security/nss/tests/memleak/memleak.sh
author Brian Smith <bsmith@mozilla.com>
Thu, 11 Apr 2013 16:46:53 -0700
changeset 128536 0857f2bc8f8a646e96b93a76307451c65238f35a
parent 108803 699db88b5ea01fd321fe8abfe5bb071e991b120d
child 234774 289fa2204f9ffb4c4abbf52523de04c5e9c9eaf8
permissions -rw-r--r--
Bug 858231: Upgrade to NSS 3.15 BETA 1 and adjust security/build to work with new NSS directory layout, r=bsmith

#!/bin/bash
#
# This Source Code Form is subject to the terms of the Mozilla Public
# License, v. 2.0. If a copy of the MPL was not distributed with this
# file, You can obtain one at http://mozilla.org/MPL/2.0/.

########################################################################
#
# mozilla/security/nss/tests/memleak/memleak.sh
#
# Script to test memory leaks in NSS
#
# needs to work on Solaris and Linux platforms, on others just print a message
# that OS is not supported
#
# special strings
# ---------------
#   FIXME ... known problems, search for this string
#   NOTE .... unexpected behavior
#
########################################################################

############################# memleak_init #############################
# local shell function to initialize this script 
########################################################################
memleak_init()
{
	if [ -z "${INIT_SOURCED}" -o "${INIT_SOURCED}" != "TRUE" ]; then
		cd ../common
		. ./init.sh
	fi
	
	if [ ! -r ${CERT_LOG_FILE} ]; then
		cd ${QADIR}/cert
		. ./cert.sh
	fi

	SCRIPTNAME="memleak.sh"
	if [ -z "${CLEANUP}" ] ; then
		CLEANUP="${SCRIPTNAME}"
	fi

	OLD_LIBRARY_PATH=${LD_LIBRARY_PATH}
	TMP_LIBDIR="${HOSTDIR}/tmp"
	TMP_STACKS="${HOSTDIR}/stacks"
	TMP_SORTED="${HOSTDIR}/sorted"
	TMP_COUNT="${HOSTDIR}/count"
	DBXOUT="${HOSTDIR}/dbxout"
	DBXERR="${HOSTDIR}/dbxerr"
	DBXCMD="${HOSTDIR}/dbxcmd"
	
	PORT=${PORT:-8443}
	
	MODE_LIST="NORMAL BYPASS FIPS"
	
	SERVER_DB="${HOSTDIR}/server_memleak"
	CLIENT_DB="${HOSTDIR}/client_memleak"
	cp -r ${HOSTDIR}/server ${SERVER_DB}
	cp -r ${HOSTDIR}/client ${CLIENT_DB}
	
	LOGDIR="${HOSTDIR}/memleak_logs"
	mkdir -p ${LOGDIR}

	FOUNDLEAKS="${LOGDIR}/foundleaks"
	
	REQUEST_FILE="${QADIR}/memleak/sslreq.dat"
	IGNORED_STACKS="${QADIR}/memleak/ignored"
	
	gline=`echo ${OBJDIR} | grep "_64_"`
	if [ -n "${gline}" ] ; then
		BIT_NAME="64"
	else
		BIT_NAME="32"
	fi
		
	case "${OS_NAME}" in
	"SunOS")
		DBX=`which dbx`
		AWK=nawk
		
		if [ $? -eq 0 ] ; then
			echo "${SCRIPTNAME}: DBX found: ${DBX}"
		else
			echo "${SCRIPTNAME}: DBX not found, skipping memory leak checking."
			exit 0
		fi
		
		PROC_ARCH=`uname -p`
				
		if [ "${PROC_ARCH}" = "sparc" ] ; then
			if [ "${BIT_NAME}" = "64" ] ; then
				FREEBL_DEFAULT="libfreebl_64fpu_3"
				FREEBL_LIST="${FREEBL_DEFAULT} libfreebl_64int_3"
			else
				FREEBL_DEFAULT="libfreebl_32fpu_3"
				FREEBL_LIST="${FREEBL_DEFAULT} libfreebl_32int64_3"
			fi
		else
			if [ "${BIT_NAME}" = "64" ] ; then
				echo "${SCRIPTNAME}: OS not supported for memory leak checking."
				exit 0
			fi
			
