// needs-sanitizer-support // needs-sanitizer-address // // compile-flags: -Z sanitizer=address -O -g // // run-fail // error-pattern: AddressSanitizer: stack-buffer-overflow // error-pattern: 'xs' (line 15) <== Memory access at offset #![feature(bench_black_box)] use std::hint::black_box; fn main() { let xs = [0, 1, 2, 3]; // Avoid optimizing everything out. let xs = black_box(xs.as_ptr()); let code = unsafe { *xs.offset(4) }; std::process::exit(code); }