PATH=.:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/opt/sfw/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin:/usr/ucb:/usr/ccs/bin LD_LIBRARY_PATH=/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/selfserv under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/selfserv memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -D -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_memleak -n aquash.red.iplanet.com -e aquash.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: selfserv -D -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_memleak -n aquash.red.iplanet.com -e aquash.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 4406) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 184 total size: 16192 bytes) Memory Leak (mel): Found 107 leaked blocks with total size 9416 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] nssToken_TraverseCertificates() at 0xc0586e9f [11] NSSTrustDomain_TraverseCertificates() at 0xc057c80a [12] PK11_TraverseSlotCerts() at 0xc052f311 [13] CERT_GetSSLCACerts() at 0xc051ab68 [14] serverCAListSetup() at 0xc2d1e4a3 [15] PR_CallOnceWithArg() at 0xbc91ac50 [16] SSL_ConfigSecureServer() at 0xc2d1e7e1 Memory Leak (mel): Found 76 leaked blocks with total size 6688 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] nssToken_FindTrustForCertificate() at 0xc0586364 [11] nssTrustDomain_FindTrustForCertificate() at 0xc057c9be [12] fill_CERTCertificateFields() at 0xc058201d [13] STAN_GetCERTCertificate() at 0xc0582479 [14] convert_cert() at 0xc052e977 [15] nssPKIObjectCollection_Traverse() at 0xc058035b [16] NSSTrustDomain_TraverseCertificates() at 0xc057c853 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x8166990 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 34 total size: 2552 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (32.60% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x80581a1 Block in use (biu): Found block of size 512 bytes at address 0x8085a78 (20.06% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x80581a1 Block in use (biu): Found 8 blocks totaling 192 bytes (7.52% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x80581a1 Block in use (biu): Found block of size 128 bytes at address 0x8085fb0 (5.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x80581a1 Block in use (biu): Found block of size 104 bytes at address 0x813ebc8 (4.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x8058ce9 Block in use (biu): Found block of size 104 bytes at address 0x8086d00 (4.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x80581a1 Block in use (biu): Found block of size 88 bytes at address 0x8086c60 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x80581a1 Block in use (biu): Found block of size 88 bytes at address 0x8085f40 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x80581a1 Block in use (biu): Found block of size 88 bytes at address 0x813f9a8 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x8058ce9 Block in use (biu): Found block of size 88 bytes at address 0x8086fc0 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_InitSymWrapKeysLock() at 0xc2d0d35e [6] SSL_ConfigServerSessionIDCache() at 0xc2d21717 [7] main() at 0x8058951 Block in use (biu): Found block of size 88 bytes at address 0x816f648 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x8058ce9 Block in use (biu): Found block of size 88 bytes at address 0x8086f50 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_InitClientSessionCacheLock() at 0xc2d1cd2e [6] SSL_ConfigServerSessionIDCache() at 0xc2d21712 [7] main() at 0x8058951 Block in use (biu): Found block of size 32 bytes at address 0x80865c8 (1.25% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x80581a1 Block in use (biu): Found block of size 24 bytes at address 0x813eb98 (0.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x8058ce9 Block in use (biu): Found block of size 24 bytes at address 0x8086cd0 (0.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x80581a1 Block in use (biu): Found block of size 20 bytes at address 0x8142128 (0.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] pr_LoadLibraryByPathname() at 0xbc91147b [4] PR_LoadLibraryWithFlags() at 0xbc911332 [5] 0xaed2f7d9 [6] PR_CallOnce() at 0xbc91a9b3 [7] 0xaed30fe3 [8] 0xaed1109f [9] 0xaed08088 [10] SECMOD_LoadPKCS11Module() at 0xc05376ed [11] SECMOD_LoadModule() at 0xc054473b [12] SECMOD_LoadModule() at 0xc0544792 [13] nss_Init() at 0xc051204f [14] NSS_Initialize() at 0xc0512341 [15] main() at 0x8058ce9 Block in use (biu): Found block of size 20 bytes at address 0x8086a40 (0.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitLinker() at 0xbc910f9c [4] PR_Init() at 0xbc91a129 [5] main() at 0x80581a1 Block in use (biu): Found block of size 14 bytes at address 0x8144990 (0.55% of total) At time of allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] pr_LoadLibraryByPathname() at 0xbc9114d6 [3] PR_LoadLibraryWithFlags() at 0xbc911332 [4] 0xaed2f7d9 [5] PR_CallOnce() at 0xbc91a9b3 [6] 0xaed30fe3 [7] 0xaed1109f [8] 0xaed08088 [9] SECMOD_LoadPKCS11Module() at 0xc05376ed [10] SECMOD_LoadModule() at 0xc054473b [11] SECMOD_LoadModule() at 0xc0544792 [12] nss_Init() at 0xc051204f [13] NSS_Initialize() at 0xc0512341 [14] main() at 0x8058ce9 Block in use (biu): Found block of size 12 bytes at address 0x8084a78 (0.47% of total) At time of allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PR_ErrorInstallTable() at 0xbc919b9b [3] nspr_InitializePRErrorTable() at 0xbc9197af [4] PR_Init() at 0xbc91a15c [5] main() at 0x80581a1 Block in use (biu): Found block of size 6 bytes at address 0x80853f8 (0.24% of total) At time of allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] _PR_InitLinker() at 0xbc910fb1 [3] PR_Init() at 0xbc91a129 [4] main() at 0x80581a1 execution completed, exit code is 0