memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C A aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C A aquash.red.iplanet.com (process id 20071) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81083c8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C B aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C B aquash.red.iplanet.com (process id 20094) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x81083c8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C C aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C C aquash.red.iplanet.com (process id 20117) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8108308 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C D aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C D aquash.red.iplanet.com (process id 20140) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8108308 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C E aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C E aquash.red.iplanet.com (process id 20163) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8108d18 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C F aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C F aquash.red.iplanet.com (process id 20186) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8108688 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C001 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C001 aquash.red.iplanet.com (process id 20209) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C002 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C002 aquash.red.iplanet.com (process id 20232) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C003 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C003 aquash.red.iplanet.com (process id 20255) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C004 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C004 aquash.red.iplanet.com (process id 20278) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C005 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C005 aquash.red.iplanet.com (process id 20301) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C006 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C006 aquash.red.iplanet.com (process id 20324) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C007 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C007 aquash.red.iplanet.com (process id 20347) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C008 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C008 aquash.red.iplanet.com (process id 20370) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C009 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C009 aquash.red.iplanet.com (process id 20393) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C00A aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C00A aquash.red.iplanet.com (process id 20416) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C010 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C010 aquash.red.iplanet.com (process id 20439) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C011 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C011 aquash.red.iplanet.com (process id 20462) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C012 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C012 aquash.red.iplanet.com (process id 20485) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C013 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C013 aquash.red.iplanet.com (process id 20508) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C014 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C014 aquash.red.iplanet.com (process id 20531) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C c aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C c aquash.red.iplanet.com (process id 20554) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C d aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C d aquash.red.iplanet.com (process id 20577) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C e aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C e aquash.red.iplanet.com (process id 20600) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C f aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C f aquash.red.iplanet.com (process id 20623) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C g aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C g aquash.red.iplanet.com (process id 20646) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C i aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C i aquash.red.iplanet.com (process id 20669) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C j aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C j aquash.red.iplanet.com (process id 20692) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C k aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C k aquash.red.iplanet.com (process id 20715) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C l aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C l aquash.red.iplanet.com (process id 20738) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C m aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C m aquash.red.iplanet.com (process id 20761) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C n aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C n aquash.red.iplanet.com (process id 20784) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C v aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C v aquash.red.iplanet.com (process id 20807) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C y aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C y aquash.red.iplanet.com (process id 20830) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C z aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C z aquash.red.iplanet.com (process id 20853) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Stopping server: tstclnt -p 8443 -h aquash.red.iplanet.com -c j -f -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss < /export/tinderbox/SunOS_5.9/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=aquash.red.iplanet.com,E=aquash.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF