> ```
> void ocall_free([user_check]void* p);
> -----
> #[no_mangle]
> pub extern "C" fn ocall_free(p: *mut libc::c_void) {
> println!("addr: {:?}", p);
> unsafe { libc::free(p) }
> }
> ```
before you call `ocall-free`, what is the pointer's value? is it pointing to an
unsafe buffer? can i pass the sgx_is_outside_enclave check?
--
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/apache/incubator-teaclave-sgx-sdk/issues/251#issuecomment-647834295