kopia lustrzana https://github.com/espressif/esp-idf
47 wiersze
1.2 KiB
C
47 wiersze
1.2 KiB
C
/*
|
|
* SPDX-FileCopyrightText: 2015-2021 Espressif Systems (Shanghai) CO LTD
|
|
*
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include "unity.h"
|
|
#include "unity_test_utils.h"
|
|
|
|
static size_t s_allowed_leak_level;
|
|
|
|
void unity_utils_set_leak_level(size_t leak_level)
|
|
{
|
|
s_allowed_leak_level = leak_level;
|
|
}
|
|
|
|
void unity_utils_check_leak(unsigned int before_free,
|
|
unsigned int after_free,
|
|
const char *type,
|
|
unsigned int threshold)
|
|
{
|
|
int free_delta = (int)after_free - (int)before_free;
|
|
printf("MALLOC_CAP_%s usage: Free memory delta: %d Leak threshold: -%u \n",
|
|
type,
|
|
free_delta,
|
|
threshold);
|
|
|
|
if (free_delta > 0) {
|
|
return; // free memory went up somehow
|
|
}
|
|
|
|
unsigned int leaked = (size_t)(free_delta * -1);
|
|
|
|
printf("MALLOC_CAP_%s %s leak: Before %u bytes free, After %u bytes free (delta %u)\n",
|
|
type,
|
|
leaked <= threshold ? "potential" : "critical",
|
|
before_free, after_free, leaked);
|
|
fflush(stdout);
|
|
TEST_ASSERT_MESSAGE(leaked <= threshold, "The test leaked too much memory");
|
|
}
|
|
|
|
void unity_utils_evaluate_leaks(void)
|
|
{
|
|
unity_utils_evaluate_leaks_direct(s_allowed_leak_level);
|
|
}
|