// needs-sanitizer-support | |
// only-x86_64 | |
// | |
// compile-flags: -Z sanitizer=address -O | |
// | |
// run-fail | |
// error-pattern: AddressSanitizer: stack-buffer-overflow | |
// error-pattern: 'xs' <== Memory access at offset | |
#![feature(test)] | |
use std::hint::black_box; | |
use std::mem; | |
fn main() { | |
let xs = [0, 1, 2, 3]; | |
// Avoid optimizing everything out. | |
let xs = black_box(xs.as_ptr()); | |
let code = unsafe { *xs.offset(4) }; | |
std::process::exit(code); | |
} |