init.sh init: Testing PATH .:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin against LIB /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/usr/openwin/lib Running tests for memleak TIMESTAMP memleak BEGIN: Tue Oct 2 08:08:49 PDT 2007 cert.sh: Certutil and Crlutil Tests with ECC =============================== cert.sh: Creating a CA Certificate TestCA ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/CA -f ../tests.pw.2049 cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/CA... Module "RootCerts" added to database. cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/CA -1 -2 -5 -f ../tests.pw.2049 -z ../tests_noise.2049 -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/CA -o root.cert cert.sh: Creating a CA Certificate serverCA ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA -f ../tests.pw.2049 cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA... Module "RootCerts" added to database. cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA -1 -2 -5 -f ../tests.pw.2049 -z ../tests_noise.2049 -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA -o root.cert cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA -1 -2 -5 -f ../tests.pw.2049 -z ../tests_noise.2049 -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA -o root.cert cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA -1 -2 -5 -f ../tests.pw.2049 -z ../tests_noise.2049 -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA -o root.cert cert.sh: Creating a CA Certificate clientCA ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA -f ../tests.pw.2049 cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA... Module "RootCerts" added to database. cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA -1 -2 -5 -f ../tests.pw.2049 -z ../tests_noise.2049 -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA -o root.cert cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA -1 -2 -5 -f ../tests.pw.2049 -z ../tests_noise.2049 -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA -o root.cert cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA -1 -2 -5 -f ../tests.pw.2049 -z ../tests_noise.2049 -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA -o root.cert cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw.2049 -z ../tests_noise.2049 -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw.2049 -z ../tests_noise.2049 -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw.2049 -z ../tests_noise.2049 -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw.2049 -z ../tests_noise.2049 -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw.2049 -z ../tests_noise.2049 -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw.2049 -z ../tests_noise.2049 -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw.2049 -z ../tests_noise.2049 -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing simplify.red.iplanet.com's Cert DB (ext.) -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_server -f ../tests.pw.2049 cert.sh: Loading root cert module to simplify.red.iplanet.com's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_server... Module "RootCerts" added to database. cert.sh: Generate Cert Request for simplify.red.iplanet.com (ext) -------------------------- certutil -s "CN=simplify.red.iplanet.com, E=simplify.red.iplanet.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_server -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign simplify.red.iplanet.com's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA -i req -o simplify.red.iplanet.com.cert -f ../tests.pw.2049 cert.sh: Import simplify.red.iplanet.com's Cert -t u,u,u (ext) -------------------------- certutil -A -n simplify.red.iplanet.com -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_server -f ../tests.pw.2049 -i simplify.red.iplanet.com.cert cert.sh: Import Client Root CA -t T,, for simplify.red.iplanet.com (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_server -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA/clientCA.ca.cert cert.sh: Generate EC Cert Request for simplify.red.iplanet.com (ext) -------------------------- certutil -s "CN=simplify.red.iplanet.com, E=simplify.red.iplanet.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_server -k ec -q secp256r1 -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign simplify.red.iplanet.com's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA -i req -o simplify.red.iplanet.com-ec.cert -f ../tests.pw.2049 cert.sh: Import simplify.red.iplanet.com's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n simplify.red.iplanet.com-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_server -f ../tests.pw.2049 -i simplify.red.iplanet.com-ec.cert cert.sh: Import Client EC Root CA -t T,, for simplify.red.iplanet.com (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_server -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA/clientCA-ec.ca.cert cert.sh: Generate mixed EC Cert Request for simplify.red.iplanet.com (ext) -------------------------- certutil -s "CN=simplify.red.iplanet.com, E=simplify.red.iplanet.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_server -k ec -q secp256r1 -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign simplify.red.iplanet.com's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA -i req -o simplify.red.iplanet.com-ecmixed.cert -f ../tests.pw.2049 cert.sh: Import simplify.red.iplanet.com's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n simplify.red.iplanet.com-ecmixed -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_server -f ../tests.pw.2049 -i simplify.red.iplanet.com-ecmixed.cert Importing all the server's own CA chain into the servers DB cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for simplify.red.iplanet.com (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_server -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA/chain-1-serverCA-ec.ca.cert cert.sh: Import chain-1-serverCA CA -t u,u,u for simplify.red.iplanet.com (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_server -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA/chain-1-serverCA.ca.cert cert.sh: Import serverCA-ec CA -t C,C,C for simplify.red.iplanet.com (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_server -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA/serverCA-ec.ca.cert cert.sh: Import chain-2-serverCA CA -t u,u,u for simplify.red.iplanet.com (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_server -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA/chain-2-serverCA.ca.cert cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for simplify.red.iplanet.com (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_server -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA/chain-2-serverCA-ec.ca.cert cert.sh: Import serverCA CA -t C,C,C for simplify.red.iplanet.com (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_server -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA/serverCA.ca.cert Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_client -f ../tests.pw.2049 cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_client... Module "RootCerts" added to database. cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_client -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw.2049 cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_client -f ../tests.pw.2049 -i ExtendedSSLUser.cert cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_client -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA/serverCA.ca.cert cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_client -k ec -q secp256r1 -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw.2049 cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_client -f ../tests.pw.2049 -i ExtendedSSLUser-ec.cert cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_client -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/serverCA/serverCA-ec.ca.cert cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_client -k ec -q secp256r1 -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw.2049 cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_client -f ../tests.pw.2049 -i ExtendedSSLUser-ecmixed.cert Importing all the client's own CA chain into the servers DB cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_client -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA/chain-2-clientCA-ec.ca.cert cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_client -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA/clientCA.ca.cert cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_client -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA/chain-1-clientCA-ec.ca.cert cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_client -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA/chain-2-clientCA.ca.cert cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_client -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA/chain-1-clientCA.ca.cert cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/ext_client -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/clientCA/clientCA-ec.ca.cert cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client -f ../tests.pw.2049 cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client... Module "RootCerts" added to database. cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client -i ../CA/root.cert cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client -i ../CA/ecroot.cert cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw.2049 cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client -f ../tests.pw.2049 -i TestUser.cert cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw.2049 cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client -f ../tests.pw.2049 -i TestUser-ec.cert cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw.2049 cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client -f ../tests.pw.2049 -i TestUser-ecmixed.cert cert.sh SUCCESS: TestUser's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ simplify.red.iplanet.com ------------------------------------ cert.sh: Initializing simplify.red.iplanet.com's Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server -f ../tests.pw.2049 cert.sh: Loading root cert module to simplify.red.iplanet.com's Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server... Module "RootCerts" added to database. cert.sh: Import Root CA for simplify.red.iplanet.com -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server -i ../CA/root.cert cert.sh: Import EC Root CA for simplify.red.iplanet.com -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server -i ../CA/ecroot.cert cert.sh: Generate Cert Request for simplify.red.iplanet.com -------------------------- certutil -s "CN=simplify.red.iplanet.com, E=simplify.red.iplanet.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign simplify.red.iplanet.com's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o simplify.red.iplanet.com.cert -f ../tests.pw.2049 cert.sh: Import simplify.red.iplanet.com's Cert -------------------------- certutil -A -n simplify.red.iplanet.com -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server -f ../tests.pw.2049 -i simplify.red.iplanet.com.cert cert.sh SUCCESS: simplify.red.iplanet.com's Cert Created cert.sh: Generate EC Cert Request for simplify.red.iplanet.com -------------------------- certutil -s "CN=simplify.red.iplanet.com, E=simplify.red.iplanet.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign simplify.red.iplanet.com's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o simplify.red.iplanet.com-ec.cert -f ../tests.pw.2049 cert.sh: Import simplify.red.iplanet.com's EC Cert -------------------------- certutil -A -n simplify.red.iplanet.com-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server -f ../tests.pw.2049 -i simplify.red.iplanet.com-ec.cert cert.sh SUCCESS: simplify.red.iplanet.com's EC Cert Created cert.sh: Generate mixed EC Cert Request for simplify.red.iplanet.com -------------------------- certutil -s "CN=simplify.red.iplanet.com, E=simplify.red.iplanet.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign simplify.red.iplanet.com's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o simplify.red.iplanet.com-ecmixed.cert -f ../tests.pw.2049 cert.sh: Import simplify.red.iplanet.com's mixed EC Cert -------------------------- certutil -A -n simplify.red.iplanet.com-ecmixed -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server -f ../tests.pw.2049 -i simplify.red.iplanet.com-ecmixed.cert cert.sh SUCCESS: simplify.red.iplanet.com's mixed EC Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server cert.sh SUCCESS: SSL passed cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/alicedir -f ../tests.pw.2049 cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/alicedir... Module "RootCerts" added to database. cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/alicedir -i ../CA/root.cert cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/alicedir -i ../CA/ecroot.cert cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/alicedir -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw.2049 cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/alicedir -f ../tests.pw.2049 -i Alice.cert cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/alicedir -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw.2049 cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/alicedir -f ../tests.pw.2049 -i Alice-ec.cert cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/alicedir -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw.2049 cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/alicedir -f ../tests.pw.2049 -i Alice-ecmixed.cert cert.sh SUCCESS: Alice's mixed EC Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/bobdir -f ../tests.pw.2049 cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/bobdir... Module "RootCerts" added to database. cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/bobdir -i ../CA/root.cert cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/bobdir -i ../CA/ecroot.cert cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/bobdir -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw.2049 cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/bobdir -f ../tests.pw.2049 -i Bob.cert cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/bobdir -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw.2049 cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/bobdir -f ../tests.pw.2049 -i Bob-ec.cert cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/bobdir -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw.2049 cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/bobdir -f ../tests.pw.2049 -i Bob-ecmixed.cert cert.sh SUCCESS: Bob's mixed EC Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/dave -f ../tests.pw.2049 cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/dave... Module "RootCerts" added to database. cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/dave -i ../CA/root.cert cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/dave -i ../CA/ecroot.cert cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/dave -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw.2049 cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/dave -f ../tests.pw.2049 -i Dave.cert cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/dave -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw.2049 cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/dave -f ../tests.pw.2049 -i Dave-ec.cert cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/dave -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw.2049 cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/dave -f ../tests.pw.2049 -i Dave-ecmixed.cert cert.sh SUCCESS: Dave's mixed EC Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eve -f ../tests.pw.2049 cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eve... Module "RootCerts" added to database. cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eve -i ../CA/root.cert cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eve -i ../CA/ecroot.cert cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eve -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw.2049 -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eve -f ../tests.pw.2049 -i Eve.cert cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eve -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw.2049 -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eve -f ../tests.pw.2049 -i Eve-ec.cert cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eve -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw.2049 -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eve -f ../tests.pw.2049 -i Eve-ecmixed.cert cert.sh SUCCESS: Eve's mixed EC Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t p,p,p -d ../alicedir -f ../tests.pw.2049 -i ../bobdir/Bob.cert cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t p,p,p -d ../alicedir -f ../tests.pw.2049 -i ../dave/Dave.cert cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t p,p,p -d ../bobdir -f ../tests.pw.2049 -i ../dave/Dave.cert cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t p,p,p -d ../alicedir -f ../tests.pw.2049 -i ../eve/Eve.cert cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t p,p,p -d ../bobdir -f ../tests.pw.2049 -i ../eve/Eve.cert cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t p,p,p -d ../alicedir -f ../tests.pw.2049 -i ../bobdir/Bob-ec.cert cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t p,p,p -d ../alicedir -f ../tests.pw.2049 -i ../dave/Dave-ec.cert cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t p,p,p -d ../bobdir -f ../tests.pw.2049 -i ../dave/Dave-ec.cert cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/fips -f ../tests.fipspw.2049 cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/fips... Module "RootCerts" added to database. cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/fips... FIPS mode enabled. cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/fips -f ../tests.fipspw.2049 -k dsa -v 600 -m 500 -z ../tests_noise.2049 Generating key. This may take a few moments... cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves... Module "RootCerts" added to database. cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -i ../CA/ecroot.cert cert.sh: Generate EC Cert Request for Curve-c2pnb163v1 -------------------------- certutil -s "CN=Curve-c2pnb163v1, E=Curve-c2pnb163v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb163v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-c2pnb163v1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-c2pnb163v1's EC Cert -------------------------- certutil -A -n Curve-c2pnb163v1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-c2pnb163v1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb163v2 -------------------------- certutil -s "CN=Curve-c2pnb163v2, E=Curve-c2pnb163v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb163v2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-c2pnb163v2-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-c2pnb163v2's EC Cert -------------------------- certutil -A -n Curve-c2pnb163v2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-c2pnb163v2-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb163v3 -------------------------- certutil -s "CN=Curve-c2pnb163v3, E=Curve-c2pnb163v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v3 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb163v3's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-c2pnb163v3-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-c2pnb163v3's EC Cert -------------------------- certutil -A -n Curve-c2pnb163v3-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-c2pnb163v3-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb176v1 -------------------------- certutil -s "CN=Curve-c2pnb176v1, E=Curve-c2pnb176v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb176v1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb176v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2004 -v 60 -d ../CA -i req -o Curve-c2pnb176v1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-c2pnb176v1's EC Cert -------------------------- certutil -A -n Curve-c2pnb176v1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-c2pnb176v1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb208w1 -------------------------- certutil -s "CN=Curve-c2pnb208w1, E=Curve-c2pnb208w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb208w1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb208w1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2005 -v 60 -d ../CA -i req -o Curve-c2pnb208w1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-c2pnb208w1's EC Cert -------------------------- certutil -A -n Curve-c2pnb208w1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-c2pnb208w1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb272w1 -------------------------- certutil -s "CN=Curve-c2pnb272w1, E=Curve-c2pnb272w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb272w1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb272w1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2006 -v 60 -d ../CA -i req -o Curve-c2pnb272w1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-c2pnb272w1's EC Cert -------------------------- certutil -A -n Curve-c2pnb272w1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-c2pnb272w1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb304w1 -------------------------- certutil -s "CN=Curve-c2pnb304w1, E=Curve-c2pnb304w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb304w1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb304w1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2007 -v 60 -d ../CA -i req -o Curve-c2pnb304w1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-c2pnb304w1's EC Cert -------------------------- certutil -A -n Curve-c2pnb304w1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-c2pnb304w1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb368w1 -------------------------- certutil -s "CN=Curve-c2pnb368w1, E=Curve-c2pnb368w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb368w1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb368w1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2008 -v 60 -d ../CA -i req -o Curve-c2pnb368w1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-c2pnb368w1's EC Cert -------------------------- certutil -A -n Curve-c2pnb368w1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-c2pnb368w1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb191v1 -------------------------- certutil -s "CN=Curve-c2tnb191v1, E=Curve-c2tnb191v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb191v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2009 -v 60 -d ../CA -i req -o Curve-c2tnb191v1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-c2tnb191v1's EC Cert -------------------------- certutil -A -n Curve-c2tnb191v1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-c2tnb191v1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb191v2 -------------------------- certutil -s "CN=Curve-c2tnb191v2, E=Curve-c2tnb191v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb191v2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2010 -v 60 -d ../CA -i req -o Curve-c2tnb191v2-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-c2tnb191v2's EC Cert -------------------------- certutil -A -n Curve-c2tnb191v2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-c2tnb191v2-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb191v3 -------------------------- certutil -s "CN=Curve-c2tnb191v3, E=Curve-c2tnb191v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v3 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb191v3's EC Request -------------------------- certutil -C -c TestCA-ec -m 2011 -v 60 -d ../CA -i req -o Curve-c2tnb191v3-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-c2tnb191v3's EC Cert -------------------------- certutil -A -n Curve-c2tnb191v3-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-c2tnb191v3-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb239v1 -------------------------- certutil -s "CN=Curve-c2tnb239v1, E=Curve-c2tnb239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb239v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2012 -v 60 -d ../CA -i req -o Curve-c2tnb239v1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-c2tnb239v1's EC Cert -------------------------- certutil -A -n Curve-c2tnb239v1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-c2tnb239v1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb239v2 -------------------------- certutil -s "CN=Curve-c2tnb239v2, E=Curve-c2tnb239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb239v2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2013 -v 60 -d ../CA -i req -o Curve-c2tnb239v2-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-c2tnb239v2's EC Cert -------------------------- certutil -A -n Curve-c2tnb239v2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-c2tnb239v2-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb239v3 -------------------------- certutil -s "CN=Curve-c2tnb239v3, E=Curve-c2tnb239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v3 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb239v3's EC Request -------------------------- certutil -C -c TestCA-ec -m 2014 -v 60 -d ../CA -i req -o Curve-c2tnb239v3-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-c2tnb239v3's EC Cert -------------------------- certutil -A -n Curve-c2tnb239v3-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-c2tnb239v3-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb359v1 -------------------------- certutil -s "CN=Curve-c2tnb359v1, E=Curve-c2tnb359v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb359v1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb359v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2015 -v 60 -d ../CA -i req -o Curve-c2tnb359v1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-c2tnb359v1's EC Cert -------------------------- certutil -A -n Curve-c2tnb359v1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-c2tnb359v1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb431r1 -------------------------- certutil -s "CN=Curve-c2tnb431r1, E=Curve-c2tnb431r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb431r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb431r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2016 -v 60 -d ../CA -i req -o Curve-c2tnb431r1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-c2tnb431r1's EC Cert -------------------------- certutil -A -n Curve-c2tnb431r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-c2tnb431r1-ec.cert cert.sh: Generate EC Cert Request for Curve-nistb163 -------------------------- certutil -s "CN=Curve-nistb163, E=Curve-nistb163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb163 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistb163's EC Request -------------------------- certutil -C -c TestCA-ec -m 2017 -v 60 -d ../CA -i req -o Curve-nistb163-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-nistb163's EC Cert -------------------------- certutil -A -n Curve-nistb163-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-nistb163-ec.cert cert.sh: Generate EC Cert Request for Curve-nistb233 -------------------------- certutil -s "CN=Curve-nistb233, E=Curve-nistb233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb233 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistb233's EC Request -------------------------- certutil -C -c TestCA-ec -m 2018 -v 60 -d ../CA -i req -o Curve-nistb233-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-nistb233's EC Cert -------------------------- certutil -A -n Curve-nistb233-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-nistb233-ec.cert cert.sh: Generate EC Cert Request for Curve-nistb283 -------------------------- certutil -s "CN=Curve-nistb283, E=Curve-nistb283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb283 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistb283's EC Request -------------------------- certutil -C -c TestCA-ec -m 2019 -v 60 -d ../CA -i req -o Curve-nistb283-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-nistb283's EC Cert -------------------------- certutil -A -n Curve-nistb283-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-nistb283-ec.cert cert.sh: Generate EC Cert Request for Curve-nistb409 -------------------------- certutil -s "CN=Curve-nistb409, E=Curve-nistb409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb409 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistb409's EC Request -------------------------- certutil -C -c TestCA-ec -m 2020 -v 60 -d ../CA -i req -o Curve-nistb409-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-nistb409's EC Cert -------------------------- certutil -A -n Curve-nistb409-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-nistb409-ec.cert cert.sh: Generate EC Cert Request for Curve-nistb571 -------------------------- certutil -s "CN=Curve-nistb571, E=Curve-nistb571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb571 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistb571's EC Request -------------------------- certutil -C -c TestCA-ec -m 2021 -v 60 -d ../CA -i req -o Curve-nistb571-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-nistb571's EC Cert -------------------------- certutil -A -n Curve-nistb571-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-nistb571-ec.cert cert.sh: Generate EC Cert Request for Curve-nistk163 -------------------------- certutil -s "CN=Curve-nistk163, E=Curve-nistk163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk163 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistk163's EC Request -------------------------- certutil -C -c TestCA-ec -m 2022 -v 60 -d ../CA -i req -o Curve-nistk163-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-nistk163's EC Cert -------------------------- certutil -A -n Curve-nistk163-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-nistk163-ec.cert cert.sh: Generate EC Cert Request for Curve-nistk233 -------------------------- certutil -s "CN=Curve-nistk233, E=Curve-nistk233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk233 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistk233's EC Request -------------------------- certutil -C -c TestCA-ec -m 2023 -v 60 -d ../CA -i req -o Curve-nistk233-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-nistk233's EC Cert -------------------------- certutil -A -n Curve-nistk233-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-nistk233-ec.cert cert.sh: Generate EC Cert Request for Curve-nistk283 -------------------------- certutil -s "CN=Curve-nistk283, E=Curve-nistk283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk283 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistk283's EC Request -------------------------- certutil -C -c TestCA-ec -m 2024 -v 60 -d ../CA -i req -o Curve-nistk283-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-nistk283's EC Cert -------------------------- certutil -A -n Curve-nistk283-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-nistk283-ec.cert cert.sh: Generate EC Cert Request for Curve-nistk409 -------------------------- certutil -s "CN=Curve-nistk409, E=Curve-nistk409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk409 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistk409's EC Request -------------------------- certutil -C -c TestCA-ec -m 2025 -v 60 -d ../CA -i req -o Curve-nistk409-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-nistk409's EC Cert -------------------------- certutil -A -n Curve-nistk409-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-nistk409-ec.cert cert.sh: Generate EC Cert Request for Curve-nistk571 -------------------------- certutil -s "CN=Curve-nistk571, E=Curve-nistk571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk571 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistk571's EC Request -------------------------- certutil -C -c TestCA-ec -m 2026 -v 60 -d ../CA -i req -o Curve-nistk571-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-nistk571's EC Cert -------------------------- certutil -A -n Curve-nistk571-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-nistk571-ec.cert cert.sh: Generate EC Cert Request for Curve-nistp192 -------------------------- certutil -s "CN=Curve-nistp192, E=Curve-nistp192-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp192 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistp192's EC Request -------------------------- certutil -C -c TestCA-ec -m 2027 -v 60 -d ../CA -i req -o Curve-nistp192-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-nistp192's EC Cert -------------------------- certutil -A -n Curve-nistp192-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-nistp192-ec.cert cert.sh: Generate EC Cert Request for Curve-nistp224 -------------------------- certutil -s "CN=Curve-nistp224, E=Curve-nistp224-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp224 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistp224's EC Request -------------------------- certutil -C -c TestCA-ec -m 2028 -v 60 -d ../CA -i req -o Curve-nistp224-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-nistp224's EC Cert -------------------------- certutil -A -n Curve-nistp224-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-nistp224-ec.cert cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2029 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-nistp256-ec.cert cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2030 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-nistp384-ec.cert cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2031 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-nistp521-ec.cert cert.sh: Generate EC Cert Request for Curve-prime192v1 -------------------------- certutil -s "CN=Curve-prime192v1, E=Curve-prime192v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-prime192v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2032 -v 60 -d ../CA -i req -o Curve-prime192v1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-prime192v1's EC Cert -------------------------- certutil -A -n Curve-prime192v1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-prime192v1-ec.cert cert.sh: Generate EC Cert Request for Curve-prime192v2 -------------------------- certutil -s "CN=Curve-prime192v2, E=Curve-prime192v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-prime192v2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2033 -v 60 -d ../CA -i req -o Curve-prime192v2-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-prime192v2's EC Cert -------------------------- certutil -A -n Curve-prime192v2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-prime192v2-ec.cert cert.sh: Generate EC Cert Request for Curve-prime192v3 -------------------------- certutil -s "CN=Curve-prime192v3, E=Curve-prime192v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v3 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-prime192v3's EC Request -------------------------- certutil -C -c TestCA-ec -m 2034 -v 60 -d ../CA -i req -o Curve-prime192v3-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-prime192v3's EC Cert -------------------------- certutil -A -n Curve-prime192v3-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-prime192v3-ec.cert cert.sh: Generate EC Cert Request for Curve-prime239v1 -------------------------- certutil -s "CN=Curve-prime239v1, E=Curve-prime239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-prime239v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2035 -v 60 -d ../CA -i req -o Curve-prime239v1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-prime239v1's EC Cert -------------------------- certutil -A -n Curve-prime239v1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-prime239v1-ec.cert cert.sh: Generate EC Cert Request for Curve-prime239v2 -------------------------- certutil -s "CN=Curve-prime239v2, E=Curve-prime239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-prime239v2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2036 -v 60 -d ../CA -i req -o Curve-prime239v2-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-prime239v2's EC Cert -------------------------- certutil -A -n Curve-prime239v2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-prime239v2-ec.cert cert.sh: Generate EC Cert Request for Curve-prime239v3 -------------------------- certutil -s "CN=Curve-prime239v3, E=Curve-prime239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v3 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-prime239v3's EC Request -------------------------- certutil -C -c TestCA-ec -m 2037 -v 60 -d ../CA -i req -o Curve-prime239v3-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-prime239v3's EC Cert -------------------------- certutil -A -n Curve-prime239v3-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-prime239v3-ec.cert cert.sh: Generate EC Cert Request for Curve-secp112r1 -------------------------- certutil -s "CN=Curve-secp112r1, E=Curve-secp112r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp112r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2038 -v 60 -d ../CA -i req -o Curve-secp112r1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-secp112r1's EC Cert -------------------------- certutil -A -n Curve-secp112r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-secp112r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp112r2 -------------------------- certutil -s "CN=Curve-secp112r2, E=Curve-secp112r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp112r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2039 -v 60 -d ../CA -i req -o Curve-secp112r2-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-secp112r2's EC Cert -------------------------- certutil -A -n Curve-secp112r2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-secp112r2-ec.cert cert.sh: Generate EC Cert Request for Curve-secp128r1 -------------------------- certutil -s "CN=Curve-secp128r1, E=Curve-secp128r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp128r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2040 -v 60 -d ../CA -i req -o Curve-secp128r1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-secp128r1's EC Cert -------------------------- certutil -A -n Curve-secp128r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-secp128r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp128r2 -------------------------- certutil -s "CN=Curve-secp128r2, E=Curve-secp128r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp128r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2041 -v 60 -d ../CA -i req -o Curve-secp128r2-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-secp128r2's EC Cert -------------------------- certutil -A -n Curve-secp128r2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-secp128r2-ec.cert cert.sh: Generate EC Cert Request for Curve-secp160k1 -------------------------- certutil -s "CN=Curve-secp160k1, E=Curve-secp160k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp160k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2042 -v 60 -d ../CA -i req -o Curve-secp160k1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-secp160k1's EC Cert -------------------------- certutil -A -n Curve-secp160k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-secp160k1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp160r1 -------------------------- certutil -s "CN=Curve-secp160r1, E=Curve-secp160r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp160r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2043 -v 60 -d ../CA -i req -o Curve-secp160r1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-secp160r1's EC Cert -------------------------- certutil -A -n Curve-secp160r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-secp160r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp160r2 -------------------------- certutil -s "CN=Curve-secp160r2, E=Curve-secp160r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp160r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2044 -v 60 -d ../CA -i req -o Curve-secp160r2-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-secp160r2's EC Cert -------------------------- certutil -A -n Curve-secp160r2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-secp160r2-ec.cert cert.sh: Generate EC Cert Request for Curve-secp192k1 -------------------------- certutil -s "CN=Curve-secp192k1, E=Curve-secp192k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp192k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2045 -v 60 -d ../CA -i req -o Curve-secp192k1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-secp192k1's EC Cert -------------------------- certutil -A -n Curve-secp192k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-secp192k1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp192r1 -------------------------- certutil -s "CN=Curve-secp192r1, E=Curve-secp192r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp192r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2046 -v 60 -d ../CA -i req -o Curve-secp192r1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-secp192r1's EC Cert -------------------------- certutil -A -n Curve-secp192r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-secp192r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp224k1 -------------------------- certutil -s "CN=Curve-secp224k1, E=Curve-secp224k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp224k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2047 -v 60 -d ../CA -i req -o Curve-secp224k1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-secp224k1's EC Cert -------------------------- certutil -A -n Curve-secp224k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-secp224k1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp224r1 -------------------------- certutil -s "CN=Curve-secp224r1, E=Curve-secp224r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp224r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2048 -v 60 -d ../CA -i req -o Curve-secp224r1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-secp224r1's EC Cert -------------------------- certutil -A -n Curve-secp224r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-secp224r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp256k1 -------------------------- certutil -s "CN=Curve-secp256k1, E=Curve-secp256k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp256k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2049 -v 60 -d ../CA -i req -o Curve-secp256k1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-secp256k1's EC Cert -------------------------- certutil -A -n Curve-secp256k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-secp256k1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp256r1 -------------------------- certutil -s "CN=Curve-secp256r1, E=Curve-secp256r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp256r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2050 -v 60 -d ../CA -i req -o Curve-secp256r1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-secp256r1's EC Cert -------------------------- certutil -A -n Curve-secp256r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-secp256r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp384r1 -------------------------- certutil -s "CN=Curve-secp384r1, E=Curve-secp384r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp384r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2051 -v 60 -d ../CA -i req -o Curve-secp384r1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-secp384r1's EC Cert -------------------------- certutil -A -n Curve-secp384r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-secp384r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp521r1 -------------------------- certutil -s "CN=Curve-secp521r1, E=Curve-secp521r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp521r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp521r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2052 -v 60 -d ../CA -i req -o Curve-secp521r1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-secp521r1's EC Cert -------------------------- certutil -A -n Curve-secp521r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-secp521r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect113r1 -------------------------- certutil -s "CN=Curve-sect113r1, E=Curve-sect113r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect113r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2053 -v 60 -d ../CA -i req -o Curve-sect113r1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-sect113r1's EC Cert -------------------------- certutil -A -n Curve-sect113r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-sect113r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect113r2 -------------------------- certutil -s "CN=Curve-sect113r2, E=Curve-sect113r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect113r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2054 -v 60 -d ../CA -i req -o Curve-sect113r2-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-sect113r2's EC Cert -------------------------- certutil -A -n Curve-sect113r2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-sect113r2-ec.cert cert.sh: Generate EC Cert Request for Curve-sect131r1 -------------------------- certutil -s "CN=Curve-sect131r1, E=Curve-sect131r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect131r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2055 -v 60 -d ../CA -i req -o Curve-sect131r1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-sect131r1's EC Cert -------------------------- certutil -A -n Curve-sect131r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-sect131r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect131r2 -------------------------- certutil -s "CN=Curve-sect131r2, E=Curve-sect131r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect131r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2056 -v 60 -d ../CA -i req -o Curve-sect131r2-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-sect131r2's EC Cert -------------------------- certutil -A -n Curve-sect131r2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-sect131r2-ec.cert cert.sh: Generate EC Cert Request for Curve-sect163k1 -------------------------- certutil -s "CN=Curve-sect163k1, E=Curve-sect163k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect163k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2057 -v 60 -d ../CA -i req -o Curve-sect163k1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-sect163k1's EC Cert -------------------------- certutil -A -n Curve-sect163k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-sect163k1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect163r1 -------------------------- certutil -s "CN=Curve-sect163r1, E=Curve-sect163r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect163r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2058 -v 60 -d ../CA -i req -o Curve-sect163r1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-sect163r1's EC Cert -------------------------- certutil -A -n Curve-sect163r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-sect163r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect163r2 -------------------------- certutil -s "CN=Curve-sect163r2, E=Curve-sect163r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect163r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2059 -v 60 -d ../CA -i req -o Curve-sect163r2-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-sect163r2's EC Cert -------------------------- certutil -A -n Curve-sect163r2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-sect163r2-ec.cert cert.sh: Generate EC Cert Request for Curve-sect193r1 -------------------------- certutil -s "CN=Curve-sect193r1, E=Curve-sect193r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect193r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2060 -v 60 -d ../CA -i req -o Curve-sect193r1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-sect193r1's EC Cert -------------------------- certutil -A -n Curve-sect193r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-sect193r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect193r2 -------------------------- certutil -s "CN=Curve-sect193r2, E=Curve-sect193r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect193r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2061 -v 60 -d ../CA -i req -o Curve-sect193r2-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-sect193r2's EC Cert -------------------------- certutil -A -n Curve-sect193r2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-sect193r2-ec.cert cert.sh: Generate EC Cert Request for Curve-sect233k1 -------------------------- certutil -s "CN=Curve-sect233k1, E=Curve-sect233k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect233k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2062 -v 60 -d ../CA -i req -o Curve-sect233k1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-sect233k1's EC Cert -------------------------- certutil -A -n Curve-sect233k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-sect233k1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect233r1 -------------------------- certutil -s "CN=Curve-sect233r1, E=Curve-sect233r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect233r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2063 -v 60 -d ../CA -i req -o Curve-sect233r1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-sect233r1's EC Cert -------------------------- certutil -A -n Curve-sect233r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-sect233r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect239k1 -------------------------- certutil -s "CN=Curve-sect239k1, E=Curve-sect239k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect239k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect239k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2064 -v 60 -d ../CA -i req -o Curve-sect239k1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-sect239k1's EC Cert -------------------------- certutil -A -n Curve-sect239k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-sect239k1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect283k1 -------------------------- certutil -s "CN=Curve-sect283k1, E=Curve-sect283k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect283k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2065 -v 60 -d ../CA -i req -o Curve-sect283k1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-sect283k1's EC Cert -------------------------- certutil -A -n Curve-sect283k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-sect283k1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect283r1 -------------------------- certutil -s "CN=Curve-sect283r1, E=Curve-sect283r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect283r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2066 -v 60 -d ../CA -i req -o Curve-sect283r1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-sect283r1's EC Cert -------------------------- certutil -A -n Curve-sect283r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-sect283r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect409k1 -------------------------- certutil -s "CN=Curve-sect409k1, E=Curve-sect409k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect409k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2067 -v 60 -d ../CA -i req -o Curve-sect409k1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-sect409k1's EC Cert -------------------------- certutil -A -n Curve-sect409k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-sect409k1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect409r1 -------------------------- certutil -s "CN=Curve-sect409r1, E=Curve-sect409r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect409r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2068 -v 60 -d ../CA -i req -o Curve-sect409r1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-sect409r1's EC Cert -------------------------- certutil -A -n Curve-sect409r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-sect409r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect571k1 -------------------------- certutil -s "CN=Curve-sect571k1, E=Curve-sect571k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect571k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2069 -v 60 -d ../CA -i req -o Curve-sect571k1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-sect571k1's EC Cert -------------------------- certutil -A -n Curve-sect571k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-sect571k1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect571r1 -------------------------- certutil -s "CN=Curve-sect571r1, E=Curve-sect571r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect571r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2070 -v 60 -d ../CA -i req -o Curve-sect571r1-ec.cert -f ../tests.pw.2049 cert.sh: Import Curve-sect571r1's EC Cert -------------------------- certutil -A -n Curve-sect571r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/eccurves -f ../tests.pw.2049 -i Curve-sect571r1-ec.cert cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -f ../tests.pw.2049 cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions... Module "RootCerts" added to database. cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -i ../CA/root.cert cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.2049 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -i ../CA/ecroot.cert cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw.2049 cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -f ../tests.pw.2049 -i TestExt.cert cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw.2049 cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -f ../tests.pw.2049 -i TestExt-ec.cert cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -f ../tests.pw.2049 -z ../tests_noise.2049 -o req Generating key. This may take a few moments... cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw.2049 cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -f ../tests.pw.2049 -i TestExt-ecmixed.cert cert.sh SUCCESS: TestExt's mixed EC Cert Created ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.2049 -z ../tests_noise.2049 -1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? certutil options: 0 1 2 3 4 5 6 10 n ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.2049 -z ../tests_noise.2049 -1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? certutil options: 0 1 2 3 4 5 6 10 y ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.2049 -z ../tests_noise.2049 -2 Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? certutil options: y -1 n ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.2049 -z ../tests_noise.2049 -2 Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? certutil options: n -1 y ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.2049 -z ../tests_noise.2049 -3 Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields, enter to omit: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil options: y 12341235123 y ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.2049 -z ../tests_noise.2049 -3 Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields, enter to omit: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter data: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil options: y 3 test.com 214123 y ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.2049 -z ../tests_noise.2049 -4 Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter data: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter data: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter data: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter data: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter data: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter data: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter data: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: Enter value for the CRL Issuer name: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter more value for the CRL distribution point extension [y/N] Is this a critical extension [y/N]? certutil options: 1 1 InstanceOfOtherName 2 rfc822Name 3 test.com 4 test@test.com 6 ediPArtyName 8 ipAddress 9 123451235 10 0 10 n n ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.2049 -z ../tests_noise.2049 -4 Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: Enter value for the CRL Issuer name: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter data: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter more value for the CRL distribution point extension [y/N] Is this a critical extension [y/N]? certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.2049 -z ../tests_noise.2049 -5 Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? certutil options: 0 1 2 10 n ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.2049 -z ../tests_noise.2049 -6 Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish Is this a critical extension [y/N]? certutil options: 0 1 2 3 4 5 6 10 y ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.2049 -z ../tests_noise.2049 -1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? certutil options: 1 2 3 4 5 6 10 n cert.sh: Skipping CRL Tests cert.sh cert.sh: finished cert.sh memleak.sh: DBX found: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx memleak.sh: Memory leak checking - server =============================== memleak.sh: BYPASS is OFF Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak... FIPS mode already disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak... FIPS mode already disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- memleak.sh: FIPS is OFF Running server-32-libfreebl_32fpu_3-NORMAL PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running selfserv under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/selfserv < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_selfserv2049.dbx memleak.sh: -------- DBX commands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_selfserv2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher A: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher B: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher C: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher D: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher E: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher F: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher :C001: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C002: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C003: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C004: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C005: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C006: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C007: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C008: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C009: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C00A: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C010: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C011: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C012: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C013: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C014: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher c: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher d: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher e: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher f: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher g: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher i: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher j: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher k: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher l: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher m: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher n: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher v: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher y: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher z: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 4860) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 223 total size: 19624 bytes) Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] nssToken_FindTrustForCertificate() at 0xe95776c4 [9] nssTrustDomain_FindTrustForCertificate() at 0xe956dfbc [10] nssTrust_GetCERTCertTrustForCert() at 0xe95730f4 [11] fill_CERTCertificateFields() at 0xe9573794 [12] STAN_GetCERTCertificate() at 0xe9573b50 [13] convert_cert() at 0xe952623c [14] nssPKIObjectCollection_Traverse() at 0xe9571acc [15] NSSTrustDomain_TraverseCertificates() at 0xe956df30 [16] PK11_TraverseSlotCerts() at 0xe9526bb4 Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] nssToken_TraverseCertificates() at 0xe95781bc [9] NSSTrustDomain_TraverseCertificates() at 0xe956dee0 [10] PK11_TraverseSlotCerts() at 0xe9526bb4 [11] CERT_GetSSLCACerts() at 0xe9516898 [12] serverCAListSetup() at 0xebd1baac [13] PR_CallOnceWithArg() at 0xe591e6c0 [14] SSL_ConfigSecureServer() at 0xebd1be48 [15] server_main() at 0x17444 [16] main() at 0x1a08c Memory Leak (mel): Found leaked block of size 88 bytes at address 0x12c4b0 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x1947c Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 31 total size: 2590 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (34.59% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x187e8 Block in use (biu): Found block of size 512 bytes at address 0x401b0 (19.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x187e8 Block in use (biu): Found 8 blocks totaling 256 bytes (9.88% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x187e8 Block in use (biu): Found block of size 128 bytes at address 0x406f0 (4.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 112 bytes at address 0xf8908 (4.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x1947c Block in use (biu): Found block of size 112 bytes at address 0x414d8 (4.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0x40680 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0x41430 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0xf97a0 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x1947c Block in use (biu): Found block of size 88 bytes at address 0x41768 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] SSL_ConfigServerSessionIDCache() at 0xebd1ec98 [5] main() at 0x19270 Block in use (biu): Found block of size 88 bytes at address 0x416f8 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] SSL_ConfigServerSessionIDCache() at 0xebd1ec90 [5] main() at 0x19270 Block in use (biu): Found block of size 32 bytes at address 0x40d88 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 32 bytes at address 0xf88d0 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x1947c Block in use (biu): Found block of size 32 bytes at address 0x414a0 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x187e8 Block in use (biu): Found block of size 20 bytes at address 0x41208 (0.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitLinker() at 0xe5911d84 [3] _PR_InitStuff() at 0xe591d5f4 [4] main() at 0x187e8 Block in use (biu): Found block of size 12 bytes at address 0x3f1b0 (0.46% of total) At time of allocation, the call stack was: [1] PR_ErrorInstallTable() at 0xe591d050 [2] _PR_InitStuff() at 0xe591d638 [3] main() at 0x187e8 Block in use (biu): Found block of size 6 bytes at address 0x3fb30 (0.23% of total) At time of allocation, the call stack was: [1] _strdup() at 0xde163720 [2] _PR_InitLinker() at 0xe5911d9c [3] _PR_InitStuff() at 0xe591d5f4 [4] main() at 0x187e8 execution completed, exit code is 0 memleak.sh: server-32-libfreebl_32fpu_3-NORMAL produced a returncode of 0, expected is 0 PASSED memleak.sh: Using libfreebl_32int_3 instead of libfreebl_32fpu_3 Running server-32-libfreebl_32int_3-NORMAL PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Running selfserv under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/selfserv < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_selfserv2049.dbx memleak.sh: -------- DBX commands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_selfserv2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher A: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher B: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher C: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher D: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher E: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher F: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher :C001: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C002: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C003: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C004: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C005: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C006: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C007: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C008: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C009: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C00A: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C010: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C011: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C012: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C013: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C014: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher c: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher d: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher e: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher f: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher g: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher i: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher j: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher k: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher l: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher m: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher n: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher v: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher y: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher z: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 215) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 222 total size: 19536 bytes) Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] nssToken_FindTrustForCertificate() at 0xe95776c4 [9] nssTrustDomain_FindTrustForCertificate() at 0xe956dfbc [10] nssTrust_GetCERTCertTrustForCert() at 0xe95730f4 [11] fill_CERTCertificateFields() at 0xe9573794 [12] STAN_GetCERTCertificate() at 0xe9573b50 [13] convert_cert() at 0xe952623c [14] nssPKIObjectCollection_Traverse() at 0xe9571acc [15] NSSTrustDomain_TraverseCertificates() at 0xe956df30 [16] PK11_TraverseSlotCerts() at 0xe9526bb4 Memory Leak (mel): Found 110 leaked blocks with total size 9680 bytes At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] nssToken_TraverseCertificates() at 0xe95781bc [9] NSSTrustDomain_TraverseCertificates() at 0xe956dee0 [10] PK11_TraverseSlotCerts() at 0xe9526bb4 [11] CERT_GetSSLCACerts() at 0xe9516898 [12] serverCAListSetup() at 0xebd1baac [13] PR_CallOnceWithArg() at 0xe591e6c0 [14] SSL_ConfigSecureServer() at 0xebd1be48 [15] server_main() at 0x17444 [16] main() at 0x1a08c Memory Leak (mel): Found leaked block of size 88 bytes at address 0x12c468 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x1947c Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 31 total size: 2590 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (34.59% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x187e8 Block in use (biu): Found block of size 512 bytes at address 0x401b0 (19.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x187e8 Block in use (biu): Found 8 blocks totaling 256 bytes (9.88% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x187e8 Block in use (biu): Found block of size 128 bytes at address 0x406f0 (4.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 112 bytes at address 0xf8908 (4.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x1947c Block in use (biu): Found block of size 112 bytes at address 0x414d8 (4.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0x40680 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0x41430 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0xf97a0 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x1947c Block in use (biu): Found block of size 88 bytes at address 0x41768 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] SSL_ConfigServerSessionIDCache() at 0xebd1ec98 [5] main() at 0x19270 Block in use (biu): Found block of size 88 bytes at address 0x416f8 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] SSL_ConfigServerSessionIDCache() at 0xebd1ec90 [5] main() at 0x19270 Block in use (biu): Found block of size 32 bytes at address 0x40d88 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 32 bytes at address 0xf88d0 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x1947c Block in use (biu): Found block of size 32 bytes at address 0x414a0 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x187e8 Block in use (biu): Found block of size 20 bytes at address 0x41208 (0.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitLinker() at 0xe5911d84 [3] _PR_InitStuff() at 0xe591d5f4 [4] main() at 0x187e8 Block in use (biu): Found block of size 12 bytes at address 0x3f1b0 (0.46% of total) At time of allocation, the call stack was: [1] PR_ErrorInstallTable() at 0xe591d050 [2] _PR_InitStuff() at 0xe591d638 [3] main() at 0x187e8 Block in use (biu): Found block of size 6 bytes at address 0x3fb30 (0.23% of total) At time of allocation, the call stack was: [1] _strdup() at 0xde163720 [2] _PR_InitLinker() at 0xe5911d9c [3] _PR_InitStuff() at 0xe591d5f4 [4] main() at 0x187e8 execution completed, exit code is 0 memleak.sh: server-32-libfreebl_32int_3-NORMAL produced a returncode of 0, expected is 0 PASSED memleak.sh: Using libfreebl_32int64_3 instead of libfreebl_32fpu_3 Running server-32-libfreebl_32int64_3-NORMAL PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Running selfserv under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/selfserv < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_selfserv2049.dbx memleak.sh: -------- DBX commands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_selfserv2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher A: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher B: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher C: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher D: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher E: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher F: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher :C001: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C002: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C003: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C004: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C005: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C006: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C007: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C008: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C009: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C00A: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C010: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C011: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C012: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C013: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C014: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher c: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher d: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher e: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher f: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher g: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher i: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher j: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher k: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher l: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher m: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher n: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher v: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher y: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher z: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 25592) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 222 total size: 19536 bytes) Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] nssToken_FindTrustForCertificate() at 0xe95776c4 [9] nssTrustDomain_FindTrustForCertificate() at 0xe956dfbc [10] nssTrust_GetCERTCertTrustForCert() at 0xe95730f4 [11] fill_CERTCertificateFields() at 0xe9573794 [12] STAN_GetCERTCertificate() at 0xe9573b50 [13] convert_cert() at 0xe952623c [14] nssPKIObjectCollection_Traverse() at 0xe9571acc [15] NSSTrustDomain_TraverseCertificates() at 0xe956df30 [16] PK11_TraverseSlotCerts() at 0xe9526bb4 Memory Leak (mel): Found 110 leaked blocks with total size 9680 bytes At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] nssToken_TraverseCertificates() at 0xe95781bc [9] NSSTrustDomain_TraverseCertificates() at 0xe956dee0 [10] PK11_TraverseSlotCerts() at 0xe9526bb4 [11] CERT_GetSSLCACerts() at 0xe9516898 [12] serverCAListSetup() at 0xebd1baac [13] PR_CallOnceWithArg() at 0xe591e6c0 [14] SSL_ConfigSecureServer() at 0xebd1be48 [15] server_main() at 0x17444 [16] main() at 0x1a08c Memory Leak (mel): Found leaked block of size 88 bytes at address 0x12c468 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x1947c Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 31 total size: 2590 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (34.59% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x187e8 Block in use (biu): Found block of size 512 bytes at address 0x401b0 (19.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x187e8 Block in use (biu): Found 8 blocks totaling 256 bytes (9.88% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x187e8 Block in use (biu): Found block of size 128 bytes at address 0x406f0 (4.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 112 bytes at address 0xf8908 (4.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x1947c Block in use (biu): Found block of size 112 bytes at address 0x414d8 (4.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0x40680 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0x41430 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0xf97a0 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x1947c Block in use (biu): Found block of size 88 bytes at address 0x41768 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] SSL_ConfigServerSessionIDCache() at 0xebd1ec98 [5] main() at 0x19270 Block in use (biu): Found block of size 88 bytes at address 0x416f8 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] SSL_ConfigServerSessionIDCache() at 0xebd1ec90 [5] main() at 0x19270 Block in use (biu): Found block of size 32 bytes at address 0x40d88 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 32 bytes at address 0xf88d0 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x1947c Block in use (biu): Found block of size 32 bytes at address 0x414a0 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x187e8 Block in use (biu): Found block of size 20 bytes at address 0x41208 (0.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitLinker() at 0xe5911d84 [3] _PR_InitStuff() at 0xe591d5f4 [4] main() at 0x187e8 Block in use (biu): Found block of size 12 bytes at address 0x3f1b0 (0.46% of total) At time of allocation, the call stack was: [1] PR_ErrorInstallTable() at 0xe591d050 [2] _PR_InitStuff() at 0xe591d638 [3] main() at 0x187e8 Block in use (biu): Found block of size 6 bytes at address 0x3fb30 (0.23% of total) At time of allocation, the call stack was: [1] _strdup() at 0xde163720 [2] _PR_InitLinker() at 0xe5911d9c [3] _PR_InitStuff() at 0xe591d5f4 [4] main() at 0x187e8 execution completed, exit code is 0 memleak.sh: server-32-libfreebl_32int64_3-NORMAL produced a returncode of 0, expected is 0 PASSED memleak.sh: BYPASS is ON Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak... FIPS mode already disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak... FIPS mode already disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- memleak.sh: FIPS is OFF Running server-32-libfreebl_32fpu_3-BYPASS PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running selfserv under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/selfserv < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_selfserv2049.dbx memleak.sh: -------- DBX commands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_selfserv2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher A: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher B: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher C: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher D: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher E: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher F: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher :C001: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C002: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C003: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C004: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C005: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C006: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C007: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C008: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C009: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C00A: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C010: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C011: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C012: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C013: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C014: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher c: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher d: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher e: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher f: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher g: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher i: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher j: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher k: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher l: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher m: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher n: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher v: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher y: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher z: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: selfserv -B -s -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 20974) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 223 total size: 19624 bytes) Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] nssToken_TraverseCertificates() at 0xe95781bc [9] NSSTrustDomain_TraverseCertificates() at 0xe956dee0 [10] PK11_TraverseSlotCerts() at 0xe9526bb4 [11] CERT_GetSSLCACerts() at 0xe9516898 [12] serverCAListSetup() at 0xebd1baac [13] PR_CallOnceWithArg() at 0xe591e6c0 [14] SSL_ConfigSecureServer() at 0xebd1be48 [15] server_main() at 0x17444 [16] main() at 0x1a08c Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] nssToken_FindTrustForCertificate() at 0xe95776c4 [9] nssTrustDomain_FindTrustForCertificate() at 0xe956dfbc [10] nssTrust_GetCERTCertTrustForCert() at 0xe95730f4 [11] fill_CERTCertificateFields() at 0xe9573794 [12] STAN_GetCERTCertificate() at 0xe9573b50 [13] convert_cert() at 0xe952623c [14] nssPKIObjectCollection_Traverse() at 0xe9571acc [15] NSSTrustDomain_TraverseCertificates() at 0xe956df30 [16] PK11_TraverseSlotCerts() at 0xe9526bb4 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x12c4b0 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x1947c Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 31 total size: 2590 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (34.59% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x187e8 Block in use (biu): Found block of size 512 bytes at address 0x401b0 (19.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x187e8 Block in use (biu): Found 8 blocks totaling 256 bytes (9.88% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x187e8 Block in use (biu): Found block of size 128 bytes at address 0x406f0 (4.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 112 bytes at address 0xf8908 (4.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x1947c Block in use (biu): Found block of size 112 bytes at address 0x414d8 (4.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0x40680 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0x41430 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0xf97a0 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x1947c Block in use (biu): Found block of size 88 bytes at address 0x41768 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] SSL_ConfigServerSessionIDCache() at 0xebd1ec98 [5] main() at 0x19270 Block in use (biu): Found block of size 88 bytes at address 0x416f8 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] SSL_ConfigServerSessionIDCache() at 0xebd1ec90 [5] main() at 0x19270 Block in use (biu): Found block of size 32 bytes at address 0x40d88 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 32 bytes at address 0xf88d0 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x1947c Block in use (biu): Found block of size 32 bytes at address 0x414a0 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x187e8 Block in use (biu): Found block of size 20 bytes at address 0x41208 (0.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitLinker() at 0xe5911d84 [3] _PR_InitStuff() at 0xe591d5f4 [4] main() at 0x187e8 Block in use (biu): Found block of size 12 bytes at address 0x3f1b0 (0.46% of total) At time of allocation, the call stack was: [1] PR_ErrorInstallTable() at 0xe591d050 [2] _PR_InitStuff() at 0xe591d638 [3] main() at 0x187e8 Block in use (biu): Found block of size 6 bytes at address 0x3fb30 (0.23% of total) At time of allocation, the call stack was: [1] _strdup() at 0xde163720 [2] _PR_InitLinker() at 0xe5911d9c [3] _PR_InitStuff() at 0xe591d5f4 [4] main() at 0x187e8 execution completed, exit code is 0 memleak.sh: server-32-libfreebl_32fpu_3-BYPASS produced a returncode of 0, expected is 0 PASSED memleak.sh: Using libfreebl_32int_3 instead of libfreebl_32fpu_3 Running server-32-libfreebl_32int_3-BYPASS PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Running selfserv under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/selfserv < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_selfserv2049.dbx memleak.sh: -------- DBX commands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_selfserv2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher A: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher B: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher C: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher D: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher E: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher F: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher :C001: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C002: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C003: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C004: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C005: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C006: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C007: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C008: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C009: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C00A: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C010: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C011: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C012: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C013: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C014: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher c: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher d: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher e: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher f: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher g: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher i: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher j: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher k: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher l: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher m: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher n: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher v: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher y: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher z: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: selfserv -B -s -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 16358) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 222 total size: 19536 bytes) Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] nssToken_FindTrustForCertificate() at 0xe95776c4 [9] nssTrustDomain_FindTrustForCertificate() at 0xe956dfbc [10] nssTrust_GetCERTCertTrustForCert() at 0xe95730f4 [11] fill_CERTCertificateFields() at 0xe9573794 [12] STAN_GetCERTCertificate() at 0xe9573b50 [13] convert_cert() at 0xe952623c [14] nssPKIObjectCollection_Traverse() at 0xe9571acc [15] NSSTrustDomain_TraverseCertificates() at 0xe956df30 [16] PK11_TraverseSlotCerts() at 0xe9526bb4 Memory Leak (mel): Found 110 leaked blocks with total size 9680 bytes At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] nssToken_TraverseCertificates() at 0xe95781bc [9] NSSTrustDomain_TraverseCertificates() at 0xe956dee0 [10] PK11_TraverseSlotCerts() at 0xe9526bb4 [11] CERT_GetSSLCACerts() at 0xe9516898 [12] serverCAListSetup() at 0xebd1baac [13] PR_CallOnceWithArg() at 0xe591e6c0 [14] SSL_ConfigSecureServer() at 0xebd1be48 [15] server_main() at 0x17444 [16] main() at 0x1a08c Memory Leak (mel): Found leaked block of size 88 bytes at address 0x12c468 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x1947c Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 31 total size: 2590 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (34.59% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x187e8 Block in use (biu): Found block of size 512 bytes at address 0x401b0 (19.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x187e8 Block in use (biu): Found 8 blocks totaling 256 bytes (9.88% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x187e8 Block in use (biu): Found block of size 128 bytes at address 0x406f0 (4.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 112 bytes at address 0xf8908 (4.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x1947c Block in use (biu): Found block of size 112 bytes at address 0x414d8 (4.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0x40680 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0x41430 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0xf97a0 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x1947c Block in use (biu): Found block of size 88 bytes at address 0x41768 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] SSL_ConfigServerSessionIDCache() at 0xebd1ec98 [5] main() at 0x19270 Block in use (biu): Found block of size 88 bytes at address 0x416f8 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] SSL_ConfigServerSessionIDCache() at 0xebd1ec90 [5] main() at 0x19270 Block in use (biu): Found block of size 32 bytes at address 0x40d88 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 32 bytes at address 0xf88d0 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x1947c Block in use (biu): Found block of size 32 bytes at address 0x414a0 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x187e8 Block in use (biu): Found block of size 20 bytes at address 0x41208 (0.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitLinker() at 0xe5911d84 [3] _PR_InitStuff() at 0xe591d5f4 [4] main() at 0x187e8 Block in use (biu): Found block of size 12 bytes at address 0x3f1b0 (0.46% of total) At time of allocation, the call stack was: [1] PR_ErrorInstallTable() at 0xe591d050 [2] _PR_InitStuff() at 0xe591d638 [3] main() at 0x187e8 Block in use (biu): Found block of size 6 bytes at address 0x3fb30 (0.23% of total) At time of allocation, the call stack was: [1] _strdup() at 0xde163720 [2] _PR_InitLinker() at 0xe5911d9c [3] _PR_InitStuff() at 0xe591d5f4 [4] main() at 0x187e8 execution completed, exit code is 0 memleak.sh: server-32-libfreebl_32int_3-BYPASS produced a returncode of 0, expected is 0 PASSED memleak.sh: Using libfreebl_32int64_3 instead of libfreebl_32fpu_3 Running server-32-libfreebl_32int64_3-BYPASS PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Running selfserv under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/selfserv < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_selfserv2049.dbx memleak.sh: -------- DBX commands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_selfserv2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher A: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher B: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher C: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher D: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher E: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher F: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher :C001: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C002: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C003: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C004: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C005: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C006: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C007: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C008: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C009: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C00A: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C010: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C011: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C012: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C013: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C014: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher c: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher d: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher e: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher f: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher g: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher i: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher j: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher k: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher l: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher m: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher n: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher v: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher y: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher z: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: selfserv -B -s -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 11746) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 222 total size: 19536 bytes) Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] nssToken_FindTrustForCertificate() at 0xe95776c4 [9] nssTrustDomain_FindTrustForCertificate() at 0xe956dfbc [10] nssTrust_GetCERTCertTrustForCert() at 0xe95730f4 [11] fill_CERTCertificateFields() at 0xe9573794 [12] STAN_GetCERTCertificate() at 0xe9573b50 [13] convert_cert() at 0xe952623c [14] nssPKIObjectCollection_Traverse() at 0xe9571acc [15] NSSTrustDomain_TraverseCertificates() at 0xe956df30 [16] PK11_TraverseSlotCerts() at 0xe9526bb4 Memory Leak (mel): Found 110 leaked blocks with total size 9680 bytes At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] nssToken_TraverseCertificates() at 0xe95781bc [9] NSSTrustDomain_TraverseCertificates() at 0xe956dee0 [10] PK11_TraverseSlotCerts() at 0xe9526bb4 [11] CERT_GetSSLCACerts() at 0xe9516898 [12] serverCAListSetup() at 0xebd1baac [13] PR_CallOnceWithArg() at 0xe591e6c0 [14] SSL_ConfigSecureServer() at 0xebd1be48 [15] server_main() at 0x17444 [16] main() at 0x1a08c Memory Leak (mel): Found leaked block of size 88 bytes at address 0x12c468 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x1947c Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 31 total size: 2590 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (34.59% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x187e8 Block in use (biu): Found block of size 512 bytes at address 0x401b0 (19.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x187e8 Block in use (biu): Found 8 blocks totaling 256 bytes (9.88% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x187e8 Block in use (biu): Found block of size 128 bytes at address 0x406f0 (4.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 112 bytes at address 0xf8908 (4.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x1947c Block in use (biu): Found block of size 112 bytes at address 0x414d8 (4.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0x40680 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0x41430 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0xf97a0 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x1947c Block in use (biu): Found block of size 88 bytes at address 0x41768 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] SSL_ConfigServerSessionIDCache() at 0xebd1ec98 [5] main() at 0x19270 Block in use (biu): Found block of size 88 bytes at address 0x416f8 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] SSL_ConfigServerSessionIDCache() at 0xebd1ec90 [5] main() at 0x19270 Block in use (biu): Found block of size 32 bytes at address 0x40d88 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 32 bytes at address 0xf88d0 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x1947c Block in use (biu): Found block of size 32 bytes at address 0x414a0 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x187e8 Block in use (biu): Found block of size 20 bytes at address 0x41208 (0.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitLinker() at 0xe5911d84 [3] _PR_InitStuff() at 0xe591d5f4 [4] main() at 0x187e8 Block in use (biu): Found block of size 12 bytes at address 0x3f1b0 (0.46% of total) At time of allocation, the call stack was: [1] PR_ErrorInstallTable() at 0xe591d050 [2] _PR_InitStuff() at 0xe591d638 [3] main() at 0x187e8 Block in use (biu): Found block of size 6 bytes at address 0x3fb30 (0.23% of total) At time of allocation, the call stack was: [1] _strdup() at 0xde163720 [2] _PR_InitLinker() at 0xe5911d9c [3] _PR_InitStuff() at 0xe591d5f4 [4] main() at 0x187e8 execution completed, exit code is 0 memleak.sh: server-32-libfreebl_32int64_3-BYPASS produced a returncode of 0, expected is 0 PASSED memleak.sh: BYPASS is OFF Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak... FIPS mode enabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak... FIPS mode already disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- memleak.sh: FIPS is ON Running server-32-libfreebl_32fpu_3-FIPS PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running selfserv under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/selfserv < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_selfserv2049.dbx memleak.sh: -------- DBX commands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_selfserv2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher c: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher d: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher e: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher i: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher j: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher k: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher n: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher v: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher y: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher z: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 7132) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 223 total size: 19624 bytes) Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] nssToken_TraverseCertificates() at 0xe95781bc [9] NSSTrustDomain_TraverseCertificates() at 0xe956dee0 [10] PK11_TraverseSlotCerts() at 0xe9526bb4 [11] CERT_GetSSLCACerts() at 0xe9516898 [12] serverCAListSetup() at 0xebd1baac [13] PR_CallOnceWithArg() at 0xe591e6c0 [14] SSL_ConfigSecureServer() at 0xebd1be48 [15] server_main() at 0x17444 [16] main() at 0x1a08c Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] nssToken_FindTrustForCertificate() at 0xe95776c4 [9] nssTrustDomain_FindTrustForCertificate() at 0xe956dfbc [10] nssTrust_GetCERTCertTrustForCert() at 0xe95730f4 [11] fill_CERTCertificateFields() at 0xe9573794 [12] STAN_GetCERTCertificate() at 0xe9573b50 [13] convert_cert() at 0xe952623c [14] nssPKIObjectCollection_Traverse() at 0xe9571acc [15] NSSTrustDomain_TraverseCertificates() at 0xe956df30 [16] PK11_TraverseSlotCerts() at 0xe9526bb4 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x11b920 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x1947c Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 31 total size: 2590 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (34.59% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x187e8 Block in use (biu): Found block of size 512 bytes at address 0x401b0 (19.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x187e8 Block in use (biu): Found 8 blocks totaling 256 bytes (9.88% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x187e8 Block in use (biu): Found block of size 128 bytes at address 0x406f0 (4.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 112 bytes at address 0xf8908 (4.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x1947c Block in use (biu): Found block of size 112 bytes at address 0x414d8 (4.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0x41430 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0x41768 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] SSL_ConfigServerSessionIDCache() at 0xebd1ec98 [5] main() at 0x19270 Block in use (biu): Found block of size 88 bytes at address 0x40680 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0xf97a0 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x1947c Block in use (biu): Found block of size 88 bytes at address 0x416f8 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] SSL_ConfigServerSessionIDCache() at 0xebd1ec90 [5] main() at 0x19270 Block in use (biu): Found block of size 32 bytes at address 0x40d88 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 32 bytes at address 0xf88d0 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x1947c Block in use (biu): Found block of size 32 bytes at address 0x414a0 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x187e8 Block in use (biu): Found block of size 20 bytes at address 0x41208 (0.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitLinker() at 0xe5911d84 [3] _PR_InitStuff() at 0xe591d5f4 [4] main() at 0x187e8 Block in use (biu): Found block of size 12 bytes at address 0x3f1b0 (0.46% of total) At time of allocation, the call stack was: [1] PR_ErrorInstallTable() at 0xe591d050 [2] _PR_InitStuff() at 0xe591d638 [3] main() at 0x187e8 Block in use (biu): Found block of size 6 bytes at address 0x3fb30 (0.23% of total) At time of allocation, the call stack was: [1] _strdup() at 0xde163720 [2] _PR_InitLinker() at 0xe5911d9c [3] _PR_InitStuff() at 0xe591d5f4 [4] main() at 0x187e8 execution completed, exit code is 0 memleak.sh: server-32-libfreebl_32fpu_3-FIPS produced a returncode of 0, expected is 0 PASSED memleak.sh: Using libfreebl_32int_3 instead of libfreebl_32fpu_3 Running server-32-libfreebl_32int_3-FIPS PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Running selfserv under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/selfserv < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_selfserv2049.dbx memleak.sh: -------- DBX commands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_selfserv2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher c: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher d: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher e: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher i: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher j: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher k: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher n: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher v: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher y: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher z: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 2496) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 223 total size: 19624 bytes) Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] nssToken_TraverseCertificates() at 0xe95781bc [9] NSSTrustDomain_TraverseCertificates() at 0xe956dee0 [10] PK11_TraverseSlotCerts() at 0xe9526bb4 [11] CERT_GetSSLCACerts() at 0xe9516898 [12] serverCAListSetup() at 0xebd1baac [13] PR_CallOnceWithArg() at 0xe591e6c0 [14] SSL_ConfigSecureServer() at 0xebd1be48 [15] server_main() at 0x17444 [16] main() at 0x1a08c Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] nssToken_FindTrustForCertificate() at 0xe95776c4 [9] nssTrustDomain_FindTrustForCertificate() at 0xe956dfbc [10] nssTrust_GetCERTCertTrustForCert() at 0xe95730f4 [11] fill_CERTCertificateFields() at 0xe9573794 [12] STAN_GetCERTCertificate() at 0xe9573b50 [13] convert_cert() at 0xe952623c [14] nssPKIObjectCollection_Traverse() at 0xe9571acc [15] NSSTrustDomain_TraverseCertificates() at 0xe956df30 [16] PK11_TraverseSlotCerts() at 0xe9526bb4 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x11b940 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x1947c Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 31 total size: 2590 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (34.59% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x187e8 Block in use (biu): Found block of size 512 bytes at address 0x401b0 (19.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x187e8 Block in use (biu): Found 8 blocks totaling 256 bytes (9.88% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x187e8 Block in use (biu): Found block of size 128 bytes at address 0x406f0 (4.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 112 bytes at address 0xf8908 (4.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x1947c Block in use (biu): Found block of size 112 bytes at address 0x414d8 (4.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0x41430 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0x41768 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] SSL_ConfigServerSessionIDCache() at 0xebd1ec98 [5] main() at 0x19270 Block in use (biu): Found block of size 88 bytes at address 0x40680 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0xf97a0 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x1947c Block in use (biu): Found block of size 88 bytes at address 0x416f8 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] SSL_ConfigServerSessionIDCache() at 0xebd1ec90 [5] main() at 0x19270 Block in use (biu): Found block of size 32 bytes at address 0x40d88 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 32 bytes at address 0xf88d0 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x1947c Block in use (biu): Found block of size 32 bytes at address 0x414a0 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x187e8 Block in use (biu): Found block of size 20 bytes at address 0x41208 (0.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitLinker() at 0xe5911d84 [3] _PR_InitStuff() at 0xe591d5f4 [4] main() at 0x187e8 Block in use (biu): Found block of size 12 bytes at address 0x3f1b0 (0.46% of total) At time of allocation, the call stack was: [1] PR_ErrorInstallTable() at 0xe591d050 [2] _PR_InitStuff() at 0xe591d638 [3] main() at 0x187e8 Block in use (biu): Found block of size 6 bytes at address 0x3fb30 (0.23% of total) At time of allocation, the call stack was: [1] _strdup() at 0xde163720 [2] _PR_InitLinker() at 0xe5911d9c [3] _PR_InitStuff() at 0xe591d5f4 [4] main() at 0x187e8 execution completed, exit code is 0 memleak.sh: server-32-libfreebl_32int_3-FIPS produced a returncode of 0, expected is 0 PASSED memleak.sh: Using libfreebl_32int64_3 instead of libfreebl_32fpu_3 Running server-32-libfreebl_32int64_3-FIPS PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Running selfserv under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/selfserv < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_selfserv2049.dbx memleak.sh: -------- DBX commands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_selfserv2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher c: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher d: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher e: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher i: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher j: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher k: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher n: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher v: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher y: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher z: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 27816) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 223 total size: 19624 bytes) Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] nssToken_TraverseCertificates() at 0xe95781bc [9] NSSTrustDomain_TraverseCertificates() at 0xe956dee0 [10] PK11_TraverseSlotCerts() at 0xe9526bb4 [11] CERT_GetSSLCACerts() at 0xe9516898 [12] serverCAListSetup() at 0xebd1baac [13] PR_CallOnceWithArg() at 0xe591e6c0 [14] SSL_ConfigSecureServer() at 0xebd1be48 [15] server_main() at 0x17444 [16] main() at 0x1a08c Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] nssToken_FindTrustForCertificate() at 0xe95776c4 [9] nssTrustDomain_FindTrustForCertificate() at 0xe956dfbc [10] nssTrust_GetCERTCertTrustForCert() at 0xe95730f4 [11] fill_CERTCertificateFields() at 0xe9573794 [12] STAN_GetCERTCertificate() at 0xe9573b50 [13] convert_cert() at 0xe952623c [14] nssPKIObjectCollection_Traverse() at 0xe9571acc [15] NSSTrustDomain_TraverseCertificates() at 0xe956df30 [16] PK11_TraverseSlotCerts() at 0xe9526bb4 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x11b910 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x1947c Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 31 total size: 2590 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (34.59% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x187e8 Block in use (biu): Found block of size 512 bytes at address 0x401b0 (19.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x187e8 Block in use (biu): Found 8 blocks totaling 256 bytes (9.88% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x187e8 Block in use (biu): Found block of size 128 bytes at address 0x406f0 (4.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 112 bytes at address 0xf8908 (4.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x1947c Block in use (biu): Found block of size 112 bytes at address 0x414d8 (4.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0x41430 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0x41768 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] SSL_ConfigServerSessionIDCache() at 0xebd1ec98 [5] main() at 0x19270 Block in use (biu): Found block of size 88 bytes at address 0x40680 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 88 bytes at address 0xf97a0 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x1947c Block in use (biu): Found block of size 88 bytes at address 0x416f8 (3.40% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] SSL_ConfigServerSessionIDCache() at 0xebd1ec90 [5] main() at 0x19270 Block in use (biu): Found block of size 32 bytes at address 0x40d88 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x187e8 Block in use (biu): Found block of size 32 bytes at address 0xf88d0 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x1947c Block in use (biu): Found block of size 32 bytes at address 0x414a0 (1.24% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x187e8 Block in use (biu): Found block of size 20 bytes at address 0x41208 (0.77% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitLinker() at 0xe5911d84 [3] _PR_InitStuff() at 0xe591d5f4 [4] main() at 0x187e8 Block in use (biu): Found block of size 12 bytes at address 0x3f1b0 (0.46% of total) At time of allocation, the call stack was: [1] PR_ErrorInstallTable() at 0xe591d050 [2] _PR_InitStuff() at 0xe591d638 [3] main() at 0x187e8 Block in use (biu): Found block of size 6 bytes at address 0x3fb30 (0.23% of total) At time of allocation, the call stack was: [1] _strdup() at 0xde163720 [2] _PR_InitLinker() at 0xe5911d9c [3] _PR_InitStuff() at 0xe591d5f4 [4] main() at 0x187e8 execution completed, exit code is 0 memleak.sh: server-32-libfreebl_32int64_3-FIPS produced a returncode of 0, expected is 0 PASSED memleak.sh: Memory leak checking - client =============================== memleak.sh: BYPASS is OFF Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak... FIPS mode disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak... FIPS mode already disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- memleak.sh: FIPS is OFF Running client-32-libfreebl_32fpu_3-NORMAL PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running selfserv: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher A under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com (process id 23178) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher B under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com (process id 23202) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher C under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com (process id 23226) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher D under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com (process id 23250) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher E under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com (process id 23274) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher F under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com (process id 23298) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C001 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com (process id 23322) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C002 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com (process id 23346) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C003 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com (process id 23370) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C004 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com (process id 23394) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C005 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com (process id 23418) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C006 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com (process id 23442) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C007 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com (process id 23466) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C008 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com (process id 23490) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C009 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com (process id 23514) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C00A under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com (process id 23538) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C010 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com (process id 23562) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C011 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com (process id 23586) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C012 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com (process id 23610) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C013 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com (process id 23634) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C014 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com (process id 23658) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher c under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com (process id 23682) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher d under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com (process id 23706) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher e under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com (process id 23730) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher f under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com (process id 23754) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher g under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com (process id 23778) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher i under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com (process id 23802) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher j under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com (process id 23826) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher k under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com (process id 23850) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher l under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com (process id 23874) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher m under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com (process id 23898) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher n under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com (process id 23922) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher v under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com (process id 23946) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher y under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com (process id 23970) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher z under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com (process id 23994) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80158 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF selfserv: normal termination memleak.sh: client-32-libfreebl_32fpu_3-NORMAL produced a returncode of 0, expected is 0 PASSED memleak.sh: Using libfreebl_32int_3 instead of libfreebl_32fpu_3 Running client-32-libfreebl_32int_3-NORMAL PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Running selfserv: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher A under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com (process id 11602) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher B under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com (process id 11626) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher C under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com (process id 11650) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher D under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com (process id 11674) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher E under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com (process id 11698) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher F under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com (process id 11722) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C001 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com (process id 11748) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C002 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com (process id 11772) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C003 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com (process id 11796) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C004 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com (process id 11820) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C005 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com (process id 11844) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C006 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com (process id 11868) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C007 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com (process id 11892) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C008 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com (process id 11916) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C009 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com (process id 11940) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C00A under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com (process id 11964) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C010 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com (process id 11988) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C011 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com (process id 12012) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C012 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com (process id 12036) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C013 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com (process id 12060) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C014 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com (process id 12084) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher c under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com (process id 12108) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher d under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com (process id 12132) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher e under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com (process id 12156) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher f under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com (process id 12180) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher g under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com (process id 12204) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher i under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com (process id 12228) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher j under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com (process id 12252) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher k under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com (process id 12276) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher l under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com (process id 12300) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher m under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com (process id 12324) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher n under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com (process id 12348) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher v under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com (process id 12372) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher y under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com (process id 12396) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher z under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com (process id 12420) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF selfserv: normal termination memleak.sh: client-32-libfreebl_32int_3-NORMAL produced a returncode of 0, expected is 0 PASSED memleak.sh: Using libfreebl_32int64_3 instead of libfreebl_32fpu_3 Running client-32-libfreebl_32int64_3-NORMAL PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Running selfserv: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher A under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com (process id 29995) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher B under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com (process id 25) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher C under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com (process id 49) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher D under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com (process id 73) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher E under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com (process id 97) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher F under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com (process id 123) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C001 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com (process id 150) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C002 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com (process id 174) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C003 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com (process id 198) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C004 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com (process id 222) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C005 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com (process id 246) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C006 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com (process id 270) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C007 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com (process id 298) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C008 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com (process id 327) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C009 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com (process id 355) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C00A under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com (process id 379) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C010 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com (process id 404) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C011 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com (process id 429) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C012 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com (process id 453) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C013 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com (process id 479) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C014 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com (process id 508) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher c under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com (process id 532) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher d under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com (process id 560) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher e under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com (process id 584) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher f under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com (process id 608) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher g under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com (process id 633) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher i under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com (process id 657) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher j under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com (process id 683) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher k under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com (process id 707) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher l under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com (process id 731) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher m under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com (process id 755) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher n under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com (process id 779) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher v under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com (process id 803) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher y under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com (process id 827) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher z under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com (process id 851) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x80138 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF selfserv: normal termination memleak.sh: client-32-libfreebl_32int64_3-NORMAL produced a returncode of 0, expected is 0 PASSED memleak.sh: BYPASS is ON Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak... FIPS mode already disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak... FIPS mode already disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- memleak.sh: FIPS is OFF Running client-32-libfreebl_32fpu_3-BYPASS PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running selfserv: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher A under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com (process id 18420) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher B under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com (process id 18444) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher C under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com (process id 18468) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher D under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com (process id 18492) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher E under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com (process id 18516) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher F under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com (process id 18540) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C001 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com (process id 18564) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C002 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com (process id 18588) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C003 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com (process id 18612) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C004 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com (process id 18636) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C005 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com (process id 18660) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C006 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com (process id 18684) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C007 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com (process id 18708) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C008 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com (process id 18732) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C009 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com (process id 18756) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C00A under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com (process id 18780) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C010 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com (process id 18804) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C011 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com (process id 18828) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C012 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com (process id 18852) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C013 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com (process id 18876) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C014 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com (process id 18900) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher c under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com (process id 18924) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher d under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com (process id 18948) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher e under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com (process id 18972) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher f under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com (process id 18996) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher g under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com (process id 19020) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher i under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com (process id 19044) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher j under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com (process id 19068) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher k under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com (process id 19092) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher l under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com (process id 19116) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher m under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com (process id 19140) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher n under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com (process id 19164) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher v under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com (process id 19188) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher y under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com (process id 19212) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher z under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com (process id 19236) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d80 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c558 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c738 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF selfserv: normal termination memleak.sh: client-32-libfreebl_32fpu_3-BYPASS produced a returncode of 0, expected is 0 PASSED memleak.sh: Using libfreebl_32int_3 instead of libfreebl_32fpu_3 Running client-32-libfreebl_32int_3-BYPASS PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Running selfserv: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher A under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com (process id 6853) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher B under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com (process id 6877) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher C under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com (process id 6901) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher D under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com (process id 6925) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher E under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com (process id 6949) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher F under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com (process id 6973) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C001 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com (process id 6997) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C002 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com (process id 7021) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C003 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com (process id 7045) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C004 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com (process id 7069) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C005 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com (process id 7093) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C006 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com (process id 7117) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C007 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com (process id 7141) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C008 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com (process id 7165) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C009 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com (process id 7189) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C00A under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com (process id 7213) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C010 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com (process id 7237) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C011 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com (process id 7261) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C012 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com (process id 7285) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C013 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com (process id 7309) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C014 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com (process id 7333) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher c under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com (process id 7357) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher d under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com (process id 7381) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher e under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com (process id 7405) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher f under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com (process id 7429) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher g under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com (process id 7453) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher i under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com (process id 7477) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher j under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com (process id 7501) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher k under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com (process id 7525) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher l under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com (process id 7549) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher m under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com (process id 7573) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher n under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com (process id 7597) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher v under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com (process id 7621) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher y under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com (process id 7645) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher z under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com (process id 7669) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF selfserv: normal termination memleak.sh: client-32-libfreebl_32int_3-BYPASS produced a returncode of 0, expected is 0 PASSED memleak.sh: Using libfreebl_32int64_3 instead of libfreebl_32fpu_3 Running client-32-libfreebl_32int64_3-BYPASS PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Running selfserv: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher A under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C A simplify.red.iplanet.com (process id 25246) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher B under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C B simplify.red.iplanet.com (process id 25270) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher C under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C C simplify.red.iplanet.com (process id 25294) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher D under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C D simplify.red.iplanet.com (process id 25318) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher E under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C E simplify.red.iplanet.com (process id 25342) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher F under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C F simplify.red.iplanet.com (process id 25366) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C001 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C001 simplify.red.iplanet.com (process id 25390) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C002 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C002 simplify.red.iplanet.com (process id 25414) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C003 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C003 simplify.red.iplanet.com (process id 25438) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C004 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C004 simplify.red.iplanet.com (process id 25462) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C005 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C005 simplify.red.iplanet.com (process id 25486) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C006 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C006 simplify.red.iplanet.com (process id 25510) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C007 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C007 simplify.red.iplanet.com (process id 25534) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C008 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C008 simplify.red.iplanet.com (process id 25558) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C009 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C009 simplify.red.iplanet.com (process id 25582) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C00A under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C00A simplify.red.iplanet.com (process id 25606) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C010 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C010 simplify.red.iplanet.com (process id 25630) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C011 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C011 simplify.red.iplanet.com (process id 25654) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C012 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C012 simplify.red.iplanet.com (process id 25678) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C013 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C013 simplify.red.iplanet.com (process id 25702) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C014 under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C :C014 simplify.red.iplanet.com (process id 25726) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher c under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com (process id 25750) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher d under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com (process id 25774) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher e under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com (process id 25798) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher f under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C f simplify.red.iplanet.com (process id 25822) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher g under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C g simplify.red.iplanet.com (process id 25846) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher i under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com (process id 25870) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher j under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com (process id 25894) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher k under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com (process id 25918) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher l under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C l simplify.red.iplanet.com (process id 