Solved

Linux, cant find installation of java

Posted on 2013-12-04
2
373 Views
Last Modified: 2013-12-05
While I am still trying to find out how to install java 1.7 in 32 bit mode
   (with a yum install)

In parallel, I am trying to install a 32 bit version without the yum

rpm -Uvh jre-7u45-linux-i586.rpm
Preparing...                ########################################### [100%]
   1:jre                    ########################################### [100%]
Unpacking JAR files...
        rt.jar...
        jsse.jar...
        charsets.jar...
        localedata.jar...
        jfxrt.jar...
        plugin.jar...
        javaws.jar...
        deploy.jar...

Open in new window


My java still thinks he is 64 bit

OpenJDK Runtime Environment (rhel-2.4.3.3.el6-x86_64 u45-b15)
OpenJDK 64-Bit Server VM (build 24.45-b08, mixed mode)

Open in new window



So I try the alternatives command

So he sees the two previously installed 64 bit versions

There are 2 programs which provide 'java'.

  Selection    Command
-----------------------------------------------
*+ 1           /usr/lib/jvm/jre-1.7.0-openjdk.x86_64/bin/java
   2           /usr/lib/jvm/jre-1.6.0-openjdk.x86_64/bin/java

Open in new window


So how do I tell if the java 32 bit was installed

and how do I tell it to use the 32 bit as primary

Thanks
0
Comment
Question by:Los Angeles1
2 Comments
 
LVL 19

Assisted Solution

by:xterm
xterm earned 250 total points
ID: 39696628
If you don't need the 64-bit versions, uninstall them as follows:

rpm -e java-1.6.0-openjdk.x86_64
rpm -e java-1.7.0-openjdk.x86_64


Then try the alternatives command again.

BTW, you can find the name of the package that owns a binary by doing:

rpm -ql /usr/lib/jvm/jre-1.6.0-openjdk.x86_64/bin/java
0
 
LVL 34

Accepted Solution

by:
Duncan Roe earned 250 total points
ID: 39696741
If you do an rpm -qpl jre-7u45-linux-i586.rpm, it will tell you where it put everything
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Just want to learn, how Linux D2B works, under Linux bash shell 6 59
change time in cron 4 65
AWS CLI issues with Tags 3 64
Debug VNC connection on CentOS7 server 22 66
Network Interface Card (NIC) bonding, also known as link aggregation, NIC teaming and trunking, is an important concept to understand and implement in any environment where high availability is of concern. Using this feature, a server administrator …
Over the last ten+ years I have seen Linux configuration tools come and go. In the early days there was the tried-and-true, all-powerful linuxconf that many thought would remain the one and only Linux configuration tool until the end of times. Well,…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now