<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>QorIQのトピックFragmentation or memory leak in Secure World?</title>
    <link>https://community.nxp.com/t5/QorIQ/Fragmentation-or-memory-leak-in-Secure-World/m-p/2181371#M12440</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I faced an Out-of-Memory (OOM) issue when I ran a test program to read the secure blob stored via a trusted application (TA).&lt;/P&gt;&lt;P&gt;I carefully observed the code, but I couldn't find any memory vulnerability.&lt;/P&gt;&lt;P&gt;The test program reads the symmetric keys and decrypts some of them with the given key through the TA.&lt;/P&gt;&lt;P&gt;It happened after at least 15 mins of execution, there was no error log from the TA and tee-os (only debugging message appeared).&lt;/P&gt;&lt;P&gt;I initially suspected that it came from memory leak, but it became less likely because of lack of error messages from TA and tee-os.&lt;/P&gt;&lt;P&gt;In other words, if there is memory leak at explicit allocation (e.g., via TEE_Malloc) from customized TA, it should be captured, but I've never seen such error messages in the TA.&lt;/P&gt;&lt;P&gt;Another pointer is that I used bstats() to see total free memory and maximum free memory before/after open_session, close_session, and command, all the memory was quite stable during the execution, but after giving&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have two questions regarding this.&lt;BR /&gt;- Is there an API to debug memory (in use vs free) in each TA.&lt;BR /&gt;- How fragmentation has been handled in qoriq-optee-os. Are there known issues regarding fragmentation issues if there are many calls to TA?&lt;/P&gt;</description>
    <pubDate>Tue, 07 Oct 2025 17:08:09 GMT</pubDate>
    <dc:creator>matt1024</dc:creator>
    <dc:date>2025-10-07T17:08:09Z</dc:date>
    <item>
      <title>Fragmentation or memory leak in Secure World?</title>
      <link>https://community.nxp.com/t5/QorIQ/Fragmentation-or-memory-leak-in-Secure-World/m-p/2181371#M12440</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I faced an Out-of-Memory (OOM) issue when I ran a test program to read the secure blob stored via a trusted application (TA).&lt;/P&gt;&lt;P&gt;I carefully observed the code, but I couldn't find any memory vulnerability.&lt;/P&gt;&lt;P&gt;The test program reads the symmetric keys and decrypts some of them with the given key through the TA.&lt;/P&gt;&lt;P&gt;It happened after at least 15 mins of execution, there was no error log from the TA and tee-os (only debugging message appeared).&lt;/P&gt;&lt;P&gt;I initially suspected that it came from memory leak, but it became less likely because of lack of error messages from TA and tee-os.&lt;/P&gt;&lt;P&gt;In other words, if there is memory leak at explicit allocation (e.g., via TEE_Malloc) from customized TA, it should be captured, but I've never seen such error messages in the TA.&lt;/P&gt;&lt;P&gt;Another pointer is that I used bstats() to see total free memory and maximum free memory before/after open_session, close_session, and command, all the memory was quite stable during the execution, but after giving&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have two questions regarding this.&lt;BR /&gt;- Is there an API to debug memory (in use vs free) in each TA.&lt;BR /&gt;- How fragmentation has been handled in qoriq-optee-os. Are there known issues regarding fragmentation issues if there are many calls to TA?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Oct 2025 17:08:09 GMT</pubDate>
      <guid>https://community.nxp.com/t5/QorIQ/Fragmentation-or-memory-leak-in-Secure-World/m-p/2181371#M12440</guid>
      <dc:creator>matt1024</dc:creator>
      <dc:date>2025-10-07T17:08:09Z</dc:date>
    </item>
    <item>
      <title>Re: Fragmentation or memory leak in Secure World?</title>
      <link>https://community.nxp.com/t5/QorIQ/Fragmentation-or-memory-leak-in-Secure-World/m-p/2248729#M12441</link>
      <description>&lt;P&gt;Have you do long time test with plain text big buffer?Maybe no secure big buffer&amp;nbsp;&lt;SPAN&gt;memory leak, also.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Nov 2025 01:01:04 GMT</pubDate>
      <guid>https://community.nxp.com/t5/QorIQ/Fragmentation-or-memory-leak-in-Secure-World/m-p/2248729#M12441</guid>
      <dc:creator>zhxyu</dc:creator>
      <dc:date>2025-11-26T01:01:04Z</dc:date>
    </item>
  </channel>
</rss>

