aboutsummaryrefslogtreecommitdiff
path: root/libcxx/test/std/input.output/string.streams/stringstream/stringstream.members/gcount.pass.cpp
blob: 84004dc12f11ac3ed4419ddc715d43411a85e242 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
//===----------------------------------------------------------------------===//
//
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
// See https://llvm.org/LICENSE.txt for license information.
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
//
//===----------------------------------------------------------------------===//

// UNSUPPORTED: 32-bit-pointer
// REQUIRES: large_tests

// This bug was fixed in the dylib by 53aed4759b33e33614e0f4e321bc1ef764b6d5b6.
// XFAIL: using-built-library-before-llvm-17

// Android devices frequently don't have enough memory to run this test. Rather
// than throw std::bad_alloc, exhausting memory triggers the OOM Killer.
// UNSUPPORTED: LIBCXX-ANDROID-FIXME

// Test that tellp() does not break the stringstream after INT_MAX, due to use
// of pbump() that accept int.

#include <cassert>
#include <climits>
#include <sstream>
#include <string>

int main(int, char**) {
  std::stringstream ss;
  std::string payload(INT_MAX - 1, '\0');

  ss.write(payload.data(), payload.size());
  assert(ss.tellp() == INT_MAX - 1);

  ss.write("a", 1);
  assert(ss.tellp() == INT_MAX);

  ss.write("b", 1);
  assert(ss.tellp() == INT_MAX + 1ULL);
  // it fails only after previous tellp() corrupts the internal field with int
  // overflow
  assert(ss.tellp() == INT_MAX + 1ULL);

  return 0;
}