summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNico Weber <nicolasweber@gmx.de>2019-08-05 16:48:12 +0000
committerNico Weber <nicolasweber@gmx.de>2019-08-05 16:48:12 +0000
commit2f91f4f955190c500ab3a1ec4b92ad3f3af72724 (patch)
tree14f3bb241fe04d56481582cad0dcb00f3dc1a01e
parent9b46f1e9a77b1faa2e9869b9b886f05ac5d39411 (diff)
downloadcompiler-rt-2f91f4f955190c500ab3a1ec4b92ad3f3af72724.tar.gz
compiler-rt: Rename cc files below test/asan to cpp
See r367803 and similar other changes. git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@367887 91177308-0d34-0410-b5e6-96231b3b80d8
-rw-r--r--CMakeLists.txt2
-rw-r--r--lib/asan/tests/asan_test.cpp2
-rwxr-xr-xlib/sanitizer_common/scripts/check_lint.sh4
-rw-r--r--test/asan/TestCases/Darwin/abort_on_error.cpp (renamed from test/asan/TestCases/Darwin/abort_on_error.cc)2
-rw-r--r--test/asan/TestCases/Darwin/asan-symbolize-partial-report-no-external-symbolizer.cpp (renamed from test/asan/TestCases/Darwin/asan-symbolize-partial-report-no-external-symbolizer.cc)4
-rw-r--r--test/asan/TestCases/Darwin/asan-symbolize-partial-report-with-module-map.cpp (renamed from test/asan/TestCases/Darwin/asan-symbolize-partial-report-with-module-map.cc)4
-rw-r--r--test/asan/TestCases/Darwin/asan-symbolize-with-module-map.cpp (renamed from test/asan/TestCases/Darwin/asan-symbolize-with-module-map.cc)4
-rw-r--r--test/asan/TestCases/Darwin/asan_gen_prefixes.cpp (renamed from test/asan/TestCases/Darwin/asan_gen_prefixes.cc)0
-rw-r--r--test/asan/TestCases/Darwin/atos-symbolizer-dyld-root-path.cpp (renamed from test/asan/TestCases/Darwin/atos-symbolizer-dyld-root-path.cc)6
-rw-r--r--test/asan/TestCases/Darwin/atos-symbolizer.cpp (renamed from test/asan/TestCases/Darwin/atos-symbolizer.cc)6
-rw-r--r--test/asan/TestCases/Darwin/dladdr-demangling.cpp (renamed from test/asan/TestCases/Darwin/dladdr-demangling.cc)0
-rw-r--r--test/asan/TestCases/Darwin/dump_registers.cpp (renamed from test/asan/TestCases/Darwin/dump_registers.cc)0
-rw-r--r--test/asan/TestCases/Darwin/dyld_insert_libraries_reexec.cpp (renamed from test/asan/TestCases/Darwin/dyld_insert_libraries_reexec.cc)0
-rw-r--r--test/asan/TestCases/Darwin/dyld_insert_libraries_remove.cpp (renamed from test/asan/TestCases/Darwin/dyld_insert_libraries_remove.cc)0
-rw-r--r--test/asan/TestCases/Darwin/empty-section.cpp (renamed from test/asan/TestCases/Darwin/empty-section.cc)0
-rw-r--r--test/asan/TestCases/Darwin/haswell-symbolication.cpp (renamed from test/asan/TestCases/Darwin/haswell-symbolication.cc)2
-rw-r--r--test/asan/TestCases/Darwin/init_for_dlopen.cpp (renamed from test/asan/TestCases/Darwin/init_for_dlopen.cc)0
-rw-r--r--test/asan/TestCases/Darwin/interface_symbols_darwin.cpp (renamed from test/asan/TestCases/Darwin/interface_symbols_darwin.cc)0
-rw-r--r--test/asan/TestCases/Darwin/linked-only.cpp (renamed from test/asan/TestCases/Darwin/linked-only.cc)0
-rw-r--r--test/asan/TestCases/Darwin/malloc_destroy_zone.cpp (renamed from test/asan/TestCases/Darwin/malloc_destroy_zone.cc)0
-rw-r--r--test/asan/TestCases/Darwin/malloc_set_zone_name-mprotect.cpp (renamed from test/asan/TestCases/Darwin/malloc_set_zone_name-mprotect.cc)0
-rw-r--r--test/asan/TestCases/Darwin/malloc_zone-protected.cpp (renamed from test/asan/TestCases/Darwin/malloc_zone-protected.cc)0
-rw-r--r--test/asan/TestCases/Darwin/mixing-global-constructors.cpp (renamed from test/asan/TestCases/Darwin/mixing-global-constructors.cc)0
-rw-r--r--test/asan/TestCases/Darwin/odr-lto.cpp (renamed from test/asan/TestCases/Darwin/odr-lto.cc)0
-rw-r--r--test/asan/TestCases/Darwin/reexec-insert-libraries-env.cpp (renamed from test/asan/TestCases/Darwin/reexec-insert-libraries-env.cc)0
-rw-r--r--test/asan/TestCases/Darwin/sandbox-symbolizer.cpp (renamed from test/asan/TestCases/Darwin/sandbox-symbolizer.cc)0
-rw-r--r--test/asan/TestCases/Darwin/scribble.cpp (renamed from test/asan/TestCases/Darwin/scribble.cc)0
-rw-r--r--test/asan/TestCases/Darwin/suppressions-darwin.cpp (renamed from test/asan/TestCases/Darwin/suppressions-darwin.cc)0
-rw-r--r--test/asan/TestCases/Darwin/suppressions-function.cpp (renamed from test/asan/TestCases/Darwin/suppressions-function.cc)0
-rw-r--r--test/asan/TestCases/Darwin/suppressions-sandbox.cpp (renamed from test/asan/TestCases/Darwin/suppressions-sandbox.cc)0
-rw-r--r--test/asan/TestCases/Darwin/unset-insert-libraries-on-exec.cpp (renamed from test/asan/TestCases/Darwin/unset-insert-libraries-on-exec.cc)2
-rw-r--r--test/asan/TestCases/Darwin/uuid.cpp (renamed from test/asan/TestCases/Darwin/uuid.cc)2
-rw-r--r--test/asan/TestCases/Helpers/blacklist-extra.cpp (renamed from test/asan/TestCases/Helpers/blacklist-extra.cc)0
-rw-r--r--test/asan/TestCases/Helpers/echo-env.cpp (renamed from test/asan/TestCases/Helpers/echo-env.cc)2
-rw-r--r--test/asan/TestCases/Helpers/init-order-atexit-extra.cpp (renamed from test/asan/TestCases/Helpers/init-order-atexit-extra.cc)0
-rw-r--r--test/asan/TestCases/Helpers/initialization-blacklist-extra.cpp (renamed from test/asan/TestCases/Helpers/initialization-blacklist-extra.cc)0
-rw-r--r--test/asan/TestCases/Helpers/initialization-blacklist-extra2.cpp (renamed from test/asan/TestCases/Helpers/initialization-blacklist-extra2.cc)0
-rw-r--r--test/asan/TestCases/Helpers/initialization-blacklist.txt2
-rw-r--r--test/asan/TestCases/Helpers/initialization-bug-extra.cpp (renamed from test/asan/TestCases/Helpers/initialization-bug-extra.cc)0
-rw-r--r--test/asan/TestCases/Helpers/initialization-bug-extra2.cpp (renamed from test/asan/TestCases/Helpers/initialization-bug-extra2.cc)0
-rw-r--r--test/asan/TestCases/Helpers/initialization-constexpr-extra.cpp (renamed from test/asan/TestCases/Helpers/initialization-constexpr-extra.cc)0
-rw-r--r--test/asan/TestCases/Helpers/initialization-nobug-extra.cpp (renamed from test/asan/TestCases/Helpers/initialization-nobug-extra.cc)0
-rw-r--r--test/asan/TestCases/Helpers/underflow.cpp (renamed from test/asan/TestCases/Helpers/underflow.cc)0
-rw-r--r--test/asan/TestCases/Linux/abort_on_error.cpp (renamed from test/asan/TestCases/Linux/abort_on_error.cc)2
-rw-r--r--test/asan/TestCases/Linux/activation-options.cpp (renamed from test/asan/TestCases/Linux/activation-options.cc)4
-rw-r--r--test/asan/TestCases/Linux/aligned_delete_test.cpp (renamed from test/asan/TestCases/Linux/aligned_delete_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/allocator_oom_test.cpp (renamed from test/asan/TestCases/Linux/allocator_oom_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/asan_default_suppressions.cpp (renamed from test/asan/TestCases/Linux/asan_default_suppressions.cc)0
-rw-r--r--test/asan/TestCases/Linux/asan_dlopen_test.cpp (renamed from test/asan/TestCases/Linux/asan_dlopen_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/asan_prelink_test.cpp (renamed from test/asan/TestCases/Linux/asan_prelink_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/asan_preload_test-1.cpp (renamed from test/asan/TestCases/Linux/asan_preload_test-1.cc)0
-rw-r--r--test/asan/TestCases/Linux/asan_preload_test-2.cpp (renamed from test/asan/TestCases/Linux/asan_preload_test-2.cc)0
-rw-r--r--test/asan/TestCases/Linux/asan_preload_test-3.cpp (renamed from test/asan/TestCases/Linux/asan_preload_test-3.cc)0
-rw-r--r--test/asan/TestCases/Linux/asan_rt_confict_test-1.cpp (renamed from test/asan/TestCases/Linux/asan_rt_confict_test-1.cc)0
-rw-r--r--test/asan/TestCases/Linux/asan_rt_confict_test-2.cpp (renamed from test/asan/TestCases/Linux/asan_rt_confict_test-2.cc)0
-rw-r--r--test/asan/TestCases/Linux/auto_memory_profile_test.cpp (renamed from test/asan/TestCases/Linux/auto_memory_profile_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/bzero.cpp (renamed from test/asan/TestCases/Linux/bzero.cc)0
-rw-r--r--test/asan/TestCases/Linux/clang_gcc_abi.cpp (renamed from test/asan/TestCases/Linux/clang_gcc_abi.cc)8
-rw-r--r--test/asan/TestCases/Linux/clone_test.cpp (renamed from test/asan/TestCases/Linux/clone_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/coverage-missing.cpp (renamed from test/asan/TestCases/Linux/coverage-missing.cc)0
-rw-r--r--test/asan/TestCases/Linux/cuda_test.cpp (renamed from test/asan/TestCases/Linux/cuda_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/function-sections-are-bad.cpp (renamed from test/asan/TestCases/Linux/function-sections-are-bad.cc)0
-rw-r--r--test/asan/TestCases/Linux/global-overflow-bfd.cpp (renamed from test/asan/TestCases/Linux/global-overflow-bfd.cc)0
-rw-r--r--test/asan/TestCases/Linux/global-overflow-lld.cpp (renamed from test/asan/TestCases/Linux/global-overflow-lld.cc)0
-rw-r--r--test/asan/TestCases/Linux/globals-gc-sections-lld.cpp (renamed from test/asan/TestCases/Linux/globals-gc-sections-lld.cc)0
-rw-r--r--test/asan/TestCases/Linux/init-order-dlopen.cpp (renamed from test/asan/TestCases/Linux/init-order-dlopen.cc)0
-rw-r--r--test/asan/TestCases/Linux/init_fini_sections.cpp (renamed from test/asan/TestCases/Linux/init_fini_sections.cc)0
-rw-r--r--test/asan/TestCases/Linux/initialization-bug-any-order.cpp (renamed from test/asan/TestCases/Linux/initialization-bug-any-order.cc)6
-rw-r--r--test/asan/TestCases/Linux/interception_malloc_test.cpp (renamed from test/asan/TestCases/Linux/interception_malloc_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/interception_readdir_r_test.cpp (renamed from test/asan/TestCases/Linux/interception_readdir_r_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/interception_test.cpp (renamed from test/asan/TestCases/Linux/interception_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/interface_symbols_linux.cpp (renamed from test/asan/TestCases/Linux/interface_symbols_linux.cc)0
-rw-r--r--test/asan/TestCases/Linux/kernel-area.cpp (renamed from test/asan/TestCases/Linux/kernel-area.cc)0
-rw-r--r--test/asan/TestCases/Linux/leak.cpp (renamed from test/asan/TestCases/Linux/leak.cc)0
-rw-r--r--test/asan/TestCases/Linux/leak_check_segv.cpp (renamed from test/asan/TestCases/Linux/leak_check_segv.cc)0
-rw-r--r--test/asan/TestCases/Linux/local_alias.cpp (renamed from test/asan/TestCases/Linux/local_alias.cc)0
-rw-r--r--test/asan/TestCases/Linux/long-object-path.cpp (renamed from test/asan/TestCases/Linux/long-object-path.cc)0
-rw-r--r--test/asan/TestCases/Linux/malloc-in-qsort.cpp (renamed from test/asan/TestCases/Linux/malloc-in-qsort.cc)0
-rw-r--r--test/asan/TestCases/Linux/malloc_delete_mismatch.cpp (renamed from test/asan/TestCases/Linux/malloc_delete_mismatch.cc)0
-rw-r--r--test/asan/TestCases/Linux/memmem_test.cpp (renamed from test/asan/TestCases/Linux/memmem_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/mincore.cpp (renamed from test/asan/TestCases/Linux/mincore.cc)0
-rw-r--r--test/asan/TestCases/Linux/new_delete_mismatch.cpp (renamed from test/asan/TestCases/Linux/new_delete_mismatch.cc)0
-rw-r--r--test/asan/TestCases/Linux/new_delete_mismatch_global.cpp (renamed from test/asan/TestCases/Linux/new_delete_mismatch_global.cc)0
-rw-r--r--test/asan/TestCases/Linux/new_delete_mismatch_stack.cpp (renamed from test/asan/TestCases/Linux/new_delete_mismatch_stack.cc)0
-rw-r--r--test/asan/TestCases/Linux/nohugepage_test.cpp (renamed from test/asan/TestCases/Linux/nohugepage_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/odr-violation.cpp (renamed from test/asan/TestCases/Linux/odr-violation.cc)6
-rw-r--r--test/asan/TestCases/Linux/odr-vtable.cpp (renamed from test/asan/TestCases/Linux/odr-vtable.cc)0
-rw-r--r--test/asan/TestCases/Linux/odr_indicators.cpp (renamed from test/asan/TestCases/Linux/odr_indicators.cc)0
-rw-r--r--test/asan/TestCases/Linux/overflow-in-qsort.cpp (renamed from test/asan/TestCases/Linux/overflow-in-qsort.cc)0
-rw-r--r--test/asan/TestCases/Linux/preinit_test.cpp (renamed from test/asan/TestCases/Linux/preinit_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/preinstalled_signal.cpp (renamed from test/asan/TestCases/Linux/preinstalled_signal.cc)0
-rw-r--r--test/asan/TestCases/Linux/print_memory_profile_test.cpp (renamed from test/asan/TestCases/Linux/print_memory_profile_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/pthread_create_from_constructor.cpp (renamed from test/asan/TestCases/Linux/pthread_create_from_constructor.cc)0
-rw-r--r--test/asan/TestCases/Linux/pthread_create_version.cpp (renamed from test/asan/TestCases/Linux/pthread_create_version.cc)0
-rw-r--r--test/asan/TestCases/Linux/ptrace.cpp (renamed from test/asan/TestCases/Linux/ptrace.cc)2
-rw-r--r--test/asan/TestCases/Linux/quarantine_size_mb.cpp (renamed from test/asan/TestCases/Linux/quarantine_size_mb.cc)0
-rw-r--r--test/asan/TestCases/Linux/recoverable-lsan.cpp (renamed from test/asan/TestCases/Linux/recoverable-lsan.cc)0
-rw-r--r--test/asan/TestCases/Linux/recvfrom.cpp (renamed from test/asan/TestCases/Linux/recvfrom.cc)6
-rw-r--r--test/asan/TestCases/Linux/release_to_os_test.cpp (renamed from test/asan/TestCases/Linux/release_to_os_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/rlimit_mmap_test.cpp (renamed from test/asan/TestCases/Linux/rlimit_mmap_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/sanbox_read_proc_self_maps_test.cpp (renamed from test/asan/TestCases/Linux/sanbox_read_proc_self_maps_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/shmctl.cpp (renamed from test/asan/TestCases/Linux/shmctl.cc)0
-rw-r--r--test/asan/TestCases/Linux/signal_during_stop_the_world.cpp (renamed from test/asan/TestCases/Linux/signal_during_stop_the_world.cc)0
-rw-r--r--test/asan/TestCases/Linux/sized_delete_test.cpp (renamed from test/asan/TestCases/Linux/sized_delete_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/stack-overflow-recovery-mode.cpp (renamed from test/asan/TestCases/Linux/stack-overflow-recovery-mode.cc)0
-rw-r--r--test/asan/TestCases/Linux/stack-overflow-sigbus.cpp (renamed from test/asan/TestCases/Linux/stack-overflow-sigbus.cc)0
-rw-r--r--test/asan/TestCases/Linux/stack-trace-dlclose.cpp (renamed from test/asan/TestCases/Linux/stack-trace-dlclose.cc)0
-rw-r--r--test/asan/TestCases/Linux/static_tls.cpp (renamed from test/asan/TestCases/Linux/static_tls.cc)0
-rw-r--r--test/asan/TestCases/Linux/swapcontext_annotation.cpp (renamed from test/asan/TestCases/Linux/swapcontext_annotation.cc)0
-rw-r--r--test/asan/TestCases/Linux/swapcontext_test.cpp (renamed from test/asan/TestCases/Linux/swapcontext_test.cc)0
-rw-r--r--test/asan/TestCases/Linux/syscalls.cpp (renamed from test/asan/TestCases/Linux/syscalls.cc)0
-rw-r--r--test/asan/TestCases/Linux/thread_local_quarantine_pthread_join.cpp (renamed from test/asan/TestCases/Linux/thread_local_quarantine_pthread_join.cc)0
-rw-r--r--test/asan/TestCases/Linux/thread_local_quarantine_size_kb.cpp (renamed from test/asan/TestCases/Linux/thread_local_quarantine_size_kb.cc)0
-rw-r--r--test/asan/TestCases/Linux/uar_signals.cpp (renamed from test/asan/TestCases/Linux/uar_signals.cc)0
-rw-r--r--test/asan/TestCases/Linux/unpoison_tls.cpp (renamed from test/asan/TestCases/Linux/unpoison_tls.cc)0
-rw-r--r--test/asan/TestCases/Linux/vfork.cpp (renamed from test/asan/TestCases/Linux/vfork.cc)0
-rw-r--r--test/asan/TestCases/Posix/asan-symbolize-bad-path.cpp (renamed from test/asan/TestCases/Posix/asan-symbolize-bad-path.cc)0
-rw-r--r--test/asan/TestCases/Posix/asan-symbolize-sanity-test.cpp (renamed from test/asan/TestCases/Posix/asan-symbolize-sanity-test.cc)6
-rw-r--r--test/asan/TestCases/Posix/asan_symbolize_script/logging_options_in_help.cpp (renamed from test/asan/TestCases/Posix/asan_symbolize_script/logging_options_in_help.cc)0