			FREEBL_DEFAULT="libfreebl_3"
			FREEBL_LIST="${FREEBL_DEFAULT}"
		fi
		
		RUN_COMMAND_DBG="run_command_dbx"
		PARSE_LOGFILE="parse_logfile_dbx"
		;;
	"Linux")
		VALGRIND=`which valgrind`
		AWK=awk
		
		if [ $? -eq 0 ] ; then
			echo "${SCRIPTNAME}: Valgrind found: ${VALGRIND}"
		else
			echo "${SCRIPTNAME}: Valgrind not found, skipping memory leak checking."
			exit 0
		fi

		FREEBL_DEFAULT="libfreebl_3"
		FREEBL_LIST="${FREEBL_DEFAULT}"
				
		RUN_COMMAND_DBG="run_command_valgrind"
		PARSE_LOGFILE="parse_logfile_valgrind"
		;;
	*)
		echo "${SCRIPTNAME}: OS not supported for memory leak checking."
		exit 0
		;;
	esac

	if [ "${BUILD_OPT}" = "1" ] ; then
		OPT="OPT"
	else 
		OPT="DBG"
	fi

	NSS_DISABLE_UNLOAD="1"
	export NSS_DISABLE_UNLOAD

	SELFSERV_ATTR="-D -p ${PORT} -d ${SERVER_DB} -n ${HOSTADDR} -e ${HOSTADDR}-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5"
	TSTCLNT_ATTR="-p ${PORT} -h ${HOSTADDR} -c j -f -d ${CLIENT_DB} -w nss -o"
	STRSCLNT_ATTR="-q -p ${PORT} -d ${CLIENT_DB} -w nss -c 1000 -n TestUser ${HOSTADDR}"

	tbytes=0
	tblocks=0
	truns=0
	
	MEMLEAK_DBG=1
	export MEMLEAK_DBG
}

########################### memleak_cleanup ############################
# local shell function to clean up after this script 
########################################################################
memleak_cleanup()
{
	unset MEMLEAK_DBG
	unset NSS_DISABLE_UNLOAD
	
	. ${QADIR}/common/cleanup.sh
}

############################ set_test_mode #############################
# local shell function to set testing mode for server and for client
########################################################################
set_test_mode()
{
	if [ "${server_mode}" = "BYPASS" ] ; then
		echo "${SCRIPTNAME}: BYPASS is ON"
		SERVER_OPTION="-B -s"
		CLIENT_OPTION=""
	elif [ "${client_mode}" = "BYPASS" ] ; then
		echo "${SCRIPTNAME}: BYPASS is ON"
		SERVER_OPTION=""
		CLIENT_OPTION="-B -s"
	else
		echo "${SCRIPTNAME}: BYPASS is OFF"
		SERVER_OPTION=""
		CLIENT_OPTION=""
	fi
	
	if [ "${server_mode}" = "FIPS" ] ; then
		${BINDIR}/modutil -dbdir ${SERVER_DB} -fips true -force
		${BINDIR}/modutil -dbdir ${SERVER_DB} -list
		${BINDIR}/modutil -dbdir ${CLIENT_DB} -fips false -force
		${BINDIR}/modutil -dbdir ${CLIENT_DB} -list
		
		echo "${SCRIPTNAME}: FIPS is ON"
		cipher_list="c d e i j k n v y z"
	elif [ "${client_mode}" = "FIPS" ] ; then
		
		${BINDIR}/modutil -dbdir ${SERVER_DB} -fips false -force
		${BINDIR}/modutil -dbdir ${SERVER_DB} -list
		${BINDIR}/modutil -dbdir ${CLIENT_DB} -fips true -force
		${BINDIR}/modutil -dbdir ${CLIENT_DB} -list
		
		echo "${SCRIPTNAME}: FIPS is ON"
		cipher_list="c d e i j k n v y z"
	else
		${BINDIR}/modutil -dbdir ${SERVER_DB} -fips false -force
		${BINDIR}/modutil -dbdir ${SERVER_DB} -list
		${BINDIR}/modutil -dbdir ${CLIENT_DB} -fips false -force
		${BINDIR}/modutil -dbdir ${CLIENT_DB} -list
		
		echo "${SCRIPTNAME}: FIPS is OFF"
		cipher_list="A B C D E F :C001 :C002 :C003 :C004 :C005 :C006 :C007 :C008 :C009 :C00A :C010 :C011 :C012 :C013 :C014 c d e f g i j k l m n v y z"
	fi
}

############################## set_freebl ##############################
# local shell function to set freebl - sets temporary path for libraries
########################################################################
set_freebl()
{
	if [ "${freebl}" = "${FREEBL_DEFAULT}" ] ; then
		LD_LIBRARY_PATH="${OLD_LIBRARY_PATH}"
		export LD_LIBRARY_PATH
	else
		if [ -d "${TMP_LIBDIR}" ] ; then
			rm -rf ${TMP_LIBDIR}
		fi

		mkdir ${TMP_LIBDIR}
		[ $? -ne 0 ] && html_failed "Create temp directory" && return 1

		cp ${DIST}/${OBJDIR}/lib/*.so ${DIST}/${OBJDIR}/lib/*.chk ${TMP_LIBDIR}
		[ $? -ne 0 ] && html_failed "Copy libraries to temp directory" && return 1
		
		echo "${SCRIPTNAME}: Using ${freebl} instead of ${FREEBL_DEFAULT}"

		mv ${TMP_LIBDIR}/${FREEBL_DEFAULT}.so ${TMP_LIBDIR}/${FREEBL_DEFAULT}.so.orig
		[ $? -ne 0 ] && html_failed "Move ${FREEBL_DEFAULT}.so -> ${FREEBL_DEFAULT}.so.orig" && return 1

		cp ${TMP_LIBDIR}/${freebl}.so ${TMP_LIBDIR}/${FREEBL_DEFAULT}.so
		[ $? -ne 0 ] && html_failed "Copy ${freebl}.so -> ${FREEBL_DEFAULT}.so" && return 1

		mv ${TMP_LIBDIR}/${FREEBL_DEFAULT}.chk ${TMP_LIBDIR}/${FREEBL_DEFAULT}.chk.orig
		[ $? -ne 0 ] && html_failed "Move ${FREEBL_DEFAULT}.chk -> ${FREEBL_DEFAULT}.chk.orig" && return 1

		cp ${TMP_LIBDIR}/${freebl}.chk ${TMP_LIBDIR}/${FREEBL_DEFAULT}.chk
		[ $? -ne 0 ] && html_failed "Copy ${freebl}.chk to temp directory" && return 1

		echo "ls -l ${TMP_LIBDIR}"
		ls -l ${TMP_LIBDIR}

		LD_LIBRARY_PATH="${TMP_LIBDIR}"
		export LD_LIBRARY_PATH
	fi

	return 0
}

############################# clear_freebl #############################
# local shell function to set default library path and clear temporary 
# directory for libraries created by function set_freebl 
########################################################################
clear_freebl()
{
	LD_LIBRARY_PATH="${OLD_LIBRARY_PATH}"
	export LD_LIBRARY_PATH

	if [ -d "${TMP_LIBDIR}" ] ; then
		rm -rf ${TMP_LIBDIR}
	fi
}

############################ run_command_dbx ###########################
# local shell function to run command under dbx tool
########################################################################
run_command_dbx()
{
	COMMAND=$1
	shift
	ATTR=$*
	
