memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C c aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C c aquash.red.iplanet.com (process id 5233) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acca8 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80b5990 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80de508 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x80fe248 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b7018 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6fd8 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C d aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C d aquash.red.iplanet.com (process id 5256) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acc78 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80b5960 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80fe200 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x80de4c0 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b6fd0 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6f90 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C e aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C e aquash.red.iplanet.com (process id 5279) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acc78 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80b5960 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80fe200 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80de4c0 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b6fd0 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6f90 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C i aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C i aquash.red.iplanet.com (process id 5302) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acc78 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80b5960 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80de4c0 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x80fe200 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b6fd0 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6f90 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C j aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C j aquash.red.iplanet.com (process id 5325) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acca0 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80b5988 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80fe248 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80de508 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b7018 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6fd8 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C k aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C k aquash.red.iplanet.com (process id 5348) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acc78 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80b5960 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80fe200 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80de4c0 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b6fd0 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6f90 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C n aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C n aquash.red.iplanet.com (process id 5371) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acc78 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80b5960 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80fe200 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80de4c0 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b6fd0 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6f90 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C v aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C v aquash.red.iplanet.com (process id 5394) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acc78 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80b5960 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80fe200 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80de4c0 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b6fd0 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6f90 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C y aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C y aquash.red.iplanet.com (process id 5417) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acc78 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80b5960 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80fe200 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x80de4c0 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b6fd0 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6f90 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C z aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C z aquash.red.iplanet.com (process id 5440) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acca0 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80b5988 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80fe248 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80de508 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b7018 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6fd8 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Stopping server: tstclnt -p 8443 -h aquash.red.iplanet.com -c j -f -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss < /export/tinderbox/SunOS_5.9/mozilla/security/nss/tests/memleak/sslreq.dat tstclnt: write to SSL socket failed: This certificate is not valid.