-rw-r--r--test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_help_output.cpp (renamed from test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_help_output.cc)0
-rw-r--r--test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_symbolicate.cpp (renamed from test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_symbolicate.cc)0
-rw-r--r--test/asan/TestCases/Posix/asan_symbolize_script/set_log_dest.cpp (renamed from test/asan/TestCases/Posix/asan_symbolize_script/set_log_dest.cc)0
-rw-r--r--test/asan/TestCases/Posix/asan_symbolize_script/set_log_level.cpp (renamed from test/asan/TestCases/Posix/asan_symbolize_script/set_log_level.cc)0
-rw-r--r--test/asan/TestCases/Posix/asprintf.cpp (renamed from test/asan/TestCases/Posix/asprintf.cc)0
-rw-r--r--test/asan/TestCases/Posix/assign_large_valloc_to_global.cpp (renamed from test/asan/TestCases/Posix/assign_large_valloc_to_global.cc)0
-rw-r--r--test/asan/TestCases/Posix/bcmp_test.cpp (renamed from test/asan/TestCases/Posix/bcmp_test.cc)0
-rw-r--r--test/asan/TestCases/Posix/closed-fds.cpp (renamed from test/asan/TestCases/Posix/closed-fds.cc)2
-rw-r--r--test/asan/TestCases/Posix/concurrent_overflow.cpp (renamed from test/asan/TestCases/Posix/concurrent_overflow.cc)0
-rw-r--r--test/asan/TestCases/Posix/coverage-fork.cpp (renamed from test/asan/TestCases/Posix/coverage-fork.cc)0
-rw-r--r--test/asan/TestCases/Posix/coverage-module-unloaded.cpp (renamed from test/asan/TestCases/Posix/coverage-module-unloaded.cc)0
-rw-r--r--test/asan/TestCases/Posix/coverage-reset.cpp (renamed from test/asan/TestCases/Posix/coverage-reset.cc)14
-rw-r--r--test/asan/TestCases/Posix/coverage.cpp (renamed from test/asan/TestCases/Posix/coverage.cc)0
-rw-r--r--test/asan/TestCases/Posix/current_allocated_bytes.cpp (renamed from test/asan/TestCases/Posix/current_allocated_bytes.cc)0
-rw-r--r--test/asan/TestCases/Posix/deep_call_stack.cpp (renamed from test/asan/TestCases/Posix/deep_call_stack.cc)0
-rw-r--r--test/asan/TestCases/Posix/deep_thread_stack.cpp (renamed from test/asan/TestCases/Posix/deep_thread_stack.cc)0
-rw-r--r--test/asan/TestCases/Posix/dlclose-test.cpp (renamed from test/asan/TestCases/Posix/dlclose-test.cc)0
-rw-r--r--test/asan/TestCases/Posix/fgets_fputs.cpp (renamed from test/asan/TestCases/Posix/fgets_fputs.cc)0
-rw-r--r--test/asan/TestCases/Posix/fread_fwrite.cpp (renamed from test/asan/TestCases/Posix/fread_fwrite.cc)0
-rw-r--r--test/asan/TestCases/Posix/free_hook_realloc.cpp (renamed from test/asan/TestCases/Posix/free_hook_realloc.cc)0
-rw-r--r--test/asan/TestCases/Posix/freopen.cpp (renamed from test/asan/TestCases/Posix/freopen.cc)0
-rw-r--r--test/asan/TestCases/Posix/gc-test.cpp (renamed from test/asan/TestCases/Posix/gc-test.cc)0
-rw-r--r--test/asan/TestCases/Posix/glob.cpp (renamed from test/asan/TestCases/Posix/glob.cc)0
-rw-r--r--test/asan/TestCases/Posix/halt_on_error-torture.cpp (renamed from test/asan/TestCases/Posix/halt_on_error-torture.cc)0
-rw-r--r--test/asan/TestCases/Posix/halt_on_error_suppress_equal_pcs.cpp (renamed from test/asan/TestCases/Posix/halt_on_error_suppress_equal_pcs.cc)0
-rw-r--r--test/asan/TestCases/Posix/handle_abort_on_error.cpp (renamed from test/asan/TestCases/Posix/handle_abort_on_error.cc)0
-rw-r--r--test/asan/TestCases/Posix/init-order-pthread-create.cpp (renamed from test/asan/TestCases/Posix/init-order-pthread-create.cc)0
-rw-r--r--test/asan/TestCases/Posix/interception-in-shared-lib-test.cpp (renamed from test/asan/TestCases/Posix/interception-in-shared-lib-test.cc)2
-rw-r--r--test/asan/TestCases/Posix/invalid-pointer-pairs-threads.cpp (renamed from test/asan/TestCases/Posix/invalid-pointer-pairs-threads.cc)2
-rw-r--r--test/asan/TestCases/Posix/ioctl.cpp (renamed from test/asan/TestCases/Posix/ioctl.cc)2
-rw-r--r--test/asan/TestCases/Posix/large_allocator_unpoisons_on_free.cpp (renamed from test/asan/TestCases/Posix/large_allocator_unpoisons_on_free.cc)0
-rw-r--r--test/asan/TestCases/Posix/lto-constmerge-odr.cpp (renamed from test/asan/TestCases/Posix/lto-constmerge-odr.cc)0
-rw-r--r--test/asan/TestCases/Posix/mmap_limit_mb.cpp (renamed from test/asan/TestCases/Posix/mmap_limit_mb.cc)0
-rw-r--r--test/asan/TestCases/Posix/new_array_cookie_test.cpp (renamed from test/asan/TestCases/Posix/new_array_cookie_test.cc)2
-rw-r--r--test/asan/TestCases/Posix/new_array_cookie_uaf_test.cpp (renamed from test/asan/TestCases/Posix/new_array_cookie_uaf_test.cc)0
-rw-r--r--test/asan/TestCases/Posix/new_array_cookie_with_new_from_class.cpp (renamed from test/asan/TestCases/Posix/new_array_cookie_with_new_from_class.cc)0
-rw-r--r--test/asan/TestCases/Posix/no-fd.cpp (renamed from test/asan/TestCases/Posix/no-fd.cc)0
-rw-r--r--test/asan/TestCases/Posix/print_cmdline.cpp (renamed from test/asan/TestCases/Posix/print_cmdline.cc)0
-rw-r--r--test/asan/TestCases/Posix/readv.cpp (renamed from test/asan/TestCases/Posix/readv.cc)0
-rw-r--r--test/asan/TestCases/Posix/shared-lib-test.cpp (renamed from test/asan/TestCases/Posix/shared-lib-test.cc)2
-rw-r--r--test/asan/TestCases/Posix/stack-overflow.cpp (renamed from test/asan/TestCases/Posix/stack-overflow.cc)0
-rw-r--r--test/asan/TestCases/Posix/stack-use-after-return.cpp (renamed from test/asan/TestCases/Posix/stack-use-after-return.cc)4
-rw-r--r--test/asan/TestCases/Posix/start-deactivated.cpp (renamed from test/asan/TestCases/Posix/start-deactivated.cc)0
-rw-r--r--test/asan/TestCases/Posix/strerror_r_test.cpp (renamed from test/asan/TestCases/Posix/strerror_r_test.cc)0
-rw-r--r--test/asan/TestCases/Posix/strndup_oob_test.cpp (renamed from test/asan/TestCases/Posix/strndup_oob_test.cc)6
-rw-r--r--test/asan/TestCases/Posix/strndup_oob_test2.cpp (renamed from test/asan/TestCases/Posix/strndup_oob_test2.cc)2
-rw-r--r--test/asan/TestCases/Posix/tsd_dtor_leak.cpp (renamed from test/asan/TestCases/Posix/tsd_dtor_leak.cc)0
-rw-r--r--test/asan/TestCases/Posix/wait.cpp (renamed from test/asan/TestCases/Posix/wait.cc)2
-rw-r--r--test/asan/TestCases/Posix/wait3.cpp (renamed from test/asan/TestCases/Posix/wait3.cc)2
-rw-r--r--test/asan/TestCases/Posix/wait4.cpp (renamed from test/asan/TestCases/Posix/wait4.cc)2
-rw-r--r--test/asan/TestCases/Posix/waitid.cpp (renamed from test/asan/TestCases/Posix/waitid.cc)2
-rw-r--r--test/asan/TestCases/Windows/aligned_mallocs.cpp (renamed from test/asan/TestCases/Windows/aligned_mallocs.cc)0
-rw-r--r--test/asan/TestCases/Windows/allocators_sanity.cpp (renamed from test/asan/TestCases/Windows/allocators_sanity.cc)0
-rw-r--r--test/asan/TestCases/Windows/beginthreadex.cpp (renamed from test/asan/TestCases/Windows/beginthreadex.cc)0
-rw-r--r--test/asan/TestCases/Windows/bind_io_completion_callback.cpp (renamed from test/asan/TestCases/Windows/bind_io_completion_callback.cc)0
-rw-r--r--test/asan/TestCases/Windows/bitfield.cpp (renamed from test/asan/TestCases/Windows/bitfield.cc)0
-rw-r--r--test/asan/TestCases/Windows/bitfield_uaf.cpp (renamed from test/asan/TestCases/Windows/bitfield_uaf.cc)6
-rw-r--r--test/asan/TestCases/Windows/calloc_left_oob.cpp (renamed from test/asan/TestCases/Windows/calloc_left_oob.cc)4
-rw-r--r--test/asan/TestCases/Windows/calloc_right_oob.cpp (renamed from test/asan/TestCases/Windows/calloc_right_oob.cc)4
-rw-r--r--test/asan/TestCases/Windows/calloc_uaf.cpp (renamed from test/asan/TestCases/Windows/calloc_uaf.cc)6
-rw-r--r--test/asan/TestCases/Windows/coverage-basic.cpp (renamed from test/asan/TestCases/Windows/coverage-basic.cc)0
-rw-r--r--test/asan/TestCases/Windows/coverage-dll-stdio.cpp (renamed from test/asan/TestCases/Windows/coverage-dll-stdio.cc)2
-rw-r--r--test/asan/TestCases/Windows/crash_read_write.cpp (renamed from test/asan/TestCases/Windows/crash_read_write.cc)0
-rw-r--r--test/asan/TestCases/Windows/crt_initializers.cpp (renamed from test/asan/TestCases/Windows/crt_initializers.cc)0
-rw-r--r--test/asan/TestCases/Windows/delay_dbghelp.cpp (renamed from test/asan/TestCases/Windows/delay_dbghelp.cc)0
-rw-r--r--test/asan/TestCases/Windows/demangled_names.cpp (renamed from test/asan/TestCases/Windows/demangled_names.cc)8
-rw-r--r--test/asan/TestCases/Windows/dll_aligned_mallocs.cpp (renamed from test/asan/TestCases/Windows/dll_aligned_mallocs.cc)2
-rw-r--r--test/asan/TestCases/Windows/dll_allocators_sanity.cpp (renamed from test/asan/TestCases/Windows/dll_allocators_sanity.cc)2
-rw-r--r--test/asan/TestCases/Windows/dll_and_lib.cpp (renamed from test/asan/TestCases/Windows/dll_and_lib.cc)0
-rw-r--r--test/asan/TestCases/Windows/dll_cerr.cpp (renamed from test/asan/TestCases/Windows/dll_cerr.cc)2
-rw-r--r--test/asan/TestCases/Windows/dll_control_c.cpp (renamed from test/asan/TestCases/Windows/dll_control_c.cc)2
-rw-r--r--test/asan/TestCases/Windows/dll_global_dead_strip.c2
-rw-r--r--test/asan/TestCases/Windows/dll_heap_allocation.cpp (renamed from test/asan/TestCases/Windows/dll_heap_allocation.cc)0
-rw-r--r--test/asan/TestCases/Windows/dll_host.cpp (renamed from test/asan/TestCases/Windows/dll_host.cc)0
-rw-r--r--test/asan/TestCases/Windows/dll_intercept_memchr.cpp (renamed from test/asan/TestCases/Windows/dll_intercept_memchr.cc)6
-rw-r--r--test/asan/TestCases/Windows/dll_intercept_memcpy.cpp (renamed from test/asan/TestCases/Windows/dll_intercept_memcpy.cc)6
-rw-r--r--test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cpp (renamed from test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc)6
-rw-r--r--test/asan/TestCases/Windows/dll_intercept_memset.cpp (renamed from test/asan/TestCases/Windows/dll_intercept_memset.cc)6
-rw-r--r--test/asan/TestCases/Windows/dll_intercept_strlen.cpp (renamed from test/asan/TestCases/Windows/dll_intercept_strlen.cc)6
-rw-r--r--test/asan/TestCases/Windows/dll_large_function.cpp (renamed from test/asan/TestCases/Windows/dll_large_function.cc)0
-rw-r--r--test/asan/TestCases/Windows/dll_malloc_left_oob.cpp (renamed from test/asan/TestCases/Windows/dll_malloc_left_oob.cc)10
-rw-r--r--test/asan/TestCases/Windows/dll_malloc_uaf.cpp (renamed from test/asan/TestCases/Windows/dll_malloc_uaf.cc)8
-rw-r--r--test/asan/TestCases/Windows/dll_noreturn.cpp (renamed from test/asan/TestCases/Windows/dll_noreturn.cc)10
-rw-r--r--test/asan/TestCases/Windows/dll_null_deref.cpp (renamed from test/asan/TestCases/Windows/dll_null_deref.cc)4
-rw-r--r--test/asan/TestCases/Windows/dll_operator_array_new_left_oob.cpp (renamed from test/asan/TestCases/Windows/dll_operator_array_new_left_oob.cc)10
-rw-r--r--test/asan/TestCases/Windows/dll_operator_array_new_with_dtor_left_oob.cpp (renamed from test/asan/TestCases/Windows/dll_operator_array_new_with_dtor_left_oob.cc)10
-rw-r--r--test/asan/TestCases/Windows/dll_poison_unpoison.cpp (renamed from test/asan/TestCases/Windows/dll_poison_unpoison.cc)8
-rw-r--r--test/asan/TestCases/Windows/dll_report_globals_symbolization_at_startup.cpp (renamed from test/asan/TestCases/Windows/dll_report_globals_symbolization_at_startup.cc)0
-rw-r--r--test/asan/TestCases/Windows/dll_seh.cpp (renamed from test/asan/TestCases/Windows/dll_seh.cc)2
-rw-r--r--test/asan/TestCases/Windows/dll_stack_use_after_return.cpp (renamed from test/asan/TestCases/Windows/dll_stack_use_after_return.cc)6
-rw-r--r--test/asan/TestCases/Windows/dll_thread_stack_array_left_oob.cpp (renamed from test/asan/TestCases/Windows/dll_thread_stack_array_left_oob.cc)10
-rw-r--r--test/asan/TestCases/Windows/dll_unload.cpp (renamed from test/asan/TestCases/Windows/dll_unload.cc)0
-rw-r--r--test/asan/TestCases/Windows/double_free.cpp (renamed from test/asan/TestCases/Windows/double_free.cc)6
-rw-r--r--test/asan/TestCases/Windows/double_operator_delete.cpp (renamed from test/asan/TestCases/Windows/double_operator_delete.cc)6
-rw-r--r--test/asan/TestCases/Windows/free_hook_realloc.cpp (renamed from test/asan/TestCases/Windows/free_hook_realloc.cc)0
-rw-r--r--test/asan/TestCases/Windows/fuse-lld-globals.cpp (renamed from test/asan/TestCases/Windows/fuse-lld-globals.cc)2
-rw-r--r--test/asan/TestCases/Windows/fuse-lld.cpp (renamed from test/asan/TestCases/Windows/fuse-lld.cc)4
-rw-r--r--test/asan/TestCases/Windows/global_const_string.cpp (renamed from test/asan/TestCases/Windows/global_const_string.cc)0
-rw-r--r--test/asan/TestCases/Windows/global_const_string_oob.cpp (renamed from test/asan/TestCases/Windows/global_const_string_oob.cc)4
-rw-r--r--test/asan/TestCases/Windows/heapalloc.cpp (renamed from test/asan/TestCases/Windows/heapalloc.cc)0
-rw-r--r--test/asan/TestCases/Windows/heapalloc_dll_double_free.cpp (renamed from test/asan/TestCases/Windows/heapalloc_dll_double_free.cc)0
-rw-r--r--test/asan/TestCases/Windows/heapalloc_dll_unload_realloc_uaf.cpp (renamed from test/asan/TestCases/Windows/heapalloc_dll_unload_realloc_uaf.cc)0
-rw-r--r--test/asan/TestCases/Windows/heapalloc_doublefree.cpp (renamed from test/asan/TestCases/Windows/heapalloc_doublefree.cc)0
-rw-r--r--test/asan/TestCases/Windows/heapalloc_flags_fallback.cpp (renamed from test/asan/TestCases/Windows/heapalloc_flags_fallback.cc)0
-rw-r--r--test/asan/TestCases/Windows/heapalloc_huge.cpp (renamed from test/asan/TestCases/Windows/heapalloc_huge.cc)0
-rw-r--r--test/asan/TestCases/Windows/heapalloc_rtl_transfer.cpp (renamed from test/asan/TestCases/Windows/heapalloc_rtl_transfer.cc)0
-rw-r--r--test/asan/TestCases/Windows/heapalloc_sanity.cpp (renamed from test/asan/TestCases/Windows/heapalloc_sanity.cc)0
-rw-r--r--test/asan/TestCases/Windows/heapalloc_transfer.cpp (renamed from test/asan/TestCases/Windows/heapalloc_transfer.cc)0
-rw-r--r--test/asan/TestCases/Windows/heapalloc_uaf.cpp (renamed from test/asan/TestCases/Windows/heapalloc_uaf.cc)0
-rw-r--r--test/asan/TestCases/Windows/heapalloc_zero_size.cpp (renamed from test/asan/TestCases/Windows/heapalloc_zero_size.cc)0
-rw-r--r--test/asan/TestCases/Windows/heaprealloc.cpp (renamed from test/asan/TestCases/Windows/heaprealloc.cc)0
-rw-r--r--test/asan/TestCases/Windows/heaprealloc_alloc_zero.cpp (renamed from test/asan/TestCases/Windows/heaprealloc_alloc_zero.cc)0
-rw-r--r--test/asan/TestCases/Windows/heaprealloc_zero_size.cpp (renamed from test/asan/TestCases/Windows/heaprealloc_zero_size.cc)0
-rw-r--r--test/asan/TestCases/Windows/hello_world.cpp (renamed from test/asan/TestCases/Windows/hello_world.cc)0
-rw-r--r--test/asan/TestCases/Windows/intercept_memcpy.cpp (renamed from test/asan/TestCases/Windows/intercept_memcpy.cc)2
-rw-r--r--test/asan/TestCases/Windows/intercept_strdup.cpp (renamed from test/asan/TestCases/Windows/intercept_strdup.cc)4
-rw-r--r--test/asan/TestCases/Windows/intercept_strlen.cpp (renamed from test/asan/TestCases/Windows/intercept_strlen.cc)4
-rw-r--r--test/asan/TestCases/Windows/interface_symbols_windows.cpp (renamed from test/asan/TestCases/Windows/interface_symbols_windows.cc)0
-rw-r--r--test/asan/TestCases/Windows/iostream_sbo.cpp (renamed from test/asan/TestCases/Windows/iostream_sbo.cc)0
-rw-r--r--test/asan/TestCases/Windows/longjmp.cpp (renamed from test/asan/TestCases/Windows/longjmp.cc)0
-rw-r--r--test/asan/TestCases/Windows/malloc_left_oob.cpp (renamed from test/asan/TestCases/Windows/malloc_left_oob.cc)4
-rw-r--r--test/asan/TestCases/Windows/malloc_right_oob.cpp (renamed from test/asan/TestCases/Windows/malloc_right_oob.cc)4
-rw-r--r--test/asan/TestCases/Windows/malloc_uaf.cpp (renamed from test/asan/TestCases/Windows/malloc_uaf.cc)6
-rw-r--r--test/asan/TestCases/Windows/null_deref.cpp (renamed from test/asan/TestCases/Windows/null_deref.cc)2
-rw-r--r--test/asan/TestCases/Windows/null_deref_multiple_dlls.cpp (renamed from test/asan/TestCases/Windows/null_deref_multiple_dlls.cc)2
-rw-r--r--test/asan/TestCases/Windows/oom.cpp (renamed from test/asan/TestCases/Windows/oom.cc)0
-rw-r--r--test/asan/TestCases/Windows/operator_array_new_left_oob.cpp (renamed from test/asan/TestCases/Windows/operator_array_new_left_oob.cc)4
-rw-r--r--test/asan/TestCases/Windows/operator_array_new_right_oob.cpp (renamed from test/asan/TestCases/Windows/operator_array_new_right_oob.cc)4
-rw-r--r--test/asan/TestCases/Windows/operator_array_new_uaf.cpp (renamed from test/asan/TestCases/Windows/operator_array_new_uaf.cc)6
-rw-r--r--test/asan/TestCases/Windows/operator_array_new_with_dtor_left_oob.cpp (renamed from test/asan/TestCases/Windows/operator_array_new_with_dtor_left_oob.cc)4
-rw-r--r--test/asan/TestCases/Windows/operator_delete_wrong_argument.cpp (renamed from test/asan/TestCases/Windows/operator_delete_wrong_argument.cc)2
-rw-r--r--test/asan/TestCases/Windows/operator_new_left_oob.cpp (renamed from test/asan/TestCases/Windows/operator_new_left_oob.cc)4
-rw-r--r--test/asan/TestCases/Windows/operator_new_right_oob.cpp (renamed from test/asan/TestCases/Windows/operator_new_right_oob.cc)4
-rw-r--r--test/asan/TestCases/Windows/operator_new_uaf.cpp (renamed from test/asan/TestCases/Windows/operator_new_uaf.cc)6
-rw-r--r--test/asan/TestCases/Windows/queue_user_work_item.cpp (renamed from test/asan/TestCases/Windows/queue_user_work_item.cc)0
-rw-r--r--test/asan/TestCases/Windows/queue_user_work_item_report.cpp (renamed from test/asan/TestCases/Windows/queue_user_work_item_report.cc)2
-rw-r--r--test/asan/TestCases/Windows/realloc_left_oob.cpp (renamed from test/asan/TestCases/Windows/realloc_left_oob.cc)4
-rw-r--r--test/asan/TestCases/Windows/realloc_right_oob.cpp (renamed from test/asan/TestCases/Windows/realloc_right_oob.cc)4
-rw-r--r--test/asan/TestCases/Windows/realloc_uaf.cpp (renamed from test/asan/TestCases/Windows/realloc_uaf.cc)6
-rw-r--r--test/asan/TestCases/Windows/recalloc_sanity.cpp (renamed from test/asan/TestCases/Windows/recalloc_sanity.cc)0
-rw-r--r--test/asan/TestCases/Windows/report_after_syminitialize.cpp (renamed from test/asan/TestCases/Windows/report_after_syminitialize.cc)2
-rw-r--r--test/asan/TestCases/Windows/report_globals_reload_dll.cpp (renamed from test/asan/TestCases/Windows/report_globals_reload_dll.cc)0
-rw-r--r--test/asan/TestCases/Windows/report_globals_vs_freelibrary.cpp (renamed from test/asan/TestCases/Windows/report_globals_vs_freelibrary.cc)0
-rw-r--r--test/asan/TestCases/Windows/rtlallocateheap.cpp (renamed from test/asan/TestCases/Windows/rtlallocateheap.cc)0
-rw-r--r--test/asan/TestCases/Windows/rtlallocateheap_dll_unload_double_free.cpp (renamed from test/asan/TestCases/Windows/rtlallocateheap_dll_unload_double_free.cc)0
-rw-r--r--test/asan/TestCases/Windows/rtlallocateheap_dll_unload_realloc.cpp (renamed from test/asan/TestCases/Windows/rtlallocateheap_dll_unload_realloc.cc)0
-rw-r--r--test/asan/TestCases/Windows/rtlallocateheap_flags_fallback.cpp (renamed from test/asan/TestCases/Windows/rtlallocateheap_flags_fallback.cc)0
-rw-r--r--test/asan/TestCases/Windows/rtlallocateheap_zero.cpp (renamed from test/asan/TestCases/Windows/rtlallocateheap_zero.cc)0
-rw-r--r--test/asan/TestCases/Windows/seh.cpp (renamed from test/asan/TestCases/Windows/seh.cc)0
-rw-r--r--test/asan/TestCases/Windows/shadow_conflict_32.cpp (renamed from test/asan/TestCases/Windows/shadow_conflict_32.cc)4
-rw-r--r--test/asan/TestCases/Windows/shadow_mapping_failure.cpp (renamed from test/asan/TestCases/Windows/shadow_mapping_failure.cc)0
-rw-r--r--test/asan/TestCases/Windows/stack_array_left_oob.cpp (renamed from test/asan/TestCases/Windows/stack_array_left_oob.cc)4
-rw-r--r--test/asan/TestCases/Windows/stack_array_right_oob.cpp (renamed from test/asan/TestCases/Windows/stack_array_right_oob.cc)4
-rw-r--r--test/asan/TestCases/Windows/stack_array_sanity.cpp (renamed from test/asan/TestCases/Windows/stack_array_sanity.cc)0
-rw-r--r--test/asan/TestCases/Windows/stack_use_after_return.cpp (renamed from test/asan/TestCases/Windows/stack_use_after_return.cc)4
-rw-r--r--test/asan/TestCases/Windows/symbols_path.cpp (renamed from test/asan/TestCases/Windows/symbols_path.cc)4
-rw-r--r--test/asan/TestCases/Windows/thread_simple.cpp (renamed from test/asan/TestCases/Windows/thread_simple.cc)0
-rw-r--r--test/asan/TestCases/Windows/thread_stack_array_left_oob.cpp (renamed from test/asan/TestCases/Windows/thread_stack_array_left_oob.cc)4
-rw-r--r--test/asan/TestCases/Windows/thread_stack_array_right_oob.cpp (renamed from test/asan/TestCases/Windows/thread_stack_array_right_oob.cc)4
-rw-r--r--test/asan/TestCases/Windows/thread_stack_reuse.cpp (renamed from test/asan/TestCases/Windows/thread_stack_reuse.cc)0
-rw-r--r--test/asan/TestCases/Windows/thread_stress.cpp (renamed from test/asan/TestCases/Windows/thread_stress.cc)0
-rw-r--r--test/asan/TestCases/Windows/thread_suspended.cpp (renamed from test/asan/TestCases/Windows/thread_suspended.cc)0
-rw-r--r--test/asan/TestCases/Windows/tls_init.cpp (renamed from test/asan/TestCases/Windows/tls_init.cc)0
-rw-r--r--test/asan/TestCases/Windows/unsymbolized.cpp (renamed from test/asan/TestCases/Windows/unsymbolized.cc)4
-rw-r--r--test/asan/TestCases/Windows/use_after_realloc.cpp (renamed from test/asan/TestCases/Windows/use_after_realloc.cc)6
-rw-r--r--test/asan/TestCases/Windows/use_after_return_linkage.cpp (renamed from test/asan/TestCases/Windows/use_after_return_linkage.cc)0
-rw-r--r--test/asan/TestCases/Windows/user-exception.cpp (renamed from test/asan/TestCases/Windows/user-exception.cc)0
-rw-r--r--test/asan/TestCases/Windows/windows_h.cpp (renamed from test/asan/TestCases/Windows/windows_h.cc)0
-rw-r--r--test/asan/TestCases/Windows/wrong_downcast_on_heap.cpp (renamed from test/asan/TestCases/Windows/wrong_downcast_on_heap.cc)2
-rw-r--r--test/asan/TestCases/Windows/wrong_downcast_on_stack.cpp (renamed from test/asan/TestCases/Windows/wrong_downcast_on_stack.cc)2
-rw-r--r--test/asan/TestCases/alloca_big_alignment.cpp (renamed from test/asan/TestCases/alloca_big_alignment.cc)0
-rw-r--r--test/asan/TestCases/alloca_constant_size.cpp (renamed from test/asan/TestCases/alloca_constant_size.cc)0
-rw-r--r--test/asan/TestCases/alloca_detect_custom_size_.cpp (renamed from test/asan/TestCases/alloca_detect_custom_size_.cc)0
-rw-r--r--test/asan/TestCases/alloca_instruments_all_paddings.cpp (renamed from test/asan/TestCases/alloca_instruments_all_paddings.cc)0
-rw-r--r--test/asan/TestCases/alloca_loop_unpoisoning.cpp (renamed from test/asan/TestCases/alloca_loop_unpoisoning.cc)0
-rw-r--r--test/asan/TestCases/alloca_overflow_partial.cpp (renamed from test/asan/TestCases/alloca_overflow_partial.cc)0
-rw-r--r--test/asan/TestCases/alloca_overflow_right.cpp (renamed from test/asan/TestCases/alloca_overflow_right.cc)0
-rw-r--r--test/asan/TestCases/alloca_safe_access.cpp (renamed from test/asan/TestCases/alloca_safe_access.cc)0
-rw-r--r--test/asan/TestCases/alloca_underflow_left.cpp (renamed from test/asan/TestCases/alloca_underflow_left.cc)0
-rw-r--r--test/asan/TestCases/alloca_vla_interact.cpp (renamed from test/asan/TestCases/alloca_vla_interact.cc)0
-rw-r--r--test/asan/TestCases/asan_and_llvm_coverage_test.cpp (renamed from test/asan/TestCases/asan_and_llvm_coverage_test.cc)0
-rw-r--r--test/asan/TestCases/asan_options-help.cpp (renamed from test/asan/TestCases/asan_options-help.cc)0
-rw-r--r--test/asan/TestCases/atexit_stats.cpp (renamed from test/asan/TestCases/atexit_stats.cc)0
-rw-r--r--test/asan/TestCases/blacklist.cpp (renamed from test/asan/TestCases/blacklist.cc)12
-rw-r--r--test/asan/TestCases/calloc-overflow.cpp (renamed from test/asan/TestCases/calloc-overflow.cc)2
-rw-r--r--test/asan/TestCases/contiguous_container.cpp (renamed from test/asan/TestCases/contiguous_container.cc)0
-rw-r--r--test/asan/TestCases/contiguous_container_crash.cpp (renamed from test/asan/TestCases/contiguous_container_crash.cc)0
-rw-r--r--test/asan/TestCases/coverage-and-lsan.cpp (renamed from test/asan/TestCases/coverage-and-lsan.cc)0
-rw-r--r--test/asan/TestCases/coverage-disabled.cpp (renamed from test/asan/TestCases/coverage-disabled.cc)0
-rw-r--r--test/asan/TestCases/coverage-trace-pc.cpp (renamed from test/asan/TestCases/coverage-trace-pc.cc)0
-rw-r--r--test/asan/TestCases/debug_double_free.cpp (renamed from test/asan/TestCases/debug_double_free.cc)0
-rw-r--r--test/asan/TestCases/debug_locate.cpp (renamed from test/asan/TestCases/debug_locate.cc)0
-rw-r--r--test/asan/TestCases/debug_mapping.cpp (renamed from test/asan/TestCases/debug_mapping.cc)0
-rw-r--r--test/asan/TestCases/debug_ppc64_mapping.cpp (renamed from test/asan/TestCases/debug_ppc64_mapping.cc)0
-rw-r--r--test/asan/TestCases/debug_report.cpp (renamed from test/asan/TestCases/debug_report.cc)0
-rw-r--r--test/asan/TestCases/debug_stacks.cpp (renamed from test/asan/TestCases/debug_stacks.cc)0
-rw-r--r--test/asan/TestCases/deep_stack_uaf.cpp (renamed from test/asan/TestCases/deep_stack_uaf.cc)0
-rw-r--r--test/asan/TestCases/deep_tail_call.cpp (renamed from test/asan/TestCases/deep_tail_call.cc)0
-rw-r--r--test/asan/TestCases/default_blacklist.cpp (renamed from test/asan/TestCases/default_blacklist.cc)0
-rw-r--r--test/asan/TestCases/default_options.cpp (renamed from test/asan/TestCases/default_options.cc)0
-rw-r--r--test/asan/TestCases/describe_address.cpp (renamed from test/asan/TestCases/describe_address.cc)0
-rw-r--r--test/asan/TestCases/double-free.cpp (renamed from test/asan/TestCases/double-free.cc)6
-rw-r--r--test/asan/TestCases/error_report_callback.cpp (renamed from test/asan/TestCases/error_report_callback.cc)0
-rw-r--r--test/asan/TestCases/exitcode.cpp (renamed from test/asan/TestCases/exitcode.cc)0
-rw-r--r--test/asan/TestCases/force_inline_opt0.cpp (renamed from test/asan/TestCases/force_inline_opt0.cc)0
-rw-r--r--test/asan/TestCases/frexp_interceptor.cpp (renamed from test/asan/TestCases/frexp_interceptor.cc)0
-rw-r--r--test/asan/TestCases/global-demangle.cpp (renamed from test/asan/TestCases/global-demangle.cc)0
-rw-r--r--test/asan/TestCases/global-location.cpp (renamed from test/asan/TestCases/global-location.cc)8
-rw-r--r--test/asan/TestCases/global-overflow.cpp (renamed from test/asan/TestCases/global-overflow.cc)2
-rw-r--r--test/asan/TestCases/global-underflow.cc17
-rw-r--r--test/asan/TestCases/global-underflow.cpp17
-rw-r--r--test/asan/TestCases/handle_noreturn_bug.cpp (renamed from test/asan/TestCases/handle_noreturn_bug.cc)0
-rw-r--r--test/asan/TestCases/heap-overflow-large.cpp (renamed from test/asan/TestCases/heap-overflow-large.cc)0
-rw-r--r--test/asan/TestCases/heap-overflow.cpp (renamed from test/asan/TestCases/heap-overflow.cc)2
-rw-r--r--test/asan/TestCases/heavy_uar_test.cpp (renamed from test/asan/TestCases/heavy_uar_test.cc)2
-rw-r--r--test/asan/TestCases/huge_negative_hea_oob.cpp (renamed from test/asan/TestCases/huge_negative_hea_oob.cc)0
-rw-r--r--test/asan/TestCases/ill.cpp (renamed from test/asan/TestCases/ill.cc)0
-rw-r--r--test/asan/TestCases/init-order-atexit.cpp (renamed from test/asan/TestCases/init-order-atexit.cc)2
-rw-r--r--test/asan/TestCases/initialization-blacklist.cpp (renamed from test/asan/TestCases/initialization-blacklist.cc)12
-rw-r--r--test/asan/TestCases/initialization-bug.cpp (renamed from test/asan/TestCases/initialization-bug.cc)2
-rw-r--r--test/asan/TestCases/initialization-constexpr.cpp (renamed from test/asan/TestCases/initialization-constexpr.cc)8
-rw-r--r--test/asan/TestCases/initialization-nobug.cpp (renamed from test/asan/TestCases/initialization-nobug.cc)8
-rw-r--r--test/asan/TestCases/inline.cpp (renamed from test/asan/TestCases/inline.cc)0
-rw-r--r--test/asan/TestCases/intercept-rethrow-exception.cpp (renamed from test/asan/TestCases/intercept-rethrow-exception.cc)0
-rw-r--r--test/asan/TestCases/interception_failure_test.cpp (renamed from test/asan/TestCases/interception_failure_test.cc)0
-rw-r--r--test/asan/TestCases/interface_test.cpp (renamed from test/asan/TestCases/interface_test.cc)0
-rw-r--r--test/asan/TestCases/intra-object-overflow.cpp (renamed from test/asan/TestCases/intra-object-overflow.cc)4
-rw-r--r--test/asan/TestCases/invalid-free.cpp (renamed from test/asan/TestCases/invalid-free.cc)4
-rw-r--r--test/asan/TestCases/invalid-pointer-pairs-compare-errors.cpp (renamed from test/asan/TestCases/invalid-pointer-pairs-compare-errors.cc)36
-rw-r--r--test/asan/TestCases/invalid-pointer-pairs-compare-null.cpp (renamed from test/asan/TestCases/invalid-pointer-pairs-compare-null.cc)0
-rw-r--r--test/asan/TestCases/invalid-pointer-pairs-compare-success.cpp (renamed from test/asan/TestCases/invalid-pointer-pairs-compare-success.cc)0
-rw-r--r--test/asan/TestCases/invalid-pointer-pairs-subtract-errors.cpp (renamed from test/asan/TestCases/invalid-pointer-pairs-subtract-errors.cc)12
-rw-r--r--test/asan/TestCases/invalid-pointer-pairs-subtract-success.cpp (renamed from test/asan/TestCases/invalid-pointer-pairs-subtract-success.cc)0
-rw-r--r--test/asan/TestCases/invalid-pointer-pairs.cpp (renamed from test/asan/TestCases/invalid-pointer-pairs.cc)6
-rw-r--r--test/asan/TestCases/large_func_test.cpp (renamed from test/asan/TestCases/large_func_test.cc)8
-rw-r--r--test/asan/TestCases/log-path_test.cpp (renamed from test/asan/TestCases/log-path_test.cc)0
-rw-r--r--test/asan/TestCases/longjmp.cpp (renamed from test/asan/TestCases/longjmp.cc)0
-rw-r--r--test/asan/TestCases/lsan_annotations.cpp (renamed from test/asan/TestCases/lsan_annotations.cc)0
-rw-r--r--test/asan/TestCases/malloc-size-too-big.cpp (renamed from test/asan/TestCases/malloc-size-too-big.cc)2
-rw-r--r--test/asan/TestCases/malloc_context_size.cpp (renamed from test/asan/TestCases/malloc_context_size.cc)2
-rw-r--r--test/asan/TestCases/malloc_fill.cpp (renamed from test/asan/TestCases/malloc_fill.cc)0
-rw-r--r--test/asan/TestCases/max_redzone.cpp (renamed from test/asan/TestCases/max_redzone.cc)0
-rw-r--r--test/asan/TestCases/memcmp_strict_test.cpp (renamed from test/asan/TestCases/memcmp_strict_test.cc)0
-rw-r--r--test/asan/TestCases/memcmp_test.cpp (renamed from test/asan/TestCases/memcmp_test.cc)0
-rw-r--r--test/asan/TestCases/memset_test.cpp (renamed from test/asan/TestCases/memset_test.cc)0
-rw-r--r--test/asan/TestCases/null_deref.cpp (renamed from test/asan/TestCases/null_deref.cc)4
-rw-r--r--test/asan/TestCases/on_error_callback.cpp (renamed from test/asan/TestCases/on_error_callback.cc)0
-rw-r--r--test/asan/TestCases/partial_right.cpp (renamed from test/asan/TestCases/partial_right.cc)0
-rw-r--r--test/asan/TestCases/pass-object-byval.cpp (renamed from test/asan/TestCases/pass-object-byval.cc)0
-rw-r--r--test/asan/TestCases/pass-struct-byval-uar.cpp (renamed from test/asan/TestCases/pass-struct-byval-uar.cc)0
-rw-r--r--test/asan/TestCases/pass-struct-byval.cpp (renamed from test/asan/TestCases/pass-struct-byval.cc)0
-rw-r--r--test/asan/TestCases/poison_partial.cpp (renamed from test/asan/TestCases/poison_partial.cc)0
-rw-r--r--test/asan/TestCases/pr33372.cpp (renamed from test/asan/TestCases/pr33372.cc)0
-rw-r--r--test/asan/TestCases/print_summary.cpp (renamed from test/asan/TestCases/print_summary.cc)2
-rw-r--r--test/asan/TestCases/realloc.cpp (renamed from test/asan/TestCases/realloc.cc)0
-rw-r--r--test/asan/TestCases/scariness_score_test.cpp (renamed from test/asan/TestCases/scariness_score_test.cc)0
-rw-r--r--test/asan/TestCases/small_memcpy_test.cpp (renamed from test/asan/TestCases/small_memcpy_test.cc)0
-rw-r--r--test/asan/TestCases/speculative_load.cpp (renamed from test/asan/TestCases/speculative_load.cc)0
-rw-r--r--test/asan/TestCases/speculative_load2.cpp (renamed from test/asan/TestCases/speculative_load2.cc)0
-rw-r--r--test/asan/TestCases/stack-buffer-overflow-with-position.cpp (renamed from test/asan/TestCases/stack-buffer-overflow-with-position.cc)0
-rw-r--r--test/asan/TestCases/stack-buffer-overflow.cpp (renamed from test/asan/TestCases/stack-buffer-overflow.cc)4
-rw-r--r--test/asan/TestCases/stack-frame-demangle.cpp (renamed from test/asan/TestCases/stack-frame-demangle.cc)0
-rw-r--r--test/asan/TestCases/stack-oob-frames.cpp (renamed from test/asan/TestCases/stack-oob-frames.cc)0
-rw-r--r--test/asan/TestCases/strcat-overlap.cpp (renamed from test/asan/TestCases/strcat-overlap.cc)4
-rw-r--r--test/asan/TestCases/strcpy-overlap.cpp (renamed from test/asan/TestCases/strcpy-overlap.cc)4
-rw-r--r--test/asan/TestCases/strdup_oob_test.cpp (renamed from test/asan/TestCases/strdup_oob_test.cc)6
-rw-r--r--test/asan/TestCases/strncat-overlap.cpp (renamed from test/asan/TestCases/strncat-overlap.cc)4
-rw-r--r--test/asan/TestCases/strncpy-overflow.cpp (renamed from test/asan/TestCases/strncpy-overflow.cc)6
-rw-r--r--test/asan/TestCases/strncpy-overlap.cpp (renamed from test/asan/TestCases/strncpy-overlap.cc)4
-rw-r--r--test/asan/TestCases/suppressions-exec-relative-location.cpp (renamed from test/asan/TestCases/suppressions-exec-relative-location.cc)0
-rw-r--r--test/asan/TestCases/suppressions-function.cpp (renamed from test/asan/TestCases/suppressions-function.cc)0
-rw-r--r--test/asan/TestCases/suppressions-interceptor.cpp (renamed from test/asan/TestCases/suppressions-interceptor.cc)0
-rw-r--r--test/asan/TestCases/suppressions-library.cpp (renamed from test/asan/TestCases/suppressions-library.cc)0
-rw-r--r--test/asan/TestCases/throw_call_test.cpp (renamed from test/asan/TestCases/throw_call_test.cc)0
-rw-r--r--test/asan/TestCases/throw_catch.cpp (renamed from test/asan/TestCases/throw_catch.cc)0
-rw-r--r--test/asan/TestCases/throw_invoke_test.cpp (renamed from test/asan/TestCases/throw_invoke_test.cc)0
-rw-r--r--test/asan/TestCases/time_interceptor.cpp (renamed from test/asan/TestCases/time_interceptor.cc)0
-rw-r--r--test/asan/TestCases/uar_and_exceptions.cpp (renamed from test/asan/TestCases/uar_and_exceptions.cc)0
-rw-r--r--test/asan/TestCases/unaligned_loads_and_stores.cpp (renamed from test/asan/TestCases/unaligned_loads_and_stores.cc)20
-rw-r--r--test/asan/TestCases/use-after-delete.cpp (renamed from test/asan/TestCases/use-after-delete.cc)6
-rw-r--r--test/asan/TestCases/use-after-free-right.cpp (renamed from test/asan/TestCases/use-after-free-right.cc)10
-rw-r--r--test/asan/TestCases/use-after-free.cpp (renamed from test/asan/TestCases/use-after-free.cc)10
-rw-r--r--test/asan/TestCases/use-after-poison.cpp (renamed from test/asan/TestCases/use-after-poison.cc)2
-rw-r--r--test/asan/TestCases/use-after-scope-capture.cpp (renamed from test/asan/TestCases/use-after-scope-capture.cc)2
-rw-r--r--test/asan/TestCases/use-after-scope-conversion.cpp (renamed from test/asan/TestCases/use-after-scope-conversion.cc)0
-rw-r--r--test/asan/TestCases/use-after-scope-dtor-order.cpp (renamed from test/asan/TestCases/use-after-scope-dtor-order.cc)2
-rw-r--r--test/asan/TestCases/use-after-scope-goto.cpp (renamed from test/asan/TestCases/use-after-scope-goto.cc)0
-rw-r--r--test/asan/TestCases/use-after-scope-if.cpp (renamed from test/asan/TestCases/use-after-scope-if.cc)2
-rw-r--r--test/asan/TestCases/use-after-scope-inlined.cpp (renamed from test/asan/TestCases/use-after-scope-inlined.cc)2
-rw-r--r--test/asan/TestCases/use-after-scope-loop-bug.cpp (renamed from test/asan/TestCases/use-after-scope-loop-bug.cc)2
-rw-r--r--test/asan/TestCases/use-after-scope-loop-removed.cpp (renamed from test/asan/TestCases/use-after-scope-loop-removed.cc)2
-rw-r--r--test/asan/TestCases/use-after-scope-loop.cpp (renamed from test/asan/TestCases/use-after-scope-loop.cc)2
-rw-r--r--test/asan/TestCases/use-after-scope-nobug.cpp (renamed from test/asan/TestCases/use-after-scope-nobug.cc)0
-rw-r--r--test/asan/TestCases/use-after-scope-temp.cpp (renamed from test/asan/TestCases/use-after-scope-temp.cc)2
-rw-r--r--test/asan/TestCases/use-after-scope-temp2.cpp (renamed from test/asan/TestCases/use-after-scope-temp2.cc)2
-rw-r--r--test/asan/TestCases/use-after-scope-types.cpp (renamed from test/asan/TestCases/use-after-scope-types.cc)2
-rw-r--r--test/asan/TestCases/use-after-scope.cpp (renamed from test/asan/TestCases/use-after-scope.cc)2
-rw-r--r--test/asan/TestCases/verbose-log-path_test.cpp (renamed from test/asan/TestCases/verbose-log-path_test.cc)0
-rw-r--r--test/asan/TestCases/vla_chrome_testcase.cpp (renamed from test/asan/TestCases/vla_chrome_testcase.cc)0
-rw-r--r--test/asan/TestCases/vla_condition_overflow.cpp (renamed from test/asan/TestCases/vla_condition_overflow.cc)0
-rw-r--r--test/asan/TestCases/vla_loop_overfow.cpp (renamed from test/asan/TestCases/vla_loop_overfow.cc)0
-rw-r--r--test/asan/TestCases/zero_page_pc.cpp (renamed from test/asan/TestCases/zero_page_pc.cc)0
-rw-r--r--test/lit.common.cfg.py2
422 files changed, 353 insertions, 353 deletions
diff --git a/CMakeLists.txt b/CMakeLists.txt
index f69d6b83e..0b01ab501 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -281,7 +281,7 @@ append_list_if(COMPILER_RT_HAS_FNO_LTO_FLAG -fno-lto SANITIZER_COMMON_CFLAGS)
# The following is a workaround for powerpc64le. This is the only architecture
# that requires -fno-function-sections to work properly. If lacking, the ASan
-# Linux test function-sections-are-bad.cc fails with the following error:
+# Linux test function-sections-are-bad.cpp fails with the following error:
# 'undefined symbol: __sanitizer_unaligned_load32'.
if(DEFINED TARGET_powerpc64le_CFLAGS)
append_list_if(COMPILER_RT_HAS_FNO_FUNCTION_SECTIONS_FLAG -fno-function-sections TARGET_powerpc64le_CFLAGS)
diff --git a/lib/asan/tests/asan_test.cpp b/lib/asan/tests/asan_test.cpp
index 1318727c8..47bba08cc 100644
--- a/lib/asan/tests/asan_test.cpp
+++ b/lib/asan/tests/asan_test.cpp
@@ -531,7 +531,7 @@ TEST(AddressSanitizer, ManyStackObjectsTest) {
#endif
#if 0 // This test requires online symbolizer.
-// Moved to lit_tests/stack-oob-frames.cc.
+// Moved to lit_tests/stack-oob-frames.cpp.
// Reenable here once we have online symbolizer by default.
NOINLINE static void Frame0(int frame, char *a, char *b, char *c) {
char d[4] = {0};
diff --git a/lib/sanitizer_common/scripts/check_lint.sh b/lib/sanitizer_common/scripts/check_lint.sh
index ad9060566..ed1cf010b 100755
--- a/lib/sanitizer_common/scripts/check_lint.sh
+++ b/lib/sanitizer_common/scripts/check_lint.sh
@@ -85,7 +85,7 @@ run_lint ${ASAN_RTL_LINT_FILTER} ${ASAN_RTL}/*.cpp \
${ASAN_RTL}/*.h &
run_lint ${ASAN_TEST_LINT_FILTER} ${ASAN_RTL}/tests/*.cpp \
${ASAN_RTL}/tests/*.h &
-run_lint ${ASAN_LIT_TEST_LINT_FILTER} ${LIT_TESTS}/asan/*/*.cc &
+run_lint ${ASAN_LIT_TEST_LINT_FILTER} ${LIT_TESTS}/asan/*/*.cpp &
# TSan
TSAN_RTL=${COMPILER_RT}/lib/tsan
@@ -122,7 +122,7 @@ run_lint ${SCUDO_RTL_LINT_FILTER} ${SCUDO_RTL}/*.cpp \
FILES=${COMMON_RTL}/*.inc
TMPFILES=""
for FILE in $FILES; do
- TMPFILE="$(${MKTEMP}).$(basename ${FILE}).cc"
+ TMPFILE="$(${MKTEMP}).$(basename ${FILE}).cpp"
cp -f $FILE $TMPFILE
run_lint ${COMMON_RTL_INC_LINT_FILTER} $TMPFILE &
TMPFILES="$TMPFILES $TMPFILE"
diff --git a/test/asan/TestCases/Darwin/abort_on_error.cc b/test/asan/TestCases/Darwin/abort_on_error.cpp
index 0aa123414..7ee473b74 100644
--- a/test/asan/TestCases/Darwin/abort_on_error.cc
+++ b/test/asan/TestCases/Darwin/abort_on_error.cpp
@@ -1,5 +1,5 @@
// Check that with empty ASAN_OPTIONS, ASan reports on OS X actually crash
-// the process (abort_on_error=1). See also Linux/abort_on_error.cc.
+// the process (abort_on_error=1). See also Linux/abort_on_error.cpp.
