All of lore.kernel.org
 help / color / mirror / Atom feed
* Re: [tpm2] Memory Leak stemming from Esys_Initialize
@ 2019-08-21 17:08 Timothy Le
  0 siblings, 0 replies; 3+ messages in thread
From: Timothy Le @ 2019-08-21 17:08 UTC (permalink / raw)
  To: tpm2

[-- Attachment #1: Type: text/plain, Size: 830 bytes --]

Hi,
Thank you for your e-mail. I have the most recent version of TSS, including the changes to the test made yesterday. I still have the same leak (memory allocated in CRYPTO_malloc and also CRYPTO_REALLOC) are not freed.



On 8/19/19, 11:19 AM, "Tadeusz Struk" <tadeusz.struk(a)intel.com> wrote:

    Hi Timothy,
    On 8/16/19 3:33 PM, Timothy Le wrote:
    > It seems that there is memory getting allocated in CRYPO_malloc that Esys_Finalize is not freeing. I have traced the code, but I don’t have access to EVP_add_digest and the other inner function calls. Would someone be able to give me advice on how to free this memory?
    
    Could you specify what version of TSS are you using?
    There was number of fixes merged in recently to fix these leaks.
    
    Thanks,
    -- 
    Tadeusz
    


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [tpm2] Memory Leak stemming from Esys_Initialize
@ 2019-08-19 18:19 Tadeusz Struk
  0 siblings, 0 replies; 3+ messages in thread
From: Tadeusz Struk @ 2019-08-19 18:19 UTC (permalink / raw)
  To: tpm2

[-- Attachment #1: Type: text/plain, Size: 473 bytes --]

Hi Timothy,
On 8/16/19 3:33 PM, Timothy Le wrote:
> It seems that there is memory getting allocated in CRYPO_malloc that Esys_Finalize is not freeing. I have traced the code, but I don’t have access to EVP_add_digest and the other inner function calls. Would someone be able to give me advice on how to free this memory?

Could you specify what version of TSS are you using?
There was number of fixes merged in recently to fix these leaks.

Thanks,
-- 
Tadeusz

^ permalink raw reply	[flat|nested] 3+ messages in thread

* [tpm2] Memory Leak stemming from Esys_Initialize
@ 2019-08-16 22:33 Timothy Le
  0 siblings, 0 replies; 3+ messages in thread
From: Timothy Le @ 2019-08-16 22:33 UTC (permalink / raw)
  To: tpm2

[-- Attachment #1: Type: text/plain, Size: 1362 bytes --]

Hello,

I am working on a program that involves using Esys_Initialize. After calling Esys_Initialize and running the rest of the program, I call Esys_Finalize. However, I have the following output from valgrind:


==14825== 24 bytes in 1 blocks are still reachable in loss record 518 of 545

==14825==    at 0x4C2DB8F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)

==14825==    by 0x5969E77: CRYPTO_malloc (in /lib/x86_64-linux-gnu/libcrypto.so.1.0.0)

==14825==    by 0x5A21F85: lh_insert (in /lib/x86_64-linux-gnu/libcrypto.so.1.0.0)

==14825==    by 0x596CC54: OBJ_NAME_add (in /lib/x86_64-linux-gnu/libcrypto.so.1.0.0)

==14825==    by 0x5A2C565: EVP_add_digest (in /lib/x86_64-linux-gnu/libcrypto.so.1.0.0)

==14825==    by 0x5A30F4A: OpenSSL_add_all_digests (in /lib/x86_64-linux-gnu/libcrypto.so.1.0.0)

==14825==    by 0x50CC9FE: iesys_cryptossl_init (esys_crypto_ossl.c:1118)

==14825==    by 0x50BDE5B: iesys_initialize_crypto (esys_crypto.c:537)

==14825==    by 0x50BB474: Esys_Initialize (esys_context.c:81)

It seems that there is memory getting allocated in CRYPO_malloc that Esys_Finalize is not freeing. I have traced the code, but I don’t have access to EVP_add_digest and the other inner function calls. Would someone be able to give me advice on how to free this memory?

Thank you

Timothy

[-- Attachment #2: attachment.html --]
[-- Type: text/html, Size: 5101 bytes --]

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2019-08-21 17:08 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-08-21 17:08 [tpm2] Memory Leak stemming from Esys_Initialize Timothy Le
  -- strict thread matches above, loose matches on Subject: below --
2019-08-19 18:19 Tadeusz Struk
2019-08-16 22:33 Timothy Le

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.