25942) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher m under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C m simplify.red.iplanet.com (process id 25966) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher n under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com (process id 25990) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher v under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com (process id 26014) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher y under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com (process id 26038) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 0 memleak.sh: -------- Trying cipher z under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com (process id 26062) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x72d40 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x7c538 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x7c718 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x7c6d8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 0 PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF selfserv: normal termination memleak.sh: client-32-libfreebl_32int64_3-BYPASS produced a returncode of 0, expected is 0 PASSED memleak.sh: BYPASS is OFF Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak... FIPS mode already disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak... FIPS mode enabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- memleak.sh: FIPS is ON Running client-32-libfreebl_32fpu_3-FIPS PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running selfserv: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher c under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com (process id 13669) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621c8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x6e298 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a8e0 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8a0 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher d under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com (process id 13693) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621c8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x6e298 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a8e0 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8a0 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher e under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com (process id 13717) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621c8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x6e298 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a8e0 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8a0 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher i under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com (process id 13741) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621f0 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x6e2c0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a908 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8c8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher j under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com (process id 13765) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621c8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x6e298 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a8e0 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8a0 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher k under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com (process id 13789) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621c8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x6e298 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a8e0 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8a0 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher n under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com (process id 13813) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621c8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x6e298 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a8e0 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8a0 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher v under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com (process id 13837) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621c8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x6e298 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a8e0 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8a0 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher y under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com (process id 13861) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621c8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x6e298 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a8e0 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8a0 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher z under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com (process id 13885) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621c8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc79153d4 [4] 0xc7914b10 [5] 0xc79155c8 [6] 0xc7914328 [7] 0xc7913608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x6e298 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a8e0 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8a0 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 execution completed, exit code is 1 PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF selfserv: normal termination memleak.sh: client-32-libfreebl_32fpu_3-FIPS produced a returncode of 0, expected is 0 PASSED memleak.sh: Using libfreebl_32int_3 instead of libfreebl_32fpu_3 Running client-32-libfreebl_32int_3-FIPS PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Running selfserv: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher c under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com (process id 28032) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x62238 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x6e308 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a950 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a910 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher d under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com (process id 28056) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x62238 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x6e308 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a950 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a910 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher e under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com (process id 28080) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x62238 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x6e308 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a950 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a910 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher i under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com (process id 28104) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621f8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x6e2f8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a940 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a900 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher j under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com (process id 28128) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x62220 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x6e2f0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a938 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher k under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com (process id 28152) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621f0 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x6e2f0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a938 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8f8 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher n under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com (process id 28176) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x62238 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x6e308 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a950 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a910 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher v under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com (process id 28200) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x62238 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x6e308 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a950 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a910 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher y under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com (process id 28224) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x62238 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x6e308 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a950 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a910 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher z under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com (process id 28248) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621f8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x6e2f8 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a940 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a900 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 1 PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF selfserv: normal termination memleak.sh: client-32-libfreebl_32int_3-FIPS produced a returncode of 0, expected is 0 PASSED memleak.sh: Using libfreebl_32int64_3 instead of libfreebl_32fpu_3 Running client-32-libfreebl_32int64_3-FIPS PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Running selfserv: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/server_memleak -n simplify.red.iplanet.com -e simplify.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher c under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C c simplify.red.iplanet.com (process id 12432) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621e8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x6e280 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a8d0 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a890 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher d under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C d simplify.red.iplanet.com (process id 12456) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621c8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x6e298 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a8e0 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8a0 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher e under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C e simplify.red.iplanet.com (process id 12480) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621e8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x6e2b0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a900 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8c0 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher i under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C i simplify.red.iplanet.com (process id 12504) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621e8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x6e280 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a8d0 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a890 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher j under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C j simplify.red.iplanet.com (process id 12528) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621e8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x6e2b0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a900 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8c0 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher k under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C k simplify.red.iplanet.com (process id 12552) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621c8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x6e298 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a8e0 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8a0 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher n under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C n simplify.red.iplanet.com (process id 12576) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621e8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x6e2b0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a900 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8c0 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher v under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C v simplify.red.iplanet.com (process id 12600) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621c8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x6e298 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a8e0 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8a0 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher y under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C y simplify.red.iplanet.com (process id 12624) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621e8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x6e2b0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a900 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8c0 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 execution completed, exit code is 1 memleak.sh: -------- Trying cipher z under DBX: /usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/run_strsclnt2049.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss -c 1000 -C z simplify.red.iplanet.com (process id 12648) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x621e8 At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] 0xc8d153d4 [4] 0xc8d14b10 [5] 0xc8d155c8 [6] 0xc8d14328 [7] 0xc8d13608 [8] pk11_FindObjectByTemplate() at 0xe9536bc0 [9] pk11_isRootSlot() at 0xe9543c58 [10] PK11_InitSlot() at 0xe9543dc8 [11] SECMOD_LoadPKCS11Module() at 0xe952ce9c [12] SECMOD_LoadModule() at 0xe953a0b0 [13] SECMOD_LoadModule() at 0xe953a110 [14] nss_Init() at 0xe950e608 [15] NSS_Initialize() at 0xe950e8d0 [16] main() at 0x187a0 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3329 bytes) Block in use (biu): Found 8 blocks totaling 896 bytes (26.91% of total; avg block size 112) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 512 bytes at address 0x3dc70 (15.38% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] _PR_InitTPD() at 0xe5911958 [3] _PR_InitStuff() at 0xe591d584 [4] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 448 bytes (13.46% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 8 blocks totaling 256 bytes (7.69% of total; avg block size 32) At time of each allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] ExpandMonitorCache() at 0xe5910e44 [4] _PR_InitCMon() at 0xe5911310 [5] _PR_InitStuff() at 0xe591d5d4 [6] main() at 0x180c0 Block in use (biu): Found block of size 128 bytes at address 0x3e1b0 (3.84% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910e18 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 112 bytes at address 0x3f1c0 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 112 bytes at address 0x3ef98 (3.36% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d44 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x3eef0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_UnixInit() at 0xe593201c [4] main() at 0x180c0 Block in use (biu): Found block of size 88 bytes at address 0x40048 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] InitializeArenas() at 0xe6d009ec [4] PR_CallOnce() at 0xe591e33c [5] LockArena() at 0xe6d00a50 [6] PL_ArenaAllocate() at 0xe6d00b48 [7] PORT_ArenaAlloc() at 0xe9567c5c [8] secmod_NewModule() at 0xe95399e0 [9] SECMOD_CreateModule() at 0xe9539ab8 [10] SECMOD_LoadModule() at 0xe953a028 [11] nss_Init() at 0xe950e608 [12] NSS_Initialize() at 0xe950e8d0 [13] main() at 0x187a0 Block in use (biu): Found block of size 88 bytes at address 0x6e2b0 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] __nss_InitLock() at 0xe955f910 [4] ssl_LookupSID() at 0xebd1a4e8 [5] ssl2_BeginClientHandshake() at 0xebd17ef8 [6] ssl_Do1stHandshake() at 0xebd1ace4 [7] ssl_SecureSend() at 0xebd1cb9c [8] ssl_Send() at 0xebd22ca0 [9] do_connects() at 0x166a4 [10] thread_wrapper() at 0x14d48 [11] _pt_root() at 0xe592fdc8 [12] _lwp_start() at 0xf35c04f4 Block in use (biu): Found block of size 88 bytes at address 0x3e140 (2.64% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewLock() at 0xe5928714 [3] _PR_InitCMon() at 0xe59112f8 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found 7 blocks totaling 78 bytes (2.34% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc90 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 64 bytes at address 0x6a900 (1.92% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] fgetnetconfig() at 0xe312dbc4 [3] getnetlist() at 0xe312da4c [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 48 bytes (1.44% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312dc58 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found 7 blocks totaling 43 bytes (1.29% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] fgetnetconfig() at 0xe312db60 [3] getnetlist() at 0xe312da68 [4] setnetconfig() at 0xe312d51c [5] __rpc_getconfip() at 0xe31483d0 [6] getipnodebyname() at 0xe31240c8 [7] get_addr() at 0xe1d04824 [8] _getaddrinfo() at 0xe1d04678 [9] PR_GetAddrInfoByName() at 0xe5920474 [10] client_main() at 0x17130 [11] main() at 0x18890 Block in use (biu): Found block of size 36 bytes at address 0x6a8c0 (1.08% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xe312da04 [2] setnetconfig() at 0xe312d51c [3] __rpc_getconfip() at 0xe31483d0 [4] getipnodebyname() at 0xe31240c8 [5] get_addr() at 0xe1d04824 [6] _getaddrinfo() at 0xe1d04678 [7] PR_GetAddrInfoByName() at 0xe5920474 [8] client_main() at 0x17130 [9] main() at 0x18890 Block in use (biu): Found 3 blocks totaling 33 bytes (0.99% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xde163720 [2] getlookups() at 0xe312e4c8 [3] fgetnetconfig() at 0xe312dcd4 [4] getnetlist() at 0xe312da68 [5] setnetconfig() at 0xe312d51c [6] __rpc_getconfip() at 0xe31483d0 [7] getipnodebyname() at 0xe31240c8 [8] get_addr() at 0xe1d04824 [9] _getaddrinfo() at 0xe1d04678 [10] PR_GetAddrInfoByName() at 0xe5920474 [11] client_main() at 0x17130 [12] main() at 0x18890 Block in use (biu): Found block of size 32 bytes at address 0x3f188 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] OCSP_InitGlobal() at 0xe9511450 [4] nss_Init() at 0xe950e420 [5] NSS_Initialize() at 0xe950e8d0 [6] main() at 0x187a0 Block in use (biu): Found block of size 32 bytes at address 0x3e848 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] ExpandMonitorCache() at 0xe5910fb8 [3] _PR_InitCMon() at 0xe5911310 [4] _PR_InitStuff() at 0xe591d5d4 [5] main() at 0x180c0 Block in use (biu): Found block of size 32 bytes at address 0x3ef60 (0.96% of total) At time of allocation, the call stack was: [1] calloc() at 0xde141028 [2] PR_NewMonitor() at 0xe5928d18 [3] _PR_UnixInit() at 0xe5932038 [4] main() at 0x180c0 execution completed, exit code is 1 PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_sparc,v11.0/SUNWspro/bin LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/tmp2049 memleak.sh: -------- Stopping server: tstclnt -p 8447 -h simplify.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/simplify.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=simplify.red.iplanet.com,E=simplify.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF selfserv: normal termination memleak.sh: client-32-libfreebl_32int64_3-FIPS produced a returncode of 0, expected is 0 PASSED TinderboxPrint:OPT Lk bytes: 21912 TinderboxPrint:OPT Lk blocks: 249 TIMESTAMP memleak END: Tue Oct 2 09:40:12 PDT 2007