memleak.sh: -------- Trying cipher A under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com (process id 23178) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher B under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com (process id 23202) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher C under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com (process id 23226) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher D under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com (process id 23250) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher E under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com (process id 23274) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher F under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com (process id 23298) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C001 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com (process id 23322) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C002 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com (process id 23346) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C003 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com (process id 23370) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C004 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com (process id 23394) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C005 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com (process id 23418) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C006 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com (process id 23442) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C007 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com (process id 23466) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C008 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com (process id 23490) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C009 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com (process id 23514) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C00A under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com (process id 23538) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C010 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com (process id 23562) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C011 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com (process id 23586) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C012 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com (process id 23610) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C013 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com (process id 23634) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C014 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com (process id 23658) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher c under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com (process id 23682) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher d under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com (process id 23706) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher e under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com (process id 23730) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher f under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com (process id 23754) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher g under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com (process id 23778) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher i under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com (process id 23802) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher j under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com (process id 23826) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher k under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com (process id 23850) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher l under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com (process id 23874) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher m under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com (process id 23898) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher n under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com (process id 23922) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher v under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com (process id 23946) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher y under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com (process id 23970) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher z under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com (process id 23994) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF