memleak.sh: -------- Trying cipher c under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C c ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C c ciotat.red.iplanet.com (process id 10920) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100165c28 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5455 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (25.81% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (18.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.29% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.69% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 8 blocks totaling 256 bytes (4.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100199da8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 144 bytes at address 0x100170798 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 98 bytes at address 0x10012b6a8 (1.80% of total) At time of allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] pr_LoadLibraryByPathname() at 0xffffffff69118e4c [3] 0xffffffff59938070 [4] 0xffffffff599380ec [5] 0xffffffff599381f0 [6] PR_CallOnce() at 0xffffffff69122c88 [7] 0xffffffff5993a478 [8] 0xffffffff59919b30 [9] 0xffffffff5990fa1c [10] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [11] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [12] SECMOD_LoadModule() at 0xffffffff6cd5b020 [13] 0xffffffff6cd27d64 [14] NSS_Initialize() at 0xffffffff6cd287e4 [15] main() at 0x100009a44 Block in use (biu): Found block of size 88 bytes at address 0x1001725d8 (1.61% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.43% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x100172568 (1.32% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.17% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 48 bytes (0.88% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 3 blocks totaling 48 bytes (0.88% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.79% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 execution completed, exit code is 1 memleak.sh: -------- Trying cipher d under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C d ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C d ciotat.red.iplanet.com (process id 10944) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100165c28 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5455 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (25.81% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (18.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.29% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.69% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100170798 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100199da8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 98 bytes at address 0x10012b6a8 (1.80% of total) At time of allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] pr_LoadLibraryByPathname() at 0xffffffff69118e4c [3] 0xffffffff59938070 [4] 0xffffffff599380ec [5] 0xffffffff599381f0 [6] PR_CallOnce() at 0xffffffff69122c88 [7] 0xffffffff5993a478 [8] 0xffffffff59919b30 [9] 0xffffffff5990fa1c [10] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [11] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [12] SECMOD_LoadModule() at 0xffffffff6cd5b020 [13] 0xffffffff6cd27d64 [14] NSS_Initialize() at 0xffffffff6cd287e4 [15] main() at 0x100009a44 Block in use (biu): Found block of size 88 bytes at address 0x1001725d8 (1.61% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.43% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x100172568 (1.32% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.17% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.88% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.88% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.79% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 execution completed, exit code is 1 memleak.sh: -------- Trying cipher e under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C e ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C e ciotat.red.iplanet.com (process id 10968) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100165c78 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5455 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (25.81% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (18.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.29% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.69% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100199da8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100170768 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 98 bytes at address 0x10012b6a8 (1.80% of total) At time of allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] pr_LoadLibraryByPathname() at 0xffffffff69118e4c [3] 0xffffffff59938070 [4] 0xffffffff599380ec [5] 0xffffffff599381f0 [6] PR_CallOnce() at 0xffffffff69122c88 [7] 0xffffffff5993a478 [8] 0xffffffff59919b30 [9] 0xffffffff5990fa1c [10] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [11] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [12] SECMOD_LoadModule() at 0xffffffff6cd5b020 [13] 0xffffffff6cd27d64 [14] NSS_Initialize() at 0xffffffff6cd287e4 [15] main() at 0x100009a44 Block in use (biu): Found block of size 88 bytes at address 0x1001725d8 (1.61% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.43% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x100172568 (1.32% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.17% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 48 bytes (0.88% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 3 blocks totaling 48 bytes (0.88% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.79% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 execution completed, exit code is 1 memleak.sh: -------- Trying cipher i under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C i ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C i ciotat.red.iplanet.com (process id 10992) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100165c78 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5455 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (25.81% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (18.