PATH=.:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/opt/sfw/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin:/usr/ucb:/usr/ccs/bin LD_LIBRARY_PATH=/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running selfserv under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/selfserv < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_selfserv29919.dbx memleak.sh: -------- DBX commands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_selfserv29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -D -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_memleak -n aquash.red.iplanet.com -e aquash.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: selfserv -D -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_memleak -n aquash.red.iplanet.com -e aquash.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 3732) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 215 total size: 18920 bytes) Memory Leak (mel): Found 107 leaked blocks with total size 9416 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] nssToken_FindTrustForCertificate() at 0xc0587240 [11] nssTrustDomain_FindTrustForCertificate() at 0xc057d89a [12] fill_CERTCertificateFields() at 0xc0582ef9 [13] STAN_GetCERTCertificate() at 0xc0583355 [14] convert_cert() at 0xc052e96b [15] nssPKIObjectCollection_Traverse() at 0xc0581237 [16] NSSTrustDomain_TraverseCertificates() at 0xc057d72f Memory Leak (mel): Found 107 leaked blocks with total size 9416 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] nssToken_TraverseCertificates() at 0xc0587d7b [11] NSSTrustDomain_TraverseCertificates() at 0xc057d6e6 [12] PK11_TraverseSlotCerts() at 0xc052f305 [13] CERT_GetSSLCACerts() at 0xc051ab5c [14] serverCAListSetup() at 0xc2d1e4a3 [15] PR_CallOnceWithArg() at 0xbc91ac2c [16] SSL_ConfigSecureServer() at 0xc2d1e7e1 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x8177530 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 35 total size: 2568 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (32.40% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x80581a1 Block in use (biu): Found block of size 512 bytes at address 0x8085a78 (19.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x80581a1 Block in use (biu): Found 8 blocks totaling 192 bytes (7.48% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x80581a1 Block in use (biu): Found block of size 128 bytes at address 0x8085fb0 (4.98% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x80581a1 Block in use (biu): Found block of size 104 bytes at address 0x813ebc8 (4.05% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x8058ce9 Block in use (biu): Found block of size 104 bytes at address 0x8086d00 (4.05% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x80581a1 Block in use (biu): Found block of size 88 bytes at address 0x8086c60 (3.43% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x80581a1 Block in use (biu): Found block of size 88 bytes at address 0x8085f40 (3.43% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x80581a1 Block in use (biu): Found block of size 88 bytes at address 0x813f9a8 (3.43% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x8058ce9 Block in use (biu): Found block of size 88 bytes at address 0x8086fc0 (3.43% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_InitSymWrapKeysLock() at 0xc2d0d35e [6] SSL_ConfigServerSessionIDCache() at 0xc2d21717 [7] main() at 0x8058951 Block in use (biu): Found block of size 88 bytes at address 0x8181488 (3.43% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x8058ce9 Block in use (biu): Found block of size 88 bytes at address 0x8086f50 (3.43% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_InitClientSessionCacheLock() at 0xc2d1cd2e [6] SSL_ConfigServerSessionIDCache() at 0xc2d21712 [7] main() at 0x8058951 Block in use (biu): Found block of size 32 bytes at address 0x80865c8 (1.25% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x80581a1 Block in use (biu): Found block of size 24 bytes at address 0x813eb98 (0.93% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x8058ce9 Block in use (biu): Found block of size 24 bytes at address 0x8086cd0 (0.93% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x80581a1 Block in use (biu): Found block of size 20 bytes at address 0x8142128 (0.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] pr_LoadLibraryByPathname() at 0xbc911457 [4] PR_LoadLibraryWithFlags() at 0xbc91130e [5] 0xaed2f7d9 [6] PR_CallOnce() at 0xbc91a98f [7] 0xaed30fe3 [8] 0xaed1109f [9] 0xaed11372 [10] SECMOD_LoadPKCS11Module() at 0xc05376e1 [11] SECMOD_LoadModule() at 0xc054472f [12] SECMOD_LoadModule() at 0xc0544786 [13] nss_Init() at 0xc051204f [14] NSS_Initialize() at 0xc0512341 [15] main() at 0x8058ce9 Block in use (biu): Found block of size 20 bytes at address 0x8086a40 (0.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitLinker() at 0xbc910f78 [4] PR_Init() at 0xbc91a105 [5] main() at 0x80581a1 Block in use (biu): Found block of size 16 bytes at address 0x817a7d0 (0.62% of total) At time of allocation, the call stack was: [1] PR_Malloc() at 0xbc9124a8 [2] PKIX_PL_Malloc() at 0xc05fbc63 [3] PKIX_PL_NssContext_Create() at 0xc061f3ac [4] PKIX_PL_Initialize() at 0xc0605c10 [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x8058ce9 Block in use (biu): Found block of size 14 bytes at address 0x8144990 (0.55% of total) At time of allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] pr_LoadLibraryByPathname() at 0xbc9114b2 [3] PR_LoadLibraryWithFlags() at 0xbc91130e [4] 0xaed2f7d9 [5] PR_CallOnce() at 0xbc91a98f [6] 0xaed30fe3 [7] 0xaed1109f [8] 0xaed11372 [9] SECMOD_LoadPKCS11Module() at 0xc05376e1 [10] SECMOD_LoadModule() at 0xc054472f [11] SECMOD_LoadModule() at 0xc0544786 [12] nss_Init() at 0xc051204f [13] NSS_Initialize() at 0xc0512341 [14] main() at 0x8058ce9 Block in use (biu): Found block of size 12 bytes at address 0x8084a78 (0.47% of total) At time of allocation, the call stack was: [1] PR_Malloc() at 0xbc9124a8 [2] PR_ErrorInstallTable() at 0xbc919b77 [3] nspr_InitializePRErrorTable() at 0xbc91978b [4] PR_Init() at 0xbc91a138 [5] main() at 0x80581a1 execution completed, exit code is 0