Issue | Fix Version | Assignee | Priority | Status | Resolution | Resolved In Build |
---|---|---|---|---|---|---|
JDK-2027784 | 1.3.0 | J. Duke | P4 | Resolved | Fixed | 1.3 |
Release java plugin 1.1.2
The customer wants to be able to leave the applet page and
return to it later thereby starting and stopping the applet several
times without having to quit and restart the browser.
If the backward and forward buttons of the browser are clicked
too quickly, memory usage by the VM gets to the point where thrashing occurs.
TEST CASE:
import java.awt.*;
import javax.swing.*;
import java.util.Vector;
import sun.applet.AppletSecurityException;
public class test extends JApplet {
JFrame x[] = new JFrame[3000];
int i;
public void init() {
System.out.println("init()");
for (i = 0;i < 3000;i++) {
x[i] = new JFrame("abc");
}
}
public void destroy() {
System.out.println("destroy()");
for (i = 0;i < 3000;i++) {
x[i] = null;
}
}
}
**************************************************************
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
<html>
<head>
<title> HP Viridia</title>
</head>
<body>
<h1>HP Viridia</h1>
<hr>
<OBJECT classid="clsid:8AD9C840-044E-11D1-B3E9-00805F499D93"
WIDTH = 400
HEIGHT = 400
codebase="http://java.sun.com/products/plugin/1.1/jinstall-11-win32.ca
b#Version=1,1,0,0">
<PARAM NAME = "CODE" VALUE = "test.class" >
<PARAM NAME = "CODEBASE" VALUE = "." >
<PARAM NAME = "ARCHIVE" VALUE = "test.jar">
<PARAM NAME="type"
VALUE="application/x-java-applet;version=1.1">
<PARAM NAME="dbname" VALUE="">
<COMMENT>
<EMBED
type="application/x-java-applet;version=1.1.2"
java_CODE = "test.class"
java_ARCHIVE = "test.jar"
java_CODEBASE = "."
dbname = ""
WIDTH = 400
HEIGHT = 400
pluginspage="http://java.sun.com/products/plugin/1.1.2/plugin-install.
html">
<NOEMBED>
</COMMENT>
alt="Your browser understands the <APPLET> tag but
isn't running the applet, for some reason." Your browser is completely
ignoring the <APPLET> tag!
</NOEMBED>
</EMBED>
</OBJECT>
<hr>
</body>
</html>
********************************************************************
The customer wants to be able to leave the applet page and
return to it later thereby starting and stopping the applet several
times without having to quit and restart the browser.
If the backward and forward buttons of the browser are clicked
too quickly, memory usage by the VM gets to the point where thrashing occurs.
TEST CASE:
import java.awt.*;
import javax.swing.*;
import java.util.Vector;
import sun.applet.AppletSecurityException;
public class test extends JApplet {
JFrame x[] = new JFrame[3000];
int i;
public void init() {
System.out.println("init()");
for (i = 0;i < 3000;i++) {
x[i] = new JFrame("abc");
}
}
public void destroy() {
System.out.println("destroy()");
for (i = 0;i < 3000;i++) {
x[i] = null;
}
}
}
**************************************************************
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
<html>
<head>
<title> HP Viridia</title>
</head>
<body>
<h1>HP Viridia</h1>
<hr>
<OBJECT classid="clsid:8AD9C840-044E-11D1-B3E9-00805F499D93"
WIDTH = 400
HEIGHT = 400
codebase="http://java.sun.com/products/plugin/1.1/jinstall-11-win32.ca
b#Version=1,1,0,0">
<PARAM NAME = "CODE" VALUE = "test.class" >
<PARAM NAME = "CODEBASE" VALUE = "." >
<PARAM NAME = "ARCHIVE" VALUE = "test.jar">
<PARAM NAME="type"
VALUE="application/x-java-applet;version=1.1">
<PARAM NAME="dbname" VALUE="">
<COMMENT>
<EMBED
type="application/x-java-applet;version=1.1.2"
java_CODE = "test.class"
java_ARCHIVE = "test.jar"
java_CODEBASE = "."
dbname = ""
WIDTH = 400
HEIGHT = 400
pluginspage="http://java.sun.com/products/plugin/1.1.2/plugin-install.
html">
<NOEMBED>
</COMMENT>
alt="Your browser understands the <APPLET> tag but
isn't running the applet, for some reason." Your browser is completely
ignoring the <APPLET> tag!
</NOEMBED>
</EMBED>
</OBJECT>
<hr>
</body>
</html>
********************************************************************
- backported by
-
JDK-2027784 Memory leak in java plug-in
-
- Resolved
-
- duplicates
-
JDK-4316856 Memory leak happens in Java PlugIn 1.1.3
-
- Closed
-
-
JDK-4318947 Memory leak happens in JRE1.2.2 and JRE1.3
-
- Closed
-
- relates to
-
JDK-4422483 java plug-in memory leak
-
- Closed
-