// RUN: %clang_safestack %s -o %t
// RUN: %run %t
// RUN: %clang_nosafestack -fno-stack-protector %s -o %t
// RUN: not %run %t
// Test that buffer overflows on the unsafe stack do not affect variables on the
// safe stack.
// REQUIRES: stable-runtime
__attribute__((noinline))
void fct(volatile int *buffer)
{
memset(buffer - 1, 0, 7 * sizeof(int));
}
int main(int argc, char **argv)
{
int prebuf[7];
int value1 = 42;
int buffer[5];
int value2 = 42;
int postbuf[7];
fct(prebuf + 1);
fct(postbuf + 1);
fct(buffer);
return value1 != 42 || value2 != 42;
}