Yes this is too early. I would expect these functions ti be called in the
destructor of your ssl stream object
Can you confirm that this is actually destroyed?
Maybe put a breakpoint in the destructor of asio::ssl::stream ?

On Fri, 4 Mar 2022 at 08:34, Sandeep Bhardwaj via Boost-users <
boost-users@lists.boost.org> wrote:

> My bad. I probably spoke too soon. It is resulting in invalid write.
>
>
>
> On Fri, 4 Mar 2022 at 11:21, Sandeep Bhardwaj <sandybharbl...@gmail.com>
> wrote:
>
>> I have added some code in on_shutdown to get the session object and free
>> it explicitly. The same stack is not observed in the valgrind report
>> anymore.
>> Is this fine? any comments?
>>
>>     void
>>     on_shutdown(beast::error_code ec)
>>     {
>>         if(ec)
>>             return fail(ec, "shutdown");
>>
>>
>>
>>
>> *        std::cout<<"Shutting down"<<std::endl;        SSL *ssl =
>> stream_.native_handle();        SSL_SESSION *session_object =
>> SSL_get_session(ssl);        SSL_SESSION_free(session_object);*
>>         // At this point the connection is closed gracefully
>>     }
>>
>> On Fri, 4 Mar 2022 at 01:53, Richard Hodges via Boost-users <
>> boost-users@lists.boost.org> wrote:
>>
>>>
>>>
>>> On Thu, 3 Mar 2022 at 18:25, Sandeep Bhardwaj via Boost-users <
>>> boost-users@lists.boost.org> wrote:
>>>
>>>> Hi,
>>>>
>>>>   I tried the async program as suggested and I still see one of the
>>>> stacks where the "still reachable" memory keeps increasing with duration. I
>>>> have attached the relevant stack and the program. Sorry I had to resend
>>>> this email multiple times due to size limitations. Hopefully this will go
>>>> through.
>>>>
>>>
>>> It's entirely possible that OpenSSL caches memory, which would be beyond
>>> the responsibility of Beast or Asio.
>>>
>>> I don't see anything controversial in your program.
>>>
>>> I see this on stack overflow, but no answers:
>>>
>>> https://stackoverflow.com/questions/56355690/valgrind-reports-memory-leak-related-with-crypto-zalloc-in-a-c-app-but-no-addi
>>>
>>>
>>>
>>>
>>>>
>>>>
>>>>
>>>>
>>>> On Fri, 4 Feb 2022 at 12:28, Sandeep Bhardwaj <sandybharbl...@gmail.com>
>>>> wrote:
>>>>
>>>>> Thanks a lot. I will give it a try.
>>>>>
>>>>> On Thu, 3 Feb 2022 at 23:15, Vinnie Falco <vinnie.fa...@gmail.com>
>>>>> wrote:
>>>>>
>>>>>> On Thu, Feb 3, 2022 at 9:41 AM Sandeep Bhardwaj via Boost-users
>>>>>> <boost-users@lists.boost.org> wrote:
>>>>>> > http_server_sync_ssl.cpp
>>>>>>
>>>>>> Oh, right. Synchronous APIs have no way to time out. So if the remote
>>>>>> host does not close gracefully (i.e. just slams the connection shut)
>>>>>> then you will be left with a connection object which either has no way
>>>>>> to be destroyed, or has to wait what could be a very long time (up to
>>>>>> 2 hours) for the operating system to time out the synchronous read.
>>>>>>
>>>>>> Please try the asynchronous example, http_server_async_ssl.cpp and
>>>>>> determine if the problem persists.
>>>>>>
>>>>>> Thanks
>>>>>>
>>>>> _______________________________________________
>>>> Boost-users mailing list
>>>> Boost-users@lists.boost.org
>>>> https://lists.boost.org/mailman/listinfo.cgi/boost-users
>>>>
>>> _______________________________________________
>>> Boost-users mailing list
>>> Boost-users@lists.boost.org
>>> https://lists.boost.org/mailman/listinfo.cgi/boost-users
>>>
>> _______________________________________________
> Boost-users mailing list
> Boost-users@lists.boost.org
> https://lists.boost.org/mailman/listinfo.cgi/boost-users
>
-- 
Richard Hodges
hodge...@gmail.com
office: +44 2032 898 513
home: +376 861 195
mobile: +376 380 212
_______________________________________________
Boost-users mailing list
Boost-users@lists.boost.org
https://lists.boost.org/mailman/listinfo.cgi/boost-users

Reply via email to