memleak.sh: -------- Trying cipher A under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C A ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C A ciotat.red.iplanet.com (process id 8660) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher B under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C B ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C B ciotat.red.iplanet.com (process id 8684) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher C under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C C ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C C ciotat.red.iplanet.com (process id 8708) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher D under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C D ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C D ciotat.red.iplanet.com (process id 8732) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher E under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C E ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C E ciotat.red.iplanet.com (process id 8756) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher F under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C F ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C F ciotat.red.iplanet.com (process id 8780) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126b28 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitLinker() at 0xffffffff69118710 [3] _PR_InitStuff() at 0xffffffff69122064 [4] main() at 0x100009344 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C001 under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C001 ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C001 ciotat.red.iplanet.com (process id 8804) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C002 under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C002 ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C002 ciotat.red.iplanet.com (process id 8828) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126b28 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitLinker() at 0xffffffff69118710 [3] _PR_InitStuff() at 0xffffffff69122064 [4] main() at 0x100009344 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C003 under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C003 ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C003 ciotat.red.iplanet.com (process id 8852) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126b28 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitLinker() at 0xffffffff69118710 [3] _PR_InitStuff() at 0xffffffff69122064 [4] main() at 0x100009344 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C004 under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C004 ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C004 ciotat.red.iplanet.com (process id 8876) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C005 under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C005 ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C005 ciotat.red.iplanet.com (process id 8900) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C006 under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C006 ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C006 ciotat.red.iplanet.com (process id 8924) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C007 under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C007 ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C007 ciotat.red.iplanet.com (process id 8948) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C008 under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C008 ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C008 ciotat.red.iplanet.com (process id 8972) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C009 under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C009 ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C009 ciotat.red.iplanet.com (process id 8996) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C00A under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C00A ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C00A ciotat.red.iplanet.com (process id 9020) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C010 under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C010 ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C010 ciotat.red.iplanet.com (process id 9044) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C011 under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C011 ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C011 ciotat.red.iplanet.com (process id 9068) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C012 under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C012 ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C012 ciotat.red.iplanet.com (process id 9092) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126b28 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitLinker() at 0xffffffff69118710 [3] _PR_InitStuff() at 0xffffffff69122064 [4] main() at 0x100009344 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C013 under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C013 ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C013 ciotat.red.iplanet.com (process id 9116) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C014 under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C014 ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C :C014 ciotat.red.iplanet.com (process id 9140) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher c under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C c ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C c ciotat.red.iplanet.com (process id 9164) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher d under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C d ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C d ciotat.red.iplanet.com (process id 9188) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher e under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C e ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C e ciotat.red.iplanet.com (process id 9212) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher f under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C f ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C f ciotat.red.iplanet.com (process id 9236) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126b28 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitLinker() at 0xffffffff69118710 [3] _PR_InitStuff() at 0xffffffff69122064 [4] main() at 0x100009344 execution completed, exit code is 0 memleak.sh: -------- Trying cipher g under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C g ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C g ciotat.red.iplanet.com (process id 9261) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher i under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C i ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C i ciotat.red.iplanet.com (process id 9285) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126b28 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitLinker() at 0xffffffff69118710 [3] _PR_InitStuff() at 0xffffffff69122064 [4] main() at 0x100009344 execution completed, exit code is 0 memleak.sh: -------- Trying cipher j under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C j ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C j ciotat.red.iplanet.com (process id 9309) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher k under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C k ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C k ciotat.red.iplanet.com (process id 9333) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126b28 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitLinker() at 0xffffffff69118710 [3] _PR_InitStuff() at 0xffffffff69122064 [4] main() at 0x100009344 execution completed, exit code is 0 memleak.sh: -------- Trying cipher l under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C l ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C l ciotat.red.iplanet.com (process id 9357) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher m under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C m ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C m ciotat.red.iplanet.com (process id 9381) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher n under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C n ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C n ciotat.red.iplanet.com (process id 9405) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher v under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C v ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C v ciotat.red.iplanet.com (process id 9429) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher y under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C y ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C y ciotat.red.iplanet.com (process id 9454) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126d08 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] pr_LoadLibraryByPathname() at 0xffffffff69118dc4 [3] 0xffffffff59938184 [4] 0xffffffff599381f0 [5] PR_CallOnce() at 0xffffffff69122c88 [6] 0xffffffff5993a478 [7] 0xffffffff59919b30 [8] 0xffffffff59919dd0 [9] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [10] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [11] SECMOD_LoadModule() at 0xffffffff6cd5b020 [12] 0xffffffff6cd27d64 [13] NSS_Initialize() at 0xffffffff6cd287e4 [14] main() at 0x100009a44 execution completed, exit code is 0 memleak.sh: -------- Trying cipher z under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C z ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C z ciotat.red.iplanet.com (process id 9478) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100181458 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5378 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (26.18% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (19.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.45% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.76% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10018d3a8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x1001b6968 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.68% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 88 bytes at address 0x10018f1e8 (1.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.45% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x10018f178 (1.34% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.19% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 48 bytes (0.89% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 3 blocks totaling 48 bytes (0.89% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.80% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 40 bytes at address 0x100126b28 (0.74% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitLinker() at 0xffffffff69118710 [3] _PR_InitStuff() at 0xffffffff69122064 [4] main() at 0x100009344 execution completed, exit code is 0 PATH=.:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/lib:/bin:/usr/bin:/opt/sfw/bin:/usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin:/usr/ucb:/usr/ccs/bin LD_PATH=/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Stopping server: tstclnt -p 8443 -h ciotat.red.iplanet.com -c j -f -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss < /export/tinderbox/SunOS_5.9/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=ciotat.red.iplanet.com,E=ciotat.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF