/src/java.desktop/share/classes/com/sun/media/sound/JSSecurityManager.java 2016-08-12 17:01:49.000000000 +0300 +++ new/src/java.desktop/share/classes/com/sun/media/sound/JSSecurityManager.java 2016-08-12 17:01:48.000000000 +0300 @@ -26,19 +26,17 @@ package com.sun.media.sound; import java.io.BufferedInputStream; -import java.io.InputStream; import java.io.File; import java.io.FileInputStream; - +import java.io.InputStream; +import java.security.AccessController; +import java.security.PrivilegedAction; import java.util.ArrayList; import java.util.Iterator; import java.util.List; import java.util.Properties; import java.util.ServiceLoader; -import java.security.AccessController; -import java.security.PrivilegedAction; - import javax.sound.sampled.AudioPermission; /** Managing security in the Java Sound implementation. @@ -64,7 +62,6 @@ return (System.getSecurityManager() != null); } - static void checkRecordPermission() throws SecurityException { if(Printer.trace) Printer.trace("JSSecurityManager.checkRecordPermission()"); SecurityManager sm = System.getSecurityManager(); @@ -90,6 +87,7 @@ try { // invoke the privileged action using 1.2 security PrivilegedAction action = new PrivilegedAction() { + @Override public Void run() { loadPropertiesImpl(properties, filename); return null; @@ -108,7 +106,6 @@ } } - private static void loadPropertiesImpl(Properties properties, String filename) { if(Printer.trace)Printer.trace(">> JSSecurityManager: loadPropertiesImpl()"); @@ -176,6 +173,7 @@ // the iterator's hasNext() method looks through classpath for // the provider class names, so it requires read permissions PrivilegedAction hasNextAction = new PrivilegedAction() { + @Override public Boolean run() { return ps.hasNext(); }