	COMMAND=`which ${COMMAND}`
	
	echo "dbxenv follow_fork_mode parent" > ${DBXCMD}
	echo "dbxenv rtc_mel_at_exit verbose" >> ${DBXCMD}
	echo "dbxenv rtc_biu_at_exit verbose" >> ${DBXCMD}
	echo "check -memuse -match 16 -frames 16" >> ${DBXCMD}
	echo "run ${ATTR}" >> ${DBXCMD}
	
	export NSS_DISABLE_ARENA_FREE_LIST=1
	
	echo "${SCRIPTNAME}: -------- Running ${COMMAND} under DBX:"
	echo "${DBX} ${COMMAND}"
	echo "${SCRIPTNAME}: -------- DBX commands:"
	cat ${DBXCMD}
	
	( ${DBX} ${COMMAND} < ${DBXCMD} > ${DBXOUT} 2> ${DBXERR} )
	grep -v Reading ${DBXOUT} 1>&2
	cat ${DBXERR}
	
	unset NSS_DISABLE_ARENA_FREE_LIST
	
	grep "exit code is" ${DBXOUT}
	grep "exit code is 0" ${DBXOUT} > /dev/null
	return $?
}

######################### run_command_valgrind #########################
# local shell function to run command under valgrind tool
########################################################################
run_command_valgrind()
{
	COMMAND=$1
	shift
	ATTR=$*
	
	export NSS_DISABLE_ARENA_FREE_LIST=1
	
	echo "${SCRIPTNAME}: -------- Running ${COMMAND} under Valgrind:"
	echo "${VALGRIND} --tool=memcheck --leak-check=yes --show-reachable=yes --partial-loads-ok=yes --leak-resolution=high --num-callers=50 ${COMMAND} ${ATTR}"
	echo "Running: ${COMMAND} ${ATTR}" 1>&2
	${VALGRIND} --tool=memcheck --leak-check=yes --show-reachable=yes --partial-loads-ok=yes --leak-resolution=high --num-callers=50 ${COMMAND} ${ATTR} 1>&2
	ret=$?
	echo "==0=="
	
	unset NSS_DISABLE_ARENA_FREE_LIST
	
	return $ret
}

############################# run_selfserv #############################
# local shell function to start selfserv
########################################################################
run_selfserv()
{
	echo "PATH=${PATH}"
	echo "LD_LIBRARY_PATH=${LD_LIBRARY_PATH}"
	echo "${SCRIPTNAME}: -------- Running selfserv:"
	echo "selfserv ${SELFSERV_ATTR}"
	${BINDIR}/selfserv ${SELFSERV_ATTR}
	ret=$?
	if [ $ret -ne 0 ]; then
		html_failed "${LOGNAME}: Selfserv"
		echo "${SCRIPTNAME} ${LOGNAME}: " \
			"Selfserv produced a returncode of ${ret} - FAILED"
	fi
}

########################### run_selfserv_dbg ###########################
# local shell function to start selfserv under debug tool
########################################################################
run_selfserv_dbg()
{
	echo "PATH=${PATH}"
	echo "LD_LIBRARY_PATH=${LD_LIBRARY_PATH}"
	${RUN_COMMAND_DBG} ${BINDIR}/selfserv ${SERVER_OPTION} ${SELFSERV_ATTR}
	ret=$?
	if [ $ret -ne 0 ]; then
		html_failed "${LOGNAME}: Selfserv"
		echo "${SCRIPTNAME} ${LOGNAME}: " \
			"Selfserv produced a returncode of ${ret} - FAILED"
	fi
}

