// REQUIRES: lldb
// UNSUPPORTED: system-windows
// RUN: %clang -std=gnu11 -O2 -glldb %s -o %t
// RUN: %dexter --fail-lt 1.0 -w --debugger lldb --binary %t -- %s
//// Check that we give good locations to a variable ('local') which is escaped
//// down some control paths and not others. This example is handled well currently.
int g;
__attribute__((__noinline__))
void leak(int *ptr) {
g = *ptr;
*ptr = 2;
}
__attribute__((__noinline__))
int fun(int cond) {
int local = 0; // DexLabel('s1')
if (cond)
leak(&local);
else
local = 1;
return local; // DexLabel('s2')
}
int main() {
int a = fun(1);
int b = fun(0);
return a + b;
}
//// fun(1) fun(0)
// DexExpectWatchValue('local', '0', '0', on_line=ref('s1'))
// DexExpectWatchValue('local', '2', '1', on_line=ref('s2'))