PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64 LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running selfserv under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/selfserv < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_selfserv21242.dbx memleak.sh: -------- DBX commands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_selfserv21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak -n biarritz.red.iplanet.com -e biarritz.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak -n biarritz.red.iplanet.com -e biarritz.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 18676) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 223 total size: 19624 bytes) Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] nssToken_FindTrustForCertificate() at 0xac97cc3c [11] nssTrustDomain_FindTrustForCertificate() at 0xac973756 [12] fill_CERTCertificateFields() at 0xac978d21 [13] STAN_GetCERTCertificate() at 0xac97911d [14] convert_cert() at 0xac927957 [15] nssPKIObjectCollection_Traverse() at 0xac9770d7 [16] NSSTrustDomain_TraverseCertificates() at 0xac9735eb Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] nssToken_TraverseCertificates() at 0xac97d733 [11] NSSTrustDomain_TraverseCertificates() at 0xac9735a2 [12] PK11_TraverseSlotCerts() at 0xac9282f1 [13] CERT_GetSSLCACerts() at 0xac916d84 [14] serverCAListSetup() at 0xaf11d127 [15] PR_CallOnceWithArg() at 0xa8d1aa56 [16] SSL_ConfigSecureServer() at 0xaf11d465 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x815ff18 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 31 total size: 2430 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (34.24% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x80580b5 Block in use (biu): Found block of size 512 bytes at address 0x80848b8 (21.07% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x80580b5 Block in use (biu): Found 8 blocks totaling 192 bytes (7.90% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x80580b5 Block in use (biu): Found block of size 128 bytes at address 0x8084df0 (5.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x80580b5 Block in use (biu): Found block of size 104 bytes at address 0x813cef0 (4.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x8058bfd Block in use (biu): Found block of size 104 bytes at address 0x8085b40 (4.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x80580b5 Block in use (biu): Found block of size 88 bytes at address 0x8085aa0 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x80580b5 Block in use (biu): Found block of size 88 bytes at address 0x8085dc8 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_InitSymWrapKeysLock() at 0xaf10c6aa [6] SSL_ConfigServerSessionIDCache() at 0xaf12039b [7] main() at 0x8058865 Block in use (biu): Found block of size 88 bytes at address 0x8084d80 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x80580b5 Block in use (biu): Found block of size 88 bytes at address 0x813dd58 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x8058bfd Block in use (biu): Found block of size 88 bytes at address 0x8085d58 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_InitClientSessionCacheLock() at 0xaf11b9b2 [6] SSL_ConfigServerSessionIDCache() at 0xaf120396 [7] main() at 0x8058865 Block in use (biu): Found block of size 32 bytes at address 0x8085408 (1.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x80580b5 Block in use (biu): Found block of size 24 bytes at address 0x813cec0 (0.99% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x8058bfd Block in use (biu): Found block of size 24 bytes at address 0x8085b10 (0.99% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x80580b5 Block in use (biu): Found block of size 20 bytes at address 0x8085880 (0.82% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitLinker() at 0xa8d10dd8 [4] PR_Init() at 0xa8d19f69 [5] main() at 0x80580b5 Block in use (biu): Found block of size 12 bytes at address 0x80838b8 (0.49% of total) At time of allocation, the call stack was: [1] PR_Malloc() at 0xa8d1230c [2] PR_ErrorInstallTable() at 0xa8d199d7 [3] nspr_InitializePRErrorTable() at 0xa8d195eb [4] PR_Init() at 0xa8d19f9c [5] main() at 0x80580b5 Block in use (biu): Found block of size 6 bytes at address 0x8084238 (0.25% of total) At time of allocation, the call stack was: [1] _strdup() at 0xa155018d [2] _PR_InitLinker() at 0xa8d10ded [3] PR_Init() at 0xa8d19f69 [4] main() at 0x80580b5 execution completed, exit code is 0