############################# run_strsclnt #############################
# local shell function to run strsclnt for all ciphers and send stop
# command to selfserv over tstclnt
########################################################################
run_strsclnt()
{
	for cipher in ${cipher_list}; do
		VMIN="ssl3"
		VMAX=
		case "${cipher}" in
		A|B|C|D|E|F)
			# Enable SSL 2 only for SSL 2 cipher suites.
			VMIN="ssl2"
			;;
		f|g)
			# TLS 1.1 disallows export cipher suites.
			VMAX="tls1.0"
			;;
		esac
		ATTR="${STRSCLNT_ATTR} -C ${cipher} -V ${VMIN}:${VMAX}"
		echo "${SCRIPTNAME}: -------- Trying cipher ${cipher}:"
		echo "strsclnt ${ATTR}"
		${BINDIR}/strsclnt ${ATTR}
		ret=$?
		if [ $ret -ne 0 ]; then
			html_failed "${LOGNAME}: Strsclnt with cipher ${cipher}"
			echo "${SCRIPTNAME} ${LOGNAME}: " \
				"Strsclnt produced a returncode of ${ret} - FAILED"
		fi
	done
	
	echo "${SCRIPTNAME}: -------- Stopping server:"
	echo "tstclnt ${TSTCLNT_ATTR} < ${REQUEST_FILE}"
	${BINDIR}/tstclnt ${TSTCLNT_ATTR} < ${REQUEST_FILE}
	ret=$?
	if [ $ret -ne 0 ]; then
		html_failed "${LOGNAME}: Tstclnt"
		echo "${SCRIPTNAME} ${LOGNAME}: " \
			"Tstclnt produced a returncode of ${ret} - FAILED"
	fi
	
	sleep 20
	kill $(jobs -p) 2> /dev/null
}

########################### run_strsclnt_dbg ###########################
# local shell function to run strsclnt under debug tool for all ciphers 
# and send stop command to selfserv over tstclnt
########################################################################
run_strsclnt_dbg()
{
	for cipher in ${cipher_list}; do
		VMIN="ssl3"
		VMAX=
		case "${cipher}" in
		A|B|C|D|E|F)
			# Enable SSL 2 only for SSL 2 cipher suites.
			VMIN="ssl2"
			;;
		f|g)
			# TLS 1.1 disallows export cipher suites.
			VMAX="tls1.0"
			;;
		esac
		ATTR="${STRSCLNT_ATTR} -C ${cipher} -V ${VMIN}:${VMAX}"
		${RUN_COMMAND_DBG} ${BINDIR}/strsclnt ${CLIENT_OPTION} ${ATTR}
		ret=$?
		if [ $ret -ne 0 ]; then
			html_failed "${LOGNAME}: Strsclnt with cipher ${cipher}"
			echo "${SCRIPTNAME} ${LOGNAME}: " \
				"Strsclnt produced a returncode of ${ret} - FAILED"
		fi
	done
	
	echo "${SCRIPTNAME}: -------- Stopping server:"
	echo "tstclnt ${TSTCLNT_ATTR} < ${REQUEST_FILE}"
	${BINDIR}/tstclnt ${TSTCLNT_ATTR} < ${REQUEST_FILE}
	ret=$?
	if [ $ret -ne 0 ]; then
		html_failed "${LOGNAME}: Tstclnt"
		echo "${SCRIPTNAME} ${LOGNAME}: " \
			"Tstclnt produced a returncode of ${ret} - FAILED"
	fi
	
	kill $(jobs -p) 2> /dev/null
}

stat_clear()
{
	stat_minbytes=9999999
	stat_maxbytes=0
	stat_minblocks=9999999
	stat_maxblocks=0
	stat_bytes=0
	stat_blocks=0
	stat_runs=0
}

stat_add()
{
	read hash lbytes bytes_str lblocks blocks_str in_str lruns runs_str \
		minbytes minbytes_str maxbytes maxbytes_str minblocks \
		minblocks_str maxblocks maxblocks_str rest < ${TMP_COUNT} 
	rm ${TMP_COUNT}
	
	tbytes=`expr ${tbytes} + ${lbytes}`
	tblocks=`expr ${tblocks} + ${lblocks}`
	truns=`expr ${truns} + ${lruns}`
	
	if [ ${stat_minbytes} -gt ${minbytes} ]; then
		stat_minbytes=${minbytes}
	fi
			
	if [ ${stat_maxbytes} -lt ${maxbytes} ]; then
		stat_maxbytes=${maxbytes}
	fi
			
	if [ ${stat_minblocks} -gt ${minblocks} ]; then
		stat_minblocks=${minblocks}
	fi
			
	if [ ${stat_maxblocks} -lt ${maxblocks} ]; then
		stat_maxblocks=${maxblocks}
	fi
			
	stat_bytes=`expr ${stat_bytes} + ${lbytes}`
	stat_blocks=`expr ${stat_blocks} + ${lblocks}`
	stat_runs=`expr ${stat_runs} + ${lruns}`
}

stat_print()
{
	if [ ${stat_runs} -gt 0 ]; then
		stat_avgbytes=`expr "${stat_bytes}" / "${stat_runs}"`
		stat_avgblocks=`expr "${stat_blocks}" / "${stat_runs}"`
		
		echo
		echo "$1 statistics:"
		echo "Leaked bytes: ${stat_minbytes} min, ${stat_avgbytes} avg, ${stat_maxbytes} max"
		echo "Leaked blocks: ${stat_minblocks} min, ${stat_avgblocks} avg, ${stat_maxblocks} max"
		echo "Total runs: ${stat_runs}"
		echo
	fi
}

########################## run_ciphers_server ##########################
# local shell function to test server part of code (selfserv)
########################################################################
run_ciphers_server()
{
	html_head "Memory leak checking - server"
	
	stat_clear
	
	client_mode="NORMAL"	
	for server_mode in ${MODE_LIST}; do
		set_test_mode
		
		for freebl in ${FREEBL_LIST}; do
			set_freebl || continue
			
			LOGNAME=server-${BIT_NAME}-${freebl}-${server_mode}
			LOGFILE=${LOGDIR}/${LOGNAME}.log
			echo "Running ${LOGNAME}"
			
			(
			    run_selfserv_dbg 2>> ${LOGFILE} &
			    sleep 5
			    run_strsclnt
			)
			
			sleep 20
			clear_freebl
			
			log_parse
			ret=$?
			
			html_msg ${ret} 0 "${LOGNAME}" "produced a returncode of $ret, expected is 0"
		done
	done
	
	stat_print "Selfserv"
	
	html "</TABLE><BR>"
}

########################## run_ciphers_client ##########################
# local shell function to test client part of code (strsclnt)
########################################################################
run_ciphers_client()
{
	html_head "Memory leak checking - client"
	
	stat_clear
	
	server_mode="NORMAL"
	for client_mode in ${MODE_LIST}; do
		set_test_mode
		
		for freebl in ${FREEBL_LIST}; do
			set_freebl || continue
			
			LOGNAME=client-${BIT_NAME}-${freebl}-${client_mode}
			LOGFILE=${LOGDIR}/${LOGNAME}.log
			echo "Running ${LOGNAME}"
			
			(
			    run_selfserv &
			    sleep 5
			    run_strsclnt_dbg 2>> ${LOGFILE}
			)
			
			sleep 20
			clear_freebl
			
			log_parse
			ret=$?
			html_msg ${ret} 0 "${LOGNAME}" "produced a returncode of $ret, expected is 0"
		done
	done
	
	stat_print "Strsclnt"
	
	html "</TABLE><BR>"
}

########################## parse_logfile_dbx ###########################
# local shell function to parse and process logs from dbx
########################################################################
parse_logfile_dbx()
{
	${AWK} '
	BEGIN {
		in_mel = 0
		mel_line = 0
		bytes = 0
		lbytes = 0
		minbytes = 9999999
		maxbytes = 0
		blocks = 0
		lblocks = 0
		minblocks = 9999999
		maxblocks = 0
		runs = 0
		stack_string = ""
		bin_name = ""
	}
	/Memory Leak \(mel\):/ ||
	/Possible memory leak -- address in block \(aib\):/ ||
	/Block in use \(biu\):/ {
		in_mel = 1
		stack_string = ""
		next
	}
	in_mel == 1 && /^$/ {
		print bin_name stack_string
		in_mel = 0
		mel_line = 0
		next
	}
	in_mel == 1 {
		mel_line += 1
	}
	/Found leaked block of size/ {
		bytes += $6
		blocks += 1
		next
	}
	/Found .* leaked blocks/ {
		bytes += $8
		blocks += $2
		next
	}
	/Found block of size/ {
		bytes += $5
		blocks += 1
		next
	}
	/Found .* blocks totaling/ {
		bytes += $5
		blocks += $2
		next
	}
	mel_line > 2 {
		gsub(/\(\)/, "")
		new_line = $2
		stack_string = "/" new_line stack_string
		next
	}
	/^Running: / {
		bin_name = $2
		next
	}
	/execution completed/ {
		runs += 1
		lbytes += bytes
		minbytes = (minbytes < bytes) ? minbytes : bytes
		maxbytes = (maxbytes > bytes) ? maxbytes : bytes
		bytes = 0
		lblocks += blocks
		minblocks = (minblocks < blocks) ? minblocks : blocks
		maxblocks = (maxblocks > blocks) ? maxblocks : blocks
		blocks = 0
		next
	}
	END {
		print "# " lbytes " bytes " lblocks " blocks in " runs " runs " \
		minbytes " minbytes " maxbytes " maxbytes " minblocks " minblocks " \
		maxblocks " maxblocks " > "/dev/stderr"
	}' 2> ${TMP_COUNT}
	
	stat_add
}

######################## parse_logfile_valgrind ########################
# local shell function to parse and process logs from valgrind
########################################################################
parse_logfile_valgrind()
{
	${AWK} '
	BEGIN {
		in_mel = 0
		in_sum = 0
		bytes = 0
		lbytes = 0
		minbytes = 9999999
		maxbytes = 0
		blocks = 0
		lblocks = 0
		minblocks = 9999999
		maxblocks = 0
		runs = 0
		stack_string = ""
		bin_name = "" 
	}
	!/==[0-9]*==/ { 
		if ( $1 == "Running:" ) 
			bin_name = $2
			bin_nf = split(bin_name, bin_fields, "/")
			bin_name = bin_fields[bin_nf]
		next
	}
	/blocks are/ {
		in_mel = 1
		stack_string = ""
		next
	}
	/LEAK SUMMARY/ {
		in_sum = 1
		next
	}
	/^==[0-9]*== *$/ { 
		if (in_mel)
			print bin_name stack_string
		if (in_sum) {
			runs += 1
			lbytes += bytes
			minbytes = (minbytes < bytes) ? minbytes : bytes
			maxbytes = (maxbytes > bytes) ? maxbytes : bytes
			bytes = 0
			lblocks += blocks
			minblocks = (minblocks < blocks) ? minblocks : blocks
			maxblocks = (maxblocks > blocks) ? maxblocks : blocks
			blocks = 0
		}
		in_sum = 0
		in_mel = 0
		next
	}
	in_mel == 1 {	
		new_line = $4
		if ( new_line == "(within")
			new_line = "*"
		stack_string = "/" new_line stack_string
	}
	in_sum == 1 {
		for (i = 2; i <= NF; i++) {
			if ($i == "bytes") {
				str = $(i - 1)
				gsub(",", "", str)
				bytes += str
			}
			if ($i == "blocks.") {
				str = $(i - 1)
				gsub(",", "", str)
				blocks += str
			}
		}
	}
	END {
		print "# " lbytes " bytes " lblocks " blocks in " runs " runs " \
		minbytes " minbytes " maxbytes " maxbytes " minblocks " minblocks " \
		maxblocks " maxblocks " > "/dev/stderr"
	}' 2> ${TMP_COUNT}
	
