diff --git a/src/drivers/driver_zephyr.c b/src/drivers/driver_zephyr.c index 34c0ef162..6467a1c8a 100644 --- a/src/drivers/driver_zephyr.c +++ b/src/drivers/driver_zephyr.c @@ -50,7 +50,9 @@ void wpa_supplicant_event_wrapper(void *ctx, char *ies = os_zalloc(data->auth.ies_len); if (!ies) { - wpa_printf(MSG_ERROR, "%s: Failed to alloc ies\n", __func__); + wpa_printf(MSG_ERROR, + "%s:%d Failed to alloc %d bytes\n", + __func__, __LINE__, data->auth.ies_len); return; } @@ -64,8 +66,9 @@ void wpa_supplicant_event_wrapper(void *ctx, char *frame = os_zalloc(data->rx_mgmt.frame_len); if (!frame) { - wpa_printf(MSG_ERROR, "%s: Failed to alloc frame\n", - __func__); + wpa_printf(MSG_ERROR, + "%s:%d Failed to alloc %d bytes\n", + __func__, __LINE__, data->rx_mgmt.frame_len); return; } @@ -80,8 +83,9 @@ void wpa_supplicant_event_wrapper(void *ctx, char *frame = os_zalloc(data->tx_status.data_len); if (!frame) { - wpa_printf(MSG_ERROR, "%s: Failed to alloc frame\n", - __func__); + wpa_printf(MSG_ERROR, + "%s:%d Failed to alloc %d bytes\n", + __func__, __LINE__, data->tx_status.data_len); return; } @@ -95,8 +99,9 @@ void wpa_supplicant_event_wrapper(void *ctx, char *addr = os_zalloc(ETH_ALEN); if (!addr) { - wpa_printf(MSG_ERROR, "%s: Failed to alloc addr\n", - __func__); + wpa_printf(MSG_ERROR, + "%s:%d Failed to alloc %d bytes\n", + __func__, __LINE__, ETH_ALEN); return; } @@ -107,8 +112,9 @@ void wpa_supplicant_event_wrapper(void *ctx, char *req_ies = os_zalloc(data->assoc_info.req_ies_len); if (!req_ies) { - wpa_printf(MSG_ERROR, "%s: Failed to alloc req_ies\n", - __func__); + wpa_printf(MSG_ERROR, + "%s:%d Failed to alloc %d bytes\n", + __func__, __LINE__, data->assoc_info.req_ies_len); return; } @@ -120,8 +126,9 @@ void wpa_supplicant_event_wrapper(void *ctx, char *resp_ies = os_zalloc(data->assoc_info.resp_ies_len); if (!resp_ies) { - wpa_printf(MSG_ERROR, "%s: Failed to alloc resp_ies\n", - __func__); + wpa_printf(MSG_ERROR, + "%s:%d Failed to alloc %d bytes\n", + __func__, __LINE__, data->assoc_info.resp_ies_len); return; } @@ -133,8 +140,9 @@ void wpa_supplicant_event_wrapper(void *ctx, char *resp_frame = os_zalloc(data->assoc_info.resp_frame_len); if (!resp_frame) { - wpa_printf(MSG_ERROR, "%s: Failed to alloc resp_frame\n", - __func__); + wpa_printf(MSG_ERROR, + "%s:%d Failed to alloc %d bytes\n", + __func__, __LINE__, data->assoc_info.resp_frame_len); return; } @@ -147,8 +155,9 @@ void wpa_supplicant_event_wrapper(void *ctx, char *bssid = os_zalloc(ETH_ALEN); if (!bssid) { - wpa_printf(MSG_ERROR, "%s: Failed to alloc bssid\n", - __func__); + wpa_printf(MSG_ERROR, + "%s:%d Failed to alloc %d bytes\n", + __func__, __LINE__, ETH_ALEN); return; } @@ -159,8 +168,9 @@ void wpa_supplicant_event_wrapper(void *ctx, char *resp_ies = os_zalloc(data->assoc_reject.resp_ies_len); if (!resp_ies) { - wpa_printf(MSG_ERROR, "%s: Failed to alloc resp_ies\n", - __func__); + wpa_printf(MSG_ERROR, + "%s:%d Failed to alloc %d bytes\n", + __func__, __LINE__, data->assoc_reject.resp_ies_len); return; } @@ -173,8 +183,9 @@ void wpa_supplicant_event_wrapper(void *ctx, char *sa = os_zalloc(ETH_ALEN); if (!sa) { - wpa_printf(MSG_ERROR, "%s: Failed to alloc SA\n", - __func__); + wpa_printf(MSG_ERROR, + "%s:%d Failed to alloc %d bytes\n", + __func__, __LINE__, ETH_ALEN); return; } @@ -184,8 +195,9 @@ void wpa_supplicant_event_wrapper(void *ctx, char *ie = os_zalloc(data->deauth_info.ie_len); if (!ie) { - wpa_printf(MSG_ERROR, "%s: Failed to alloc ie\n", - __func__); + wpa_printf(MSG_ERROR, + "%s:%d Failed to alloc %d bytes\n", + __func__, __LINE__, data->deauth_info.ie_len); return; } @@ -197,8 +209,9 @@ void wpa_supplicant_event_wrapper(void *ctx, char *sa = os_zalloc(ETH_ALEN); if (!sa) { - wpa_printf(MSG_ERROR, "%s: Failed to alloc SA\n", - __func__); + wpa_printf(MSG_ERROR, + "%s:%d Failed to alloc %d bytes\n", + __func__, __LINE__, ETH_ALEN); return; } @@ -208,8 +221,9 @@ void wpa_supplicant_event_wrapper(void *ctx, char *ie = os_zalloc(data->disassoc_info.ie_len); if (!ie) { - wpa_printf(MSG_ERROR, "%s: Failed to alloc ie\n", - __func__); + wpa_printf(MSG_ERROR, + "%s:%d Failed to alloc %d bytes\n", + __func__, __LINE__, data->disassoc_info.ie_len); return; } @@ -222,14 +236,16 @@ void wpa_supplicant_event_wrapper(void *ctx, char *da = os_zalloc(ETH_ALEN); if (!sa) { - wpa_printf(MSG_ERROR, "%s: Failed to alloc sa\n", - __func__); + wpa_printf(MSG_ERROR, + "%s:%d Failed to alloc %d bytes\n", + __func__, __LINE__, ETH_ALEN); return; } if (!da) { - wpa_printf(MSG_ERROR, "%s: Failed to alloc da\n", - __func__); + wpa_printf(MSG_ERROR, + "%s:%d Failed to alloc %d bytes\n", + __func__, __LINE__, ETH_ALEN); return; } os_memcpy(sa, data->unprot_deauth.sa, ETH_ALEN); @@ -242,14 +258,16 @@ void wpa_supplicant_event_wrapper(void *ctx, char *da = os_zalloc(ETH_ALEN); if (!sa) { - wpa_printf(MSG_ERROR, "%s: Failed to alloc sa\n", - __func__); + wpa_printf(MSG_ERROR, + "%s:%d Failed to alloc %d bytes\n", + __func__, __LINE__, ETH_ALEN); return; } if (!da) { - wpa_printf(MSG_ERROR, "%s: Failed to alloc da\n", - __func__); + wpa_printf(MSG_ERROR, + "%s:%d Failed to alloc %d bytes\n", + __func__, __LINE__, ETH_ALEN); return; } os_memcpy(sa, data->unprot_disassoc.sa, ETH_ALEN);