Notes
This function is in beta test. Please help improve it in the issues
here.
================================================================= ==822==ERROR: AddressSanitizer: stack-buffer-underflow on address 0x7ffc2e74d8b0 at pc 0x563961c62777 bp 0x7ffc2e74d750 sp 0x7ffc2e74d740 READ of size 8 at 0x7ffc2e74d8b0 thread T0 #0 0x563961c62776 in Dlist<int>::removeAll() [clone .isra.12] (/out/package/dlist_mem+0x2776) #1 0x563961c6581e in Dlist<int>::Dlist(Dlist<int> const&) (/out/package/dlist_mem+0x581e) #2 0x563961c642d2 in case5() (/out/package/dlist_mem+0x42d2) #3 0x563961c62197 in main (/out/package/dlist_mem+0x2197) #4 0x7ff9522d8b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #5 0x563961c62599 in _start (/out/package/dlist_mem+0x2599) Address 0x7ffc2e74d8b0 is located in stack of thread T0 at offset 0 in frame #0 0x563961c6207f in main (/out/package/dlist_mem+0x207f) This frame has 2 object(s): [32, 36) 'testnum' [96, 100) '<unknown>' HINT: this may be a false positive if your program uses some custom stack unwind mechanis
Hints
Your answer may be identical to the JOJ answer in the first several lines.
However, the main problem you meet now is Runtime Error. And the exit code of your program is 1, which should be 0.
Please double check your code to solve this problem and try again.
Your Answer
JOJ Answer
Test success.