	stat_add
}

############################# check_ignored ############################
# local shell function to check all stacks if they are not ignored
########################################################################
check_ignored()
{
	${AWK} -F/ '
	BEGIN {
		ignore = "'${IGNORED_STACKS}'"
		# read in the ignore file
		BUGNUM = ""
		count = 0
		new = 0
		while ((getline line < ignore) > 0)  {
			if (line ~ "^#[0-9]+") {
				BUGNUM = line
			} else if (line ~ "^#") {
				continue
			} else if (line == "") {
				continue
			} else {
				bugnum_array[count] = BUGNUM
				# Create a regular expression for the ignored stack:
				# replace * with % so we can later replace them with regular expressions
				# without messing up everything (the regular expressions contain *)
				gsub("\\*", "%", line)
				# replace %% with .*
				gsub("%%", ".*", line)
				# replace % with [^/]*
				gsub("%", "[^/]*", line)
				# add ^ at the beginning
				# add $ at the end
				line_array[count] = "^" line "$"
				count++
			}
		}
	}
	{
		match_found = 0
		# Look for matching ignored stack
		for (i = 0; i < count; i++) {
			if ($0 ~ line_array[i]) {
				# found a match
				match_found = 1
				bug_found = bugnum_array[i]
				break
			}
		}
		# Process result
		if (match_found == 1 ) {
				if (bug_found != "") {
					print "IGNORED STACK (" bug_found "): " $0
				} else {
					print "IGNORED STACK: " $0
				}
		} else {
				print "NEW STACK: " $0
				new = 1
		}
	}
	END {
		exit new
	}'
	ret=$?
	return $ret
}

############################### parse_log ##############################
# local shell function to parse log file
########################################################################
log_parse()
{
	${PARSE_LOGFILE} < ${LOGFILE} > ${TMP_STACKS}
	echo "${SCRIPTNAME}: Processing log ${LOGNAME}:" > ${TMP_SORTED}
	cat ${TMP_STACKS} | sort -u | check_ignored >> ${TMP_SORTED}
	ret=$?
	echo >> ${TMP_SORTED}
	
	cat ${TMP_SORTED} | tee -a ${FOUNDLEAKS}
	rm ${TMP_STACKS} ${TMP_SORTED}
	
	return ${ret}
}

############################## cnt_total ###############################
# local shell function to count total leaked bytes
########################################################################
cnt_total()
{
	echo ""
	echo "TinderboxPrint:${OPT} Lk bytes: ${tbytes}"
	echo "TinderboxPrint:${OPT} Lk blocks: ${tblocks}"
	echo "TinderboxPrint:${OPT} # of runs: ${truns}"
	echo ""
}

############################### run_ocsp ###############################
# local shell function to run ocsp tests
########################################################################
run_ocsp()
{
	stat_clear
	
	cd ${QADIR}/iopr
	. ./ocsp_iopr.sh
	ocsp_iopr_run
	
	stat_print "Ocspclnt"
}

############################## run_chains ##############################
# local shell function to run PKIX certificate chains tests
########################################################################
run_chains()
{
    stat_clear

    LOGNAME="chains"
    LOGFILE=${LOGDIR}/chains.log

    . ${QADIR}/chains/chains.sh

    stat_print "Chains"
}

############################## run_chains ##############################
# local shell function to run memory leak tests
#
# NSS_MEMLEAK_TESTS - list of tests to run, if not defined before,
# then is redefined to default list 
########################################################################
memleak_run_tests()
{
    nss_memleak_tests="ssl_server ssl_client chains ocsp"
    NSS_MEMLEAK_TESTS="${NSS_MEMLEAK_TESTS:-$nss_memleak_tests}"

    for MEMLEAK_TEST in ${NSS_MEMLEAK_TESTS}
    do
        case "${MEMLEAK_TEST}" in
        "ssl_server")
            run_ciphers_server
            ;;
        "ssl_client")
            run_ciphers_client
            ;;
        "chains")
            run_chains
            ;;
        "ocsp")
            run_ocsp
            ;;
        esac
    done
}

################################# main #################################

memleak_init
memleak_run_tests
cnt_total
memleak_cleanup