JDK-6449966 : 37 security test cases are failing with flag -Xcheck:jni for Tiger, warning in AWT
  • Type: Bug
  • Component: client-libs
  • Sub-Component: java.awt
  • Affected Version: 5.0u8
  • Priority: P4
  • Status: Closed
  • Resolution: Duplicate
  • OS: windows_xp
  • CPU: x86
  • Submitted: 2006-07-18
  • Updated: 2014-02-27
  • Resolved: 2010-10-13
The Version table provides details related to the release that this issue/RFE will be addressed.

Unresolved : Release in which this issue/RFE will be addressed.
Resolved: Release in which this issue/RFE has been resolved.
Fixed : Release in which this issue/RFE has been fixed. The release containing this fix may be available for download as an Early Access Release or a General Availability Release.

To download the current JDK release, click here.
Other
5.0-poolResolved
Related Reports
Duplicate :  
Description
The following test cases are failing with flag -Xcheck:jni for 1.5.0_08b03 on winXP-x86 :

AppletAttacks/AppletAttacks_test1       execute_script
AppletAttacks/AppletAttacks_test2       execute_script
AppletAttacks/AppletAttacks_test3       execute_script
AppletAttacks/AppletAttacks_test5       execute_script
AppletAttacks/AppletAttacks_test6       execute_script
AppletAttacks/AppletAttacks_test8       execute_script
AppletAttacks/AppletAttacks_test9       execute_script
AppletAttacks/AppletAttacks_test10      execute_script
AppletAttacks/AppletAttacks_test11      execute_script
AppletAttacks/AppletAttacks_test12      execute_script
AppletAttacks/AppletAttacks_test13      execute_script
AppletAttacks/AppletAttacks_test14      execute_script
AppletAttacks/AppletAttacks_test15      execute_script
AppletAttacks/AppletAttacks_test16      execute_script
AppletAttacks/AppletAttacks_test17      execute_script
AppletAttacks/AppletAttacks_test18      execute_script
AppletAttacks/AppletAttacks_test19      execute_script
AppletAttacks/AppletAttacks_test20      execute_script
AppletAttacks/AppletAttacks_test21      execute_script
AppletAttacks/AppletAttacks_test22      execute_script
AppletAttacks/AppletAttacks_test23      execute_script
AppletAttacks/AppletAttacks_test24      execute_script
AppletAttacks/AppletAttacks_test26      execute_script
AppletAttacks/AppletAttacks_test27      execute_script
AppletAttacks/AppletAttacks_test28      execute_script
AppletAttacks/AppletAttacks_test29      execute_script
SA/SignedAppletDemo     execute_script
headline/DOS/OverFlow   execute_script
headline/URLBugs/4415229        execute_script
headline/noWarningApp   execute_script
headline/typeConfusion  execute_script
jce/Applet/SunJCE/Short_TestCipherBlowfish      execute_script
jce/Applet/SunJCE/Short_TestCipherPBE   execute_script
jce/Dynamic/Bundle/applet/SunJCE        execute_script
jce/Dynamic/RegisterProvider/applet/SunJCE/Short_TestCipherBlowfish     execute_script
jce/Dynamic/RegisterProvider/applet/SunJCE/Short_TestCipherPBE  execute_script
jce/Dynamic/RegisterProvider/applet/SunJCE/Strong_TestCipherDES execute_script

Reason of failing : result of diff command with gold output file. All this test cases are passing without this flag.

Almost all of these test cases (except two) are failing for 1.5.0 fsc also. These two test cases : 

jce/Applet/SunJCE/Short_TestCipherBlowfish      execute_script
jce/Dynamic/RegisterProvider/applet/SunJCE/Short_TestCipherBlowfish     execute_script

are passing for 1.5.0 fcs. With update 04, the test case 

jce/Applet/SunJCE/Short_TestCipherBlowfish      execute_script

is failing, but the test case

jce/Dynamic/RegisterProvider/applet/SunJCE/Short_TestCipherBlowfish     execute_script

is passing.

How to reproduce :

Test suite location : /net/jqa.ireland/jqa6/dtf/dtf_ws/suites/1.5.0_URv09/security
Launch the security test suite in DTF mode. Sample DTF XML job file :

<testrequest priority="100"> -*-html-*-
 <jdk dir="c:/jdk1.5.0_08/" runtime="-Xcheck:jni"/>
 <jobname jobname="150_08b03-security-winXPpro-x86"/>
 <suitename suitename="1.5.0_URv09"/>
 <user-defs key="J2SE_COMPONENT_DIR" value="security" />
 <results dir="" emailto="###@###.###" subject="150 security DTF results"/>
 <attr key="network.name" value="morality"/>
</testrequest>

Comments
EVALUATION To eliminate the warnings it's enough just back-port fix for 6209692. BTW I could reproduce the warnings using 1.5.0 also. So I believe that in fact it's not regression.
06-02-2007

EVALUATION As seen in the result directory. The only difference of the gold output and the real output is: < Warning: Calling other JNI functions in the scope of Get/ReleasePrimitiveArrayCritical or Get/ReleaseStringCritical < Warning: Calling other JNI functions in the scope of Get/ReleasePrimitiveArrayCritical or Get/ReleaseStringCritical < Warning: Calling other JNI functions in the scope of Get/ReleasePrimitiveArrayCritical or Get/ReleaseStringCritical < FATAL ERROR in native method: Bad global or local ref passed to JNI < at sun.awt.windows.WToolkit.eventLoop(Native Method) < at sun.awt.windows.WToolkit.run(WToolkit.java:269) < at java.lang.Thread.run(Thread.java:595) (in /net/vice.russia/export/home0/dtf/dtf_ws/dtf3-exec/1.5.0_URv09-150_08b03-security-winXPpro_check-x86-iy-2006-07-18-18-55-21-0297/results/1.5.0_URv09-150_08b03-security-winXPpro_check-x86-iy-2006-07-18-18-55-21-0297/toor.Windows_XP.x86/AppletAttacks_test1) Reassigning to the AWT group.
24-07-2006

EVALUATION I try to launch the applet with java.exe -Djava.security.manager -Djava.security.policy=policy.txt -Xcheck:jni\ sun.applet.AppletViewer test.html but only see Test PASSED. Do I need to setup any special environment variable? I find similar bugs: 6209692 Warning: Calling other JNI functions in the scope of Get/ReleasePrimitiveArra! message in-Xcheck:jni 5082481 normal DnD program causes "FATAL ERROR in native method" 6205044 JCK: FATAL ERROR in native method: Bad global or local ref passed to JNI Seems all AWT.
19-07-2006