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.29% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.69% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100199da8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100170768 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 98 bytes at address 0x10012b6a8 (1.80% of total) At time of allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] pr_LoadLibraryByPathname() at 0xffffffff69118e4c [3] 0xffffffff59938070 [4] 0xffffffff599380ec [5] 0xffffffff599381f0 [6] PR_CallOnce() at 0xffffffff69122c88 [7] 0xffffffff5993a478 [8] 0xffffffff59919b30 [9] 0xffffffff5990fa1c [10] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [11] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [12] SECMOD_LoadModule() at 0xffffffff6cd5b020 [13] 0xffffffff6cd27d64 [14] NSS_Initialize() at 0xffffffff6cd287e4 [15] main() at 0x100009a44 Block in use (biu): Found block of size 88 bytes at address 0x1001725d8 (1.61% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.43% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x100172568 (1.32% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.17% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 48 bytes (0.88% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 3 blocks totaling 48 bytes (0.88% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.79% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 execution completed, exit code is 1 memleak.sh: -------- Trying cipher j under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C j ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C j ciotat.red.iplanet.com (process id 11016) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100165c78 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5455 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (25.81% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (18.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.29% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.69% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100170768 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100199da8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 98 bytes at address 0x10012b6a8 (1.80% of total) At time of allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] pr_LoadLibraryByPathname() at 0xffffffff69118e4c [3] 0xffffffff59938070 [4] 0xffffffff599380ec [5] 0xffffffff599381f0 [6] PR_CallOnce() at 0xffffffff69122c88 [7] 0xffffffff5993a478 [8] 0xffffffff59919b30 [9] 0xffffffff5990fa1c [10] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [11] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [12] SECMOD_LoadModule() at 0xffffffff6cd5b020 [13] 0xffffffff6cd27d64 [14] NSS_Initialize() at 0xffffffff6cd287e4 [15] main() at 0x100009a44 Block in use (biu): Found block of size 88 bytes at address 0x1001725d8 (1.61% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.43% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x100172568 (1.32% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.17% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 48 bytes (0.88% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 3 blocks totaling 48 bytes (0.88% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.79% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 execution completed, exit code is 1 memleak.sh: -------- Trying cipher k under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C k ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C k ciotat.red.iplanet.com (process id 11040) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100165c28 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5455 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (25.81% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (18.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.29% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.69% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100199da8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100170798 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 98 bytes at address 0x10012b6a8 (1.80% of total) At time of allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] pr_LoadLibraryByPathname() at 0xffffffff69118e4c [3] 0xffffffff59938070 [4] 0xffffffff599380ec [5] 0xffffffff599381f0 [6] PR_CallOnce() at 0xffffffff69122c88 [7] 0xffffffff5993a478 [8] 0xffffffff59919b30 [9] 0xffffffff5990fa1c [10] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [11] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [12] SECMOD_LoadModule() at 0xffffffff6cd5b020 [13] 0xffffffff6cd27d64 [14] NSS_Initialize() at 0xffffffff6cd287e4 [15] main() at 0x100009a44 Block in use (biu): Found block of size 88 bytes at address 0x1001725d8 (1.61% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.43% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x100172568 (1.32% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.17% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 48 bytes (0.88% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 3 blocks totaling 48 bytes (0.88% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.79% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 execution completed, exit code is 1 memleak.sh: -------- Trying cipher n under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C n ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C n ciotat.red.iplanet.com (process id 11064) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100165c78 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5455 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (25.81% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (18.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.29% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.69% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100170768 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100199da8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 98 bytes at address 0x10012b6a8 (1.80% of total) At time of allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] pr_LoadLibraryByPathname() at 0xffffffff69118e4c [3] 0xffffffff59938070 [4] 0xffffffff599380ec [5] 0xffffffff599381f0 [6] PR_CallOnce() at 0xffffffff69122c88 [7] 0xffffffff5993a478 [8] 0xffffffff59919b30 [9] 0xffffffff5990fa1c [10] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [11] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [12] SECMOD_LoadModule() at 0xffffffff6cd5b020 [13] 0xffffffff6cd27d64 [14] NSS_Initialize() at 0xffffffff6cd287e4 [15] main() at 0x100009a44 Block in use (biu): Found block of size 88 bytes at address 0x1001725d8 (1.61% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.43% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x100172568 (1.32% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.17% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 48 bytes (0.88% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 3 blocks totaling 48 bytes (0.88% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.79% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 execution completed, exit code is 1 memleak.sh: -------- Trying cipher v under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C v ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C v ciotat.red.iplanet.com (process id 11088) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100165c78 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5455 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (25.81% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (18.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.29% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.69% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 8 blocks totaling 256 bytes (4.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100170768 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100199da8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 98 bytes at address 0x10012b6a8 (1.80% of total) At time of allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] pr_LoadLibraryByPathname() at 0xffffffff69118e4c [3] 0xffffffff59938070 [4] 0xffffffff599380ec [5] 0xffffffff599381f0 [6] PR_CallOnce() at 0xffffffff69122c88 [7] 0xffffffff5993a478 [8] 0xffffffff59919b30 [9] 0xffffffff5990fa1c [10] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [11] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [12] SECMOD_LoadModule() at 0xffffffff6cd5b020 [13] 0xffffffff6cd27d64 [14] NSS_Initialize() at 0xffffffff6cd287e4 [15] main() at 0x100009a44 Block in use (biu): Found block of size 88 bytes at address 0x1001725d8 (1.61% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.43% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x100172568 (1.32% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.17% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 48 bytes (0.88% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 3 blocks totaling 48 bytes (0.88% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.79% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 execution completed, exit code is 1 memleak.sh: -------- Trying cipher y under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C y ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C y ciotat.red.iplanet.com (process id 11112) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100165c78 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5455 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (25.81% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (18.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.29% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.69% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 8 blocks totaling 256 bytes (4.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100199da8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100170768 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 98 bytes at address 0x10012b6a8 (1.80% of total) At time of allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] pr_LoadLibraryByPathname() at 0xffffffff69118e4c [3] 0xffffffff59938070 [4] 0xffffffff599380ec [5] 0xffffffff599381f0 [6] PR_CallOnce() at 0xffffffff69122c88 [7] 0xffffffff5993a478 [8] 0xffffffff59919b30 [9] 0xffffffff5990fa1c [10] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [11] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [12] SECMOD_LoadModule() at 0xffffffff6cd5b020 [13] 0xffffffff6cd27d64 [14] NSS_Initialize() at 0xffffffff6cd287e4 [15] main() at 0x100009a44 Block in use (biu): Found block of size 88 bytes at address 0x1001725d8 (1.61% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.43% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x100172568 (1.32% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.17% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 3 blocks totaling 48 bytes (0.88% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 48 bytes (0.88% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.79% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 execution completed, exit code is 1 memleak.sh: -------- Trying cipher z under DBX: /usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/run_strsclnt29857.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C z ciotat.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.4' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss -c 1000 -C z ciotat.red.iplanet.com (process id 11136) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 144 bytes at address 0x100165c78 At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] 0xffffffff50925718 [4] 0xffffffff50924ca0 [5] 0xffffffff509259f8 [6] 0xffffffff50924390 [7] 0xffffffff5091e0b0 [8] pk11_FindObjectByTemplate() at 0xffffffff6cd57ac4 [9] pk11_isRootSlot() at 0xffffffff6cd65670 [10] PK11_InitSlot() at 0xffffffff6cd657f8 [11] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cfbc [12] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [13] SECMOD_LoadModule() at 0xffffffff6cd5b020 [14] 0xffffffff6cd27d64 [15] NSS_Initialize() at 0xffffffff6cd287e4 [16] main() at 0x100009a44 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 5455 bytes) Block in use (biu): Found 8 blocks totaling 1408 bytes (25.81% of total; avg block size 176) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 1024 bytes at address 0x100125678 (18.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] _PR_InitTPD() at 0xffffffff69118268 [3] _PR_InitStuff() at 0xffffffff69121ff4 [4] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 616 bytes (11.29% of total; avg block size 88) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 8 blocks totaling 256 bytes (4.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6b4 [3] ExpandMonitorCache() at 0xffffffff69117708 [4] _PR_InitCMon() at 0xffffffff69117b7c [5] _PR_InitStuff() at 0xffffffff69122044 [6] main() at 0x100009344 Block in use (biu): Found block of size 256 bytes at address 0x100125f68 (4.69% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691176d0 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129728 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] _PR_UnixInit() at 0xffffffff69137d14 [4] main() at 0x100009344 Block in use (biu): Found block of size 176 bytes at address 0x100129a08 (3.23% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewMonitor() at 0xffffffff6912e6e8 [3] OCSP_InitGlobal() at 0xffffffff6cd2ba70 [4] 0xffffffff6cd27b5c [5] NSS_Initialize() at 0xffffffff6cd287e4 [6] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100125eb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_InitCMon() at 0xffffffff69117b68 [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found block of size 144 bytes at address 0x100199da8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] __nss_InitLock() at 0xffffffff6cd84a38 [4] ssl_LookupSID() at 0xffffffff6f91f248 [5] ssl2_BeginClientHandshake() at 0xffffffff6f91c838 [6] ssl_Do1stHandshake() at 0xffffffff6f91fa90 [7] ssl_SecureSend() at 0xffffffff6f921bf8 [8] ssl_Send() at 0xffffffff6f927b24 [9] do_connects() at 0x1000077d0 [10] thread_wrapper() at 0x100005e0c [11] _pt_root() at 0xffffffff69135670 [12] _lwp_start() at 0xffffffff67d181a8 Block in use (biu): Found block of size 144 bytes at address 0x10012adb8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] InitializeArenas() at 0xffffffff6a500de0 [4] PR_CallOnce() at 0xffffffff69122c88 [5] LockArena() at 0xffffffff6a500e54 [6] PL_ArenaAllocate() at 0xffffffff6a500f5c [7] PORT_ArenaAlloc() at 0xffffffff6cd8d9f8 [8] secmod_NewModule() at 0xffffffff6cd5a858 [9] SECMOD_CreateModule() at 0xffffffff6cd5a938 [10] SECMOD_LoadModule() at 0xffffffff6cd5af38 [11] 0xffffffff6cd27d64 [12] NSS_Initialize() at 0xffffffff6cd287e4 [13] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100170768 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] PKIX_PL_Initialize() at 0xffffffff6ce26e1c [4] PKIX_Initialize() at 0xffffffff6cdd3ea4 [5] 0xffffffff6cd27e8c [6] NSS_Initialize() at 0xffffffff6cd287e4 [7] main() at 0x100009a44 Block in use (biu): Found block of size 144 bytes at address 0x100129678 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] PR_NewLock() at 0xffffffff6912e02c [3] _PR_UnixInit() at 0xffffffff69137cf8 [4] main() at 0x100009344 Block in use (biu): Found block of size 98 bytes at address 0x10012b6a8 (1.80% of total) At time of allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] pr_LoadLibraryByPathname() at 0xffffffff69118e4c [3] 0xffffffff59938070 [4] 0xffffffff599380ec [5] 0xffffffff599381f0 [6] PR_CallOnce() at 0xffffffff69122c88 [7] 0xffffffff5993a478 [8] 0xffffffff59919b30 [9] 0xffffffff5990fa1c [10] SECMOD_LoadPKCS11Module() at 0xffffffff6cd4cd70 [11] SECMOD_LoadModule() at 0xffffffff6cd5afc0 [12] SECMOD_LoadModule() at 0xffffffff6cd5b020 [13] 0xffffffff6cd27d64 [14] NSS_Initialize() at 0xffffffff6cd287e4 [15] main() at 0x100009a44 Block in use (biu): Found block of size 88 bytes at address 0x1001725d8 (1.61% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] fgetnetconfig() at 0xffffffff669344ec [3] getnetlist() at 0xffffffff66934270 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 78 bytes (1.43% of total; avg block size 11) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff669345b8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found block of size 72 bytes at address 0x100172568 (1.32% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xffffffff66934220 [2] setnetconfig() at 0xffffffff66925fc4 [3] __rpc_getconfip() at 0xffffffff6695f788 [4] getipnodebyname() at 0xffffffff66945150 [5] get_addr() at 0xffffffff65505de4 [6] getaddrinfo() at 0xffffffff65505ce4 [7] PR_GetAddrInfoByName() at 0xffffffff69124eec [8] client_main() at 0x100008308 [9] main() at 0x100009b38 Block in use (biu): Found block of size 64 bytes at address 0x100126708 (1.17% of total) At time of allocation, the call stack was: [1] calloc() at 0xffffffff6193ec40 [2] ExpandMonitorCache() at 0xffffffff691177e8 [3] _PR_InitCMon() at 0xffffffff69117b7c [4] _PR_InitStuff() at 0xffffffff69122044 [5] main() at 0x100009344 Block in use (biu): Found 7 blocks totaling 48 bytes (0.88% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934588 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 3 blocks totaling 48 bytes (0.88% of total; avg block size 16) At time of each allocation, the call stack was: [1] getlookups() at 0xffffffff669349b8 [2] fgetnetconfig() at 0xffffffff669345f8 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 Block in use (biu): Found 7 blocks totaling 43 bytes (0.79% of total; avg block size 6) At time of each allocation, the call stack was: [1] strdup() at 0xffffffff6195ba98 [2] fgetnetconfig() at 0xffffffff66934480 [3] getnetlist() at 0xffffffff66934288 [4] setnetconfig() at 0xffffffff66925fc4 [5] __rpc_getconfip() at 0xffffffff6695f788 [6] getipnodebyname() at 0xffffffff66945150 [7] get_addr() at 0xffffffff65505de4 [8] getaddrinfo() at 0xffffffff65505ce4 [9] PR_GetAddrInfoByName() at 0xffffffff69124eec [10] client_main() at 0x100008308 [11] main() at 0x100009b38 execution completed, exit code is 1 PATH=.:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/bin:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_64_OPT.OBJ/lib:/bin:/usr/bin:/opt/sfw/bin:/usr/dist/pkgs/sunstudio_sparc,v10.0/SUNWspro/prod/bin:/usr/ucb:/usr/ccs/bin LD_PATH=/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/tmp29857 memleak.sh: -------- Stopping server: tstclnt -p 8443 -h ciotat.red.iplanet.com -c j -f -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/ciotat.2/client_memleak -w nss < /export/tinderbox/SunOS_5.9/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=ciotat.red.iplanet.com,E=ciotat.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF