/* * SPDX-FileCopyrightText: 2015-2021 Espressif Systems (Shanghai) CO LTD * * SPDX-License-Identifier: Apache-2.0 */ #include #include "unity.h" #include "unity_test_utils.h" static size_t s_allowed_leak_level; void unity_utils_set_leak_level(size_t leak_level) { s_allowed_leak_level = leak_level; } void unity_utils_check_leak(unsigned int before_free, unsigned int after_free, const char *type, unsigned int threshold) { int free_delta = (int)after_free - (int)before_free; printf("MALLOC_CAP_%s usage: Free memory delta: %d Leak threshold: -%u \n", type, free_delta, threshold); if (free_delta > 0) { return; // free memory went up somehow } unsigned int leaked = (size_t)(free_delta * -1); printf("MALLOC_CAP_%s %s leak: Before %u bytes free, After %u bytes free (delta %u)\n", type, leaked <= threshold ? "potential" : "critical", before_free, after_free, leaked); fflush(stdout); TEST_ASSERT_MESSAGE(leaked <= threshold, "The test leaked too much memory"); } void unity_utils_evaluate_leaks(void) { unity_utils_evaluate_leaks_direct(s_allowed_leak_level); }