blob: 84004dc12f11ac3ed4419ddc715d43411a85e242 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
|
//===----------------------------------------------------------------------===//
//
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
// See https://llvm.org/LICENSE.txt for license information.
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
//
//===----------------------------------------------------------------------===//
// UNSUPPORTED: 32-bit-pointer
// REQUIRES: large_tests
// This bug was fixed in the dylib by 53aed4759b33e33614e0f4e321bc1ef764b6d5b6.
// XFAIL: using-built-library-before-llvm-17
// Android devices frequently don't have enough memory to run this test. Rather
// than throw std::bad_alloc, exhausting memory triggers the OOM Killer.
// UNSUPPORTED: LIBCXX-ANDROID-FIXME
// Test that tellp() does not break the stringstream after INT_MAX, due to use
// of pbump() that accept int.
#include <cassert>
#include <climits>
#include <sstream>
#include <string>
int main(int, char**) {
std::stringstream ss;
std::string payload(INT_MAX - 1, '\0');
ss.write(payload.data(), payload.size());
assert(ss.tellp() == INT_MAX - 1);
ss.write("a", 1);
assert(ss.tellp() == INT_MAX);
ss.write("b", 1);
assert(ss.tellp() == INT_MAX + 1ULL);
// it fails only after previous tellp() corrupts the internal field with int
// overflow
assert(ss.tellp() == INT_MAX + 1ULL);
return 0;
}
|