From 0128c78ffe25196f53fbbc0884a9c4587f493224 Mon Sep 17 00:00:00 2001 From: Neels Hofmeyr Date: Thu, 16 Nov 2017 22:32:36 +0100 Subject: bssgp_fc_test: sanitizer: free msgb context when done Print remaining msgbs when done, then free the entire tall_msgb_context. To be able to do that, call msgb_talloc_ctx_init() and use its return value. A subsequent patch will fix a known mem leak and add assertions for 0b in 1 blocks remaining in the tall_msgb_context. Helps fix sanitizer build on debian 9. Change-Id: I67d347ab2642b0bfc27b21b44231a7f3146ff641 --- tests/gb/bssgp_fc_test.c | 8 ++++++++ 1 file changed, 8 insertions(+) (limited to 'tests/gb/bssgp_fc_test.c') diff --git a/tests/gb/bssgp_fc_test.c b/tests/gb/bssgp_fc_test.c index 6e4f747b..7a75a4d3 100644 --- a/tests/gb/bssgp_fc_test.c +++ b/tests/gb/bssgp_fc_test.c @@ -130,6 +130,7 @@ int main(int argc, char **argv) uint32_t pdu_length = 10; /* octets */ uint32_t pdu_count = 20; /* messages */ int c; + void *tall_msgb_ctx; static const struct option long_options[] = { { "bucket-size-max", 1, 0, 's' }, @@ -145,6 +146,8 @@ int main(int argc, char **argv) log_set_use_color(osmo_stderr_target, 0); log_set_print_filename(osmo_stderr_target, 0); + tall_msgb_ctx = msgb_talloc_ctx_init(NULL, 0); + while ((c = getopt_long(argc, argv, "s:r:d:l:c:", long_options, NULL)) != -1) { switch (c) { @@ -184,6 +187,11 @@ int main(int argc, char **argv) bucket_leak_rate, max_queue_depth, pdu_length, pdu_count); test_fc(bucket_size_max, bucket_leak_rate, max_queue_depth, pdu_length, pdu_count); + printf("msgb ctx: %zu b in %zu blocks (0 b in 1 block == just the context)\n", + talloc_total_size(tall_msgb_ctx), + talloc_total_blocks(tall_msgb_ctx)); + /* KNOWN BUG: expecting 0b in 1 block, but a full queue is still a mem leak */ + talloc_free(tall_msgb_ctx); printf("===== BSSGP flow-control test END\n\n"); exit(EXIT_SUCCESS); -- cgit v1.2.3