> ```
> void ocall_free([user_check]void* p);
> -----
> #[no_mangle]
> pub extern "C" fn ocall_free(p: *mut libc::c_void) {
>    println!("addr: {:?}", p);
>    unsafe { libc::free(p) }
> }   
> ```

before you call `ocall-free`, what is the pointer's value? is it pointing to an 
unsafe buffer? can i pass the sgx_is_outside_enclave check?

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/apache/incubator-teaclave-sgx-sdk/issues/251#issuecomment-647834295

Reply via email to