memleak.sh: -------- Trying cipher A under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C A aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C A aquash.red.iplanet.com (process id 15110) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher B under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C B aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C B aquash.red.iplanet.com (process id 15134) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher C under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C C aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C C aquash.red.iplanet.com (process id 15158) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 24 bytes at address 0x8084bf0 (0.73% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Trying cipher D under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C D aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C D aquash.red.iplanet.com (process id 15182) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 24 bytes at address 0x8084bf0 (0.73% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Trying cipher E under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C E aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C E aquash.red.iplanet.com (process id 15206) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 24 bytes at address 0x8084bf0 (0.73% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Trying cipher F under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C F aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C F aquash.red.iplanet.com (process id 15230) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C001 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C001 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C001 aquash.red.iplanet.com (process id 15254) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 24 bytes at address 0x8084bf0 (0.73% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C002 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C002 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C002 aquash.red.iplanet.com (process id 15278) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C003 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C003 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C003 aquash.red.iplanet.com (process id 15302) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C004 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C004 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C004 aquash.red.iplanet.com (process id 15326) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C005 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C005 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C005 aquash.red.iplanet.com (process id 15350) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C006 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C006 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C006 aquash.red.iplanet.com (process id 15374) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 24 bytes at address 0x8084bf0 (0.73% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C007 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C007 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C007 aquash.red.iplanet.com (process id 15398) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C008 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C008 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C008 aquash.red.iplanet.com (process id 15422) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C009 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C009 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C009 aquash.red.iplanet.com (process id 15446) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C00A under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C00A aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C00A aquash.red.iplanet.com (process id 15470) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C010 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C010 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C010 aquash.red.iplanet.com (process id 15494) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C011 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C011 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C011 aquash.red.iplanet.com (process id 15518) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C012 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C012 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C012 aquash.red.iplanet.com (process id 15542) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C013 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C013 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C013 aquash.red.iplanet.com (process id 15566) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C014 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C014 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C014 aquash.red.iplanet.com (process id 15590) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher c under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C c aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C c aquash.red.iplanet.com (process id 15614) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher d under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C d aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C d aquash.red.iplanet.com (process id 15638) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher e under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C e aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C e aquash.red.iplanet.com (process id 15662) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher f under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C f aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C f aquash.red.iplanet.com (process id 15686) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher g under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C g aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C g aquash.red.iplanet.com (process id 15710) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher i under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C i aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C i aquash.red.iplanet.com (process id 15734) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 24 bytes at address 0x8084bf0 (0.73% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Trying cipher j under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C j aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C j aquash.red.iplanet.com (process id 15758) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher k under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C k aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C k aquash.red.iplanet.com (process id 15782) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 24 bytes at address 0x8084bf0 (0.73% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Trying cipher l under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C l aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C l aquash.red.iplanet.com (process id 15806) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher m under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C m aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C m aquash.red.iplanet.com (process id 15830) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher n under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C n aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C n aquash.red.iplanet.com (process id 15854) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher v under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C v aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C v aquash.red.iplanet.com (process id 15878) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 24 bytes at address 0x8084bf0 (0.73% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Trying cipher y under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C y aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C y aquash.red.iplanet.com (process id 15902) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xba121005 [2] fgetnetconfig() at 0xba120c61 [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 execution completed, exit code is 0 memleak.sh: -------- Trying cipher z under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt < /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx memleak.sh: -------- DBX comands (/export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/run_strsclnt29919.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C z aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C z aquash.red.iplanet.com (process id 15926) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541438 [11] PK11_InitSlot() at 0xc05502fc [12] SECMOD_LoadPKCS11Module() at 0xc053788b [13] SECMOD_LoadModule() at 0xc054472f [14] SECMOD_LoadModule() at 0xc0544786 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3307 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.16% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.48% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] _PR_InitTPD() at 0xbc910c8b [4] PR_Init() at 0xbc91a0bd [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.55% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.81% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] ExpandMonitorCache() at 0xbc91049b [5] _PR_InitCMon() at 0xbc9106ff [6] PR_Init() at 0xbc91a0f1 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.87% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc910464 [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.14% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242cb [4] _PR_UnixInit() at 0xbc92d7a8 [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] PKIX_PL_Initialize() at 0xc060592d [5] PKIX_Initialize() at 0xc05b8ad4 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] __nss_InitLock() at 0xc056f54e [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a646 [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b31d [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_InitCMon() at 0xbc9106f0 [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] _PR_UnixInit() at 0xbc92d79d [5] PR_Init() at 0xbc91a142 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.66% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewLock() at 0xbc923b9d [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a98f [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc05777e8 [8] secmod_NewModule() at 0xc0543b54 [9] SECMOD_CreateModule() at 0xc0543c00 [10] SECMOD_LoadModule() at 0xc05446cd [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.36% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c27d [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.45% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.30% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c27d [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c27d [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] ExpandMonitorCache() at 0xbc9105ef [4] _PR_InitCMon() at 0xbc9106ff [5] PR_Init() at 0xbc91a0f1 [6] main() at 0x8057df4 Block in use (biu): Found block of size 24 bytes at address 0x8084e40 (0.73% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91251a [3] PR_NewMonitor() at 0xbc9242b9 [4] OCSP_InitGlobal() at 0xc0514b9f [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c execution completed, exit code is 0 PATH=.:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/opt/sfw/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin:/usr/ucb:/usr/ccs/bin LD_PATH=/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Stopping server: tstclnt -p 8443 -h aquash.red.iplanet.com -c j -f -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss < /export/tinderbox/SunOS_5.9/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=aquash.red.iplanet.com,E=aquash.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF