mirror of
				https://github.com/espressif/esp-idf.git
				synced 2025-11-04 06:11:06 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			47 lines
		
	
	
		
			1.2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			47 lines
		
	
	
		
			1.2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * SPDX-FileCopyrightText: 2015-2021 Espressif Systems (Shanghai) CO LTD
 | 
						|
 *
 | 
						|
 * SPDX-License-Identifier: Apache-2.0
 | 
						|
 */
 | 
						|
 | 
						|
#include <stdio.h>
 | 
						|
#include "unity.h"
 | 
						|
#include "unity_test_utils.h"
 | 
						|
 | 
						|
static size_t s_allowed_leak_level;
 | 
						|
 | 
						|
void unity_utils_set_leak_level(size_t leak_level)
 | 
						|
{
 | 
						|
    s_allowed_leak_level = leak_level;
 | 
						|
}
 | 
						|
 | 
						|
void unity_utils_check_leak(unsigned int before_free,
 | 
						|
        unsigned int after_free,
 | 
						|
        const char *type,
 | 
						|
        unsigned int threshold)
 | 
						|
{
 | 
						|
    int free_delta = (int)after_free - (int)before_free;
 | 
						|
    printf("MALLOC_CAP_%s usage: Free memory delta: %d Leak threshold: -%u \n",
 | 
						|
           type,
 | 
						|
           free_delta,
 | 
						|
           threshold);
 | 
						|
 | 
						|
    if (free_delta > 0) {
 | 
						|
        return; // free memory went up somehow
 | 
						|
    }
 | 
						|
 | 
						|
    unsigned int leaked = (size_t)(free_delta * -1);
 | 
						|
 | 
						|
    printf("MALLOC_CAP_%s %s leak: Before %u bytes free, After %u bytes free (delta %u)\n",
 | 
						|
           type,
 | 
						|
           leaked <= threshold ? "potential" : "critical",
 | 
						|
           before_free, after_free, leaked);
 | 
						|
    fflush(stdout);
 | 
						|
    TEST_ASSERT_MESSAGE(leaked <= threshold, "The test leaked too much memory");
 | 
						|
}
 | 
						|
 | 
						|
void unity_utils_evaluate_leaks(void)
 | 
						|
{
 | 
						|
    unity_utils_evaluate_leaks_direct(s_allowed_leak_level);
 | 
						|
}
 |