diff options
author | Mike Rapoport <rppt@linux.ibm.com> | 2020-05-25 22:00:50 +0300 |
---|---|---|
committer | James Bottomley <James.Bottomley@HansenPartnership.com> | 2020-05-27 06:57:53 -0700 |
commit | e84ccd7ca2360620ee4967c523e9ae8e67bf97f7 (patch) | |
tree | e432a034b8e8c64e2a4a692890ae5bcb3243904e | |
parent | d2bc577d779ff2a62ec6c8e148d3206e48c53414 (diff) | |
download | secret-memory-preloader-e84ccd7ca2360620ee4967c523e9ae8e67bf97f7.tar.gz |
Report the requested size in CRYPTO_malloc and CRYPTO_free
Signed-off-by: Mike Rapoport <rppt@linux.ibm.com>
-rw-r--r-- | preload.c | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -327,7 +327,7 @@ void *CRYPTO_malloc(size_t size, const char *file, int line) void *ret = NULL; if (size < SEG_SIZE) ret = dlmalloc(size); - INFO("in crypto malloc from %s:%d size=%x ret=%p\n", file, line, size, ret); + INFO("in crypto malloc from %s:%d %zu@%p\n", file, line, size, ret); show_segment(); return ret; } @@ -336,7 +336,7 @@ void CRYPTO_free(void *ptr, const char *file, int line) { struct malloc_chunk *c, *n; - INFO("in crypto free from %s:%d; ptr=%p\n", file, line, ptr); + INFO("in crypto free from %s:%d: %p\n", file, line, ptr); if (ptr == NULL) return; |