memleak.sh: -------- Trying cipher A under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C A biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C A biarritz.red.iplanet.com (process id 15962) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher B under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C B biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C B biarritz.red.iplanet.com (process id 15986) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher C under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C C biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C C biarritz.red.iplanet.com (process id 16010) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 execution completed, exit code is 0 memleak.sh: -------- Trying cipher D under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C D biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C D biarritz.red.iplanet.com (process id 16034) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher E under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C E biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C E biarritz.red.iplanet.com (process id 16058) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher F under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C F biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C F biarritz.red.iplanet.com (process id 16082) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C001 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C001 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C001 biarritz.red.iplanet.com (process id 16107) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C002 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C002 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C002 biarritz.red.iplanet.com (process id 16131) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C003 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C003 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C003 biarritz.red.iplanet.com (process id 16155) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C004 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C004 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C004 biarritz.red.iplanet.com (process id 16179) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C005 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C005 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C005 biarritz.red.iplanet.com (process id 16203) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C006 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C006 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C006 biarritz.red.iplanet.com (process id 16227) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C007 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C007 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C007 biarritz.red.iplanet.com (process id 16251) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C008 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C008 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C008 biarritz.red.iplanet.com (process id 16275) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C009 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C009 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C009 biarritz.red.iplanet.com (process id 16299) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C00A under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C00A biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C00A biarritz.red.iplanet.com (process id 16323) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C010 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C010 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C010 biarritz.red.iplanet.com (process id 16347) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C011 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C011 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C011 biarritz.red.iplanet.com (process id 16371) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C012 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C012 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C012 biarritz.red.iplanet.com (process id 16395) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C013 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C013 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C013 biarritz.red.iplanet.com (process id 16419) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C014 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C014 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C014 biarritz.red.iplanet.com (process id 16443) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher c under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C c biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C c biarritz.red.iplanet.com (process id 16467) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher d under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C d biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C d biarritz.red.iplanet.com (process id 16491) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher e under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C e biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C e biarritz.red.iplanet.com (process id 16515) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher f under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C f biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C f biarritz.red.iplanet.com (process id 16539) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher g under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C g biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C g biarritz.red.iplanet.com (process id 16563) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher i under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C i biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C i biarritz.red.iplanet.com (process id 16587) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher j under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C j biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C j biarritz.red.iplanet.com (process id 16611) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher k under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C k biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C k biarritz.red.iplanet.com (process id 16635) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher l under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C l biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C l biarritz.red.iplanet.com (process id 16659) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher m under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C m biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C m biarritz.red.iplanet.com (process id 16683) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher n under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C n biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C n biarritz.red.iplanet.com (process id 16707) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher v under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C v biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C v biarritz.red.iplanet.com (process id 16731) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher y under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C y biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C y biarritz.red.iplanet.com (process id 16755) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher z under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C z biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C z biarritz.red.iplanet.com (process id 16779) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64 LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Stopping server: tstclnt -p 8447 -h biarritz.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=biarritz.red.iplanet.com,E=biarritz.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF