xref: /aosp_15_r20/external/llvm/test/Instrumentation/ThreadSanitizer/vptr_read.ll (revision 9880d6810fe72a1726cb53787c6711e909410d58)
1*9880d681SAndroid Build Coastguard Worker; RUN: opt < %s -tsan -S | FileCheck %s
2*9880d681SAndroid Build Coastguard Worker; Check that vptr reads are treated in a special way.
3*9880d681SAndroid Build Coastguard Workertarget datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64-S128"
4*9880d681SAndroid Build Coastguard Worker
5*9880d681SAndroid Build Coastguard Workerdefine i8 @Foo(i8* %a) nounwind uwtable sanitize_thread {
6*9880d681SAndroid Build Coastguard Workerentry:
7*9880d681SAndroid Build Coastguard Worker; CHECK: call void @__tsan_vptr_read
8*9880d681SAndroid Build Coastguard Worker  %0 = load i8, i8* %a, align 8, !tbaa !0
9*9880d681SAndroid Build Coastguard Worker  ret i8 %0
10*9880d681SAndroid Build Coastguard Worker}
11*9880d681SAndroid Build Coastguard Worker!0 = !{!2, !2, i64 0}
12*9880d681SAndroid Build Coastguard Worker!1 = !{!"Simple C/C++ TBAA", null}
13*9880d681SAndroid Build Coastguard Worker!2 = !{!"vtable pointer", !1}
14