PATH=.:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/lib:/bin:/usr/bin:/opt/sfw/bin:/usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin:/usr/ucb:/usr/ccs/bin LD_LIBRARY_PATH=/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/tmp29857 memleak.sh: -------- Running selfserv under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/selfserv < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_selfserv29857.dbx memleak.sh: -------- DBX commands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_selfserv29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -D -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/server_memleak -n ciotat.red.iplanet.com -e ciotat.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: selfserv -D -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/server_memleak -n ciotat.red.iplanet.com -e ciotat.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 27814) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 215 total size: 30960 bytes) Memory Leak (mel): Found 107 leaked blocks with total size 15408 bytes At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] nssToken_TraverseCertificates() at 0xffffffff6cd9e83c [9] NSSTrustDomain_TraverseCertificates() at 0xffffffff6cd937b8 [10] PK11_TraverseSlotCerts() at 0xffffffff6cd45b2c [11] CERT_GetSSLCACerts() at 0xffffffff6cd312a0 [12] serverCAListSetup() at 0xffffffff6f920a4c [13] PR_CallOnceWithArg() at 0xffffffff69123014 [14] SSL_ConfigSecureServer() at 0xffffffff6f920da8 [15] server_main() at 0x100008800 [16] main() at 0x10000b234 Memory Leak (mel): Found 107 leaked blocks with total size 15408 bytes At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] nssToken_FindTrustForCertificate() at 0xffffffff6cd9dbd8 [9] nssTrustDomain_FindTrustForCertificate() at 0xffffffff6cd93898 [10] nssTrust_GetCERTCertTrustForCert() at 0xffffffff6cd99004 [11] fill_CERTCertificateFields() at 0xffffffff6cd997d4 [12] STAN_GetCERTCertificate() at 0xffffffff6cd99bb8 [13] convert_cert() at 0xffffffff6cd450fc [14] nssPKIObjectCollection_Traverse() at 0xffffffff6cd97728 [15] NSSTrustDomain_TraverseCertificates() at 0xffffffff6cd93808 [16] PK11_TraverseSlotCerts() at 0xffffffff6cd45b2c Memory Leak (mel): Found leaked block of size 144 bytes at address 0x10021faa8 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x10000a748 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 35 total size: 4520 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (31.15% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009c80 Block in use (biu): Found block of size 1024 bytes at address 0x100127208 (22.65% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009c80 Block in use (biu): Found block of size 256 bytes at address 0x100127af8 (5.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009c80 Block in use (biu): Found 8 blocks totaling 256 bytes (5.66% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009c80 Block in use (biu): Found block of size 176 bytes at address 0x10012b2b8 (3.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009c80 Block in use (biu): Found block of size 176 bytes at address 0x1001e3898 (3.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x10000a748 Block in use (biu): Found block of size 144 bytes at address 0x10022a598 (3.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x10000a748 Block in use (biu): Found block of size 144 bytes at address 0x1001e4c58 (3.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x10000a748 Block in use (biu): Found block of size 144 bytes at address 0x100127a48 (3.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009c80 Block in use (biu): Found block of size 144 bytes at address 0x10012b208 (3.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009c80 Block in use (biu): Found block of size 144 bytes at address 0x10012b538 (3.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] SSL_ConfigServerSessionIDCache() at 0xffffffff6f923d1c [5] main() at 0x10000a560 Block in use (biu): Found block of size 144 bytes at address 0x10012b488 (3.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] SSL_ConfigServerSessionIDCache() at 0xffffffff6f923d14 [5] main() at 0x10000a560 Block in use (biu): Found block of size 98 bytes at address 0x1001e5548 (2.17% of total) At time of allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] pr_LoadLibraryByPathname() at 0xffffffff69118e4c [3] 0xffffffff59938070 [4] 0xffffffff599380ec [5] 0xffffffff599381f0 [6] PR_CallOnce() at 0xffffffff69122c88 [7] 0xffffffff5993a478 [8] 0xffffffff59919b30 [9] 0xffffffff5990fa1c [10] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [11] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [12] SECMOD_LoadModule() at 0xffffffff6cd5b020 [13] 0xffffffff6cd27d64 [14] NSS_Initialize() at 0xffffffff6cd287e4 [15] main() at 0x10000a748 Block in use (biu): Found block of size 64 bytes at address 0x100128298 (1.42% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009c80 Block in use (biu): Found block of size 40 bytes at address 0x1001287f8 (0.88% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938070 [4] 0xffffffff599380ec [5] 0xffffffff599381f0 [6] PR_CallOnce() at 0xffffffff69122c88 [7] 0xffffffff5993a478 [8] 0xffffffff59919b30 [9] 0xffffffff5990fa1c [10] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [11] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [12] SECMOD_LoadModule() at 0xffffffff6cd5b020 [13] 0xffffffff6cd27d64 [14] NSS_Initialize() at 0xffffffff6cd287e4 [15] main() at 0x10000a748 Block in use (biu): Found block of size 40 bytes at address 0x1001286b8 (0.88% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitLinker() at 0xffffffff69118710 [3] _PR_InitStuff() at 0xffffffff69122064 [4] main() at 0x100009c80 Block in use (biu): Found block of size 32 bytes at address 0x100124138 (0.71% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009c80 Block in use (biu): Found block of size 32 bytes at address 0x1001242b8 (0.71% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x10000a748 Block in use (biu): Found block of size 24 bytes at address 0x1001240f8 (0.53% of total) At time of allocation, the call stack was: [1] PR_ErrorInstallTable() at 0xffffffff69121aa8 [2] _PR_InitStuff() at 0xffffffff691220b4 [3] main() at 0x100009c80 Block in use (biu): Found block of size 24 bytes at address 0x100223578 (0.53% of total) At time of allocation, the call stack was: [1] PKIX_PL_Malloc() at 0xffffffff6ce1ca24 [2] PKIX_PL_NssContext_Create() at 0xffffffff6ce43258 [3] PKIX_PL_Initialize() at 0xffffffff6ce27070 [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x10000a748 execution completed, exit code is 0