| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546 |
- /*
- * SPDX-FileCopyrightText: 2015-2021 Espressif Systems (Shanghai) CO LTD
- *
- * SPDX-License-Identifier: Apache-2.0
- */
- #include <stdio.h>
- #include "unity.h"
- #include "unity_test_utils.h"
- static size_t s_allowed_leak_level;
- void unity_utils_set_leak_level(size_t leak_level)
- {
- s_allowed_leak_level = leak_level;
- }
- void unity_utils_check_leak(unsigned int before_free,
- unsigned int after_free,
- const char *type,
- unsigned int threshold)
- {
- int free_delta = (int)after_free - (int)before_free;
- printf("MALLOC_CAP_%s usage: Free memory delta: %d Leak threshold: -%u \n",
- type,
- free_delta,
- threshold);
- if (free_delta > 0) {
- return; // free memory went up somehow
- }
- unsigned int leaked = (size_t)(free_delta * -1);
- printf("MALLOC_CAP_%s %s leak: Before %u bytes free, After %u bytes free (delta %u)\n",
- type,
- leaked <= threshold ? "potential" : "critical",
- before_free, after_free, leaked);
- fflush(stdout);
- TEST_ASSERT_MESSAGE(leaked <= threshold, "The test leaked too much memory");
- }
- void unity_utils_evaluate_leaks(void)
- {
- unity_utils_evaluate_leaks_direct(s_allowed_leak_level);
- }
|