[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #11276 [Tor]: openssl_mutexes_ leaked from setup_openssl_threading()
#11276: openssl_mutexes_ leaked from setup_openssl_threading()
--------------------+------------------------------------
Reporter: arma | Owner:
Type: defect | Status: new
Priority: normal | Milestone: Tor: 0.2.5.x-final
Component: Tor | Version:
Keywords: | Actual Points:
Parent ID: | Points:
--------------------+------------------------------------
On moria1, I found this leak:
{{{
==7518== 1,872 (312 direct, 1,560 indirect) bytes in 1 blocks are
definitely lost in loss record 29 of 32
==7518== at 0x4C244E8: malloc (vg_replace_malloc.c:236)
==7518== by 0x501A87: tor_malloc_ (util.c:162)
==7518== by 0x50BC5A: crypto_early_init (crypto.c:3167)
==7518== by 0x42B3FF: tor_init (main.c:2330)
==7518== by 0x42C55A: tor_main (main.c:2859)
==7518== by 0x5EFEC8C: (below main) (libc-start.c:228)
}}}
That line is:
{{{
openssl_mutexes_ = tor_malloc(n*sizeof(tor_mutex_t *));
}}}
which appears to only be called from crypto_early_init(), which checks
this to make sure it's never called more than once:
{{{
if (!crypto_early_initialized_) {
}}}
But (ah ha), what sets crypto_early_initialized_ to 1 afterwards?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11276>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs