summaryrefslogtreecommitdiff
path: root/libstdc++-v3/testsuite/18_support/cxa_vec.cc
blob: 89fa111bdc5fcc99a24f7fc840e821dbe8d7dee1 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
// { dg-do run }
// Avoid use of non-overridable new/delete operators in shared
// { dg-options "-static" { target *-*-mingw* } }
// Test __cxa_vec routines
// Copyright (C) 2000-2012 Free Software Foundation, Inc.
// Contributed by Nathan Sidwell 7 Apr 2000 <nathan@nathan@codesourcery.com>

#include <cxxabi.h>
#include <stdio.h>
#include <new>
#include <stdlib.h>
#include <setjmp.h>

// Allocate enough padding to hold an array cookie.
#ifdef __ARM_EABI__
static const size_t padding = 8;
#else
static const size_t padding = (sizeof (std::size_t));
#endif

// our pseudo ctors and dtors
static abi::__cxa_cdtor_return_type ctor (void *x)
{
  abort ();
}

static abi::__cxa_cdtor_return_type dtor (void *x)
{
  abort ();
}

// allocate an array whose size causes an overflow during multiplication
void test1 ()
{
  static const std::size_t large_size =
    std::size_t(1) << (sizeof(std::size_t) * 8 - 2);
  try
    {
      abi::__cxa_vec_new (large_size, 8, 0, ctor, dtor);
      abort ();
    }
  catch (std::bad_alloc &)
    {
    }
}

// allocate an array whose size causes an overflow during addition
void test2 ()
{
  try
    {
      abi::__cxa_vec_new (std::size_t(-1) / 4, 4, padding, ctor, dtor);
      abort ();
    }
  catch (std::bad_alloc &)
    {
    }
}

int main ()
{
  test1 ();
  test2 ();
}