// RUN: %clangxx_asan %s -o %t
diff --git a/test/asan/TestCases/Darwin/asan-symbolize-partial-report-no-external-symbolizer.cc b/test/asan/TestCases/Darwin/asan-symbolize-partial-report-no-external-symbolizer.cpp
index ec4ae0068..cb96ff762 100644
--- a/test/asan/TestCases/Darwin/asan-symbolize-partial-report-no-external-symbolizer.cc
+++ b/test/asan/TestCases/Darwin/asan-symbolize-partial-report-no-external-symbolizer.cpp
@@ -23,7 +23,7 @@
// CHECK-FS: WRITE of size 4
extern "C" void foo(int* a) {
- // CHECK-FS: #0 0x{{.+}} in foo {{.*}}asan-symbolize-partial-report-no-external-symbolizer.cc:[[@LINE+1]]
+ // CHECK-FS: #0 0x{{.+}} in foo {{.*}}asan-symbolize-partial-report-no-external-symbolizer.cpp:[[@LINE+1]]
*a = 5;
}
@@ -32,7 +32,7 @@ int main() {
if (!a)
return 0;
free(a);
- // CHECK-FS: #1 0x{{.+}} in main {{.*}}asan-symbolize-partial-report-no-external-symbolizer.cc:[[@LINE+1]]
+ // CHECK-FS: #1 0x{{.+}} in main {{.*}}asan-symbolize-partial-report-no-external-symbolizer.cpp:[[@LINE+1]]
foo(a);
return 0;
}
diff --git a/test/asan/TestCases/Darwin/asan-symbolize-partial-report-with-module-map.cc b/test/asan/TestCases/Darwin/asan-symbolize-partial-report-with-module-map.cpp
index 23ca8e639..c9a9c4521 100644
--- a/test/asan/TestCases/Darwin/asan-symbolize-partial-report-with-module-map.cc
+++ b/test/asan/TestCases/Darwin/asan-symbolize-partial-report-with-module-map.cpp
@@ -25,7 +25,7 @@
// CHECK-FS: WRITE of size 4
extern "C" void foo(int* a) {
- // CHECK-FS: #0 0x{{.+}} in foo {{.*}}asan-symbolize-partial-report-with-module-map.cc:[[@LINE+1]]
+ // CHECK-FS: #0 0x{{.+}} in foo {{.*}}asan-symbolize-partial-report-with-module-map.cpp:[[@LINE+1]]
*a = 5;
}
@@ -34,7 +34,7 @@ int main() {
if (!a)
return 0;
free(a);
- // CHECK-FS: #1 0x{{.+}} in main {{.*}}asan-symbolize-partial-report-with-module-map.cc:[[@LINE+1]]
+ // CHECK-FS: #1 0x{{.+}} in main {{.*}}asan-symbolize-partial-report-with-module-map.cpp:[[@LINE+1]]
foo(a);
return 0;
}
diff --git a/test/asan/TestCases/Darwin/asan-symbolize-with-module-map.cc b/test/asan/TestCases/Darwin/asan-symbolize-with-module-map.cpp
index 4557adeb0..56e1e9940 100644
--- a/test/asan/TestCases/Darwin/asan-symbolize-with-module-map.cc
+++ b/test/asan/TestCases/Darwin/asan-symbolize-with-module-map.cpp
@@ -16,7 +16,7 @@
// CHECK-MM: WRITE of size 4
extern "C" void foo(int* a) {
- // CHECK-MM: #0 0x{{.+}} in foo {{.*}}asan-symbolize-with-module-map.cc:[[@LINE+1]]
+ // CHECK-MM: #0 0x{{.+}} in foo {{.*}}asan-symbolize-with-module-map.cpp:[[@LINE+1]]
*a = 5;
}
@@ -25,7 +25,7 @@ int main() {
if (!a)
return 0;
free(a);
- // CHECK-MM: #1 0x{{.+}} in main {{.*}}asan-symbolize-with-module-map.cc:[[@LINE+1]]
+ // CHECK-MM: #1 0x{{.+}} in main {{.*}}asan-symbolize-with-module-map.cpp:[[@LINE+1]]
foo(a);
return 0;
}
diff --git a/test/asan/TestCases/Darwin/asan_gen_prefixes.cc b/test/asan/TestCases/Darwin/asan_gen_prefixes.cpp
index fe337433d..fe337433d 100644
--- a/test/asan/TestCases/Darwin/asan_gen_prefixes.cc
+++ b/test/asan/TestCases/Darwin/asan_gen_prefixes.cpp
diff --git a/test/asan/TestCases/Darwin/atos-symbolizer-dyld-root-path.cc b/test/asan/TestCases/Darwin/atos-symbolizer-dyld-root-path.cpp
index fc3d0dd0b..664471b69 100644
--- a/test/asan/TestCases/Darwin/atos-symbolizer-dyld-root-path.cc
+++ b/test/asan/TestCases/Darwin/atos-symbolizer-dyld-root-path.cpp
@@ -20,11 +20,11 @@ int main(int argc, char **argv) {
// CHECK: Using atos at user-specified path:
// CHECK: AddressSanitizer: attempting double-free{{.*}}in thread T0
// CHECK: #0 0x{{.*}} in {{.*}}free
- // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer-dyld-root-path.cc:[[@LINE-4]]
+ // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer-dyld-root-path.cpp:[[@LINE-4]]
// CHECK: freed by thread T0 here:
// CHECK: #0 0x{{.*}} in {{.*}}free
- // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer-dyld-root-path.cc:[[@LINE-8]]
+ // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer-dyld-root-path.cpp:[[@LINE-8]]
// CHECK: allocated by thread T0 here:
- // CHECK: atos-symbolizer-dyld-root-path.cc:[[@LINE-13]]
+ // CHECK: atos-symbolizer-dyld-root-path.cpp:[[@LINE-13]]
return res;
}
diff --git a/test/asan/TestCases/Darwin/atos-symbolizer.cc b/test/asan/TestCases/Darwin/atos-symbolizer.cpp
index e7d7e7a17..bab4e4f37 100644
--- a/test/asan/TestCases/Darwin/atos-symbolizer.cc
+++ b/test/asan/TestCases/Darwin/atos-symbolizer.cpp
@@ -17,11 +17,11 @@ int main(int argc, char **argv) {
// CHECK: Using atos at user-specified path:
// CHECK: AddressSanitizer: attempting double-free{{.*}}in thread T0
// CHECK: #0 0x{{.*}} in {{.*}}free
- // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer.cc:[[@LINE-4]]
+ // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer.cpp:[[@LINE-4]]
// CHECK: freed by thread T0 here:
// CHECK: #0 0x{{.*}} in {{.*}}free
- // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer.cc:[[@LINE-8]]
+ // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer.cpp:[[@LINE-8]]
// CHECK: allocated by thread T0 here:
- // CHECK: atos-symbolizer.cc:[[@LINE-13]]
+ // CHECK: atos-symbolizer.cpp:[[@LINE-13]]
return res;
}
diff --git a/test/asan/TestCases/Darwin/dladdr-demangling.cc b/test/asan/TestCases/Darwin/dladdr-demangling.cpp
index fb6f6d79b..fb6f6d79b 100644
--- a/test/asan/TestCases/Darwin/dladdr-demangling.cc
+++ b/test/asan/TestCases/Darwin/dladdr-demangling.cpp
diff --git a/test/asan/TestCases/Darwin/dump_registers.cc b/test/asan/TestCases/Darwin/dump_registers.cpp
index cc2710f06..cc2710f06 100644
--- a/test/asan/TestCases/Darwin/dump_registers.cc
+++ b/test/asan/TestCases/Darwin/dump_registers.cpp
diff --git a/test/asan/TestCases/Darwin/dyld_insert_libraries_reexec.cc b/test/asan/TestCases/Darwin/dyld_insert_libraries_reexec.cpp
index d195258d7..d195258d7 100644
--- a/test/asan/TestCases/Darwin/dyld_insert_libraries_reexec.cc
+++ b/test/asan/TestCases/Darwin/dyld_insert_libraries_reexec.cpp
diff --git a/test/asan/TestCases/Darwin/dyld_insert_libraries_remove.cc b/test/asan/TestCases/Darwin/dyld_insert_libraries_remove.cpp
index 0672e064a..0672e064a 100644
--- a/test/asan/TestCases/Darwin/dyld_insert_libraries_remove.cc
+++ b/test/asan/TestCases/Darwin/dyld_insert_libraries_remove.cpp
diff --git a/test/asan/TestCases/Darwin/empty-section.cc b/test/asan/TestCases/Darwin/empty-section.cpp
index 5b006b545..5b006b545 100644
--- a/test/asan/TestCases/Darwin/empty-section.cc
+++ b/test/asan/TestCases/Darwin/empty-section.cpp
diff --git a/test/asan/TestCases/Darwin/haswell-symbolication.cc b/test/asan/TestCases/Darwin/haswell-symbolication.cpp
index 7856c4d61..f5ed831f2 100644
--- a/test/asan/TestCases/Darwin/haswell-symbolication.cc
+++ b/test/asan/TestCases/Darwin/haswell-symbolication.cpp
@@ -84,7 +84,7 @@ extern "C"
void faulty_func(char *p) {
*p = 'x'; // BOOM
// CHECK: AddressSanitizer: global-buffer-overflow
- // CHECK-LI: #0 0x{{.*}} in faulty_func{{.*}} {{.*}}haswell-symbolication.cc:[[@LINE-2]]
+ // CHECK-LI: #0 0x{{.*}} in faulty_func{{.*}} {{.*}}haswell-symbolication.cpp:[[@LINE-2]]
// CHECK-NOLI: #0 0x{{.*}} in faulty_func{{.*}} {{.*}}haswell-symbolication
// CHECK: is located 2 bytes to the right of global variable 'faulty_global'
// CHECK-NOT: LLVMSymbolizer: error reading file
diff --git a/test/asan/TestCases/Darwin/init_for_dlopen.cc b/test/asan/TestCases/Darwin/init_for_dlopen.cpp
index 8a0fbf943..8a0fbf943 100644
--- a/test/asan/TestCases/Darwin/init_for_dlopen.cc
+++ b/test/asan/TestCases/Darwin/init_for_dlopen.cpp
diff --git a/test/asan/TestCases/Darwin/interface_symbols_darwin.cc b/test/asan/TestCases/Darwin/interface_symbols_darwin.cpp
index a8e2bcb3e..a8e2bcb3e 100644
--- a/test/asan/TestCases/Darwin/interface_symbols_darwin.cc
+++ b/test/asan/TestCases/Darwin/interface_symbols_darwin.cpp
diff --git a/test/asan/TestCases/Darwin/linked-only.cc b/test/asan/TestCases/Darwin/linked-only.cpp
index bb19ea853..bb19ea853 100644
--- a/test/asan/TestCases/Darwin/linked-only.cc
+++ b/test/asan/TestCases/Darwin/linked-only.cpp
diff --git a/test/asan/TestCases/Darwin/malloc_destroy_zone.cc b/test/asan/TestCases/Darwin/malloc_destroy_zone.cpp
index 9144bd689..9144bd689 100644
--- a/test/asan/TestCases/Darwin/malloc_destroy_zone.cc
+++ b/test/asan/TestCases/Darwin/malloc_destroy_zone.cpp
diff --git a/test/asan/TestCases/Darwin/malloc_set_zone_name-mprotect.cc b/test/asan/TestCases/Darwin/malloc_set_zone_name-mprotect.cpp
index b9b96ef05..b9b96ef05 100644
--- a/test/asan/TestCases/Darwin/malloc_set_zone_name-mprotect.cc
+++ b/test/asan/TestCases/Darwin/malloc_set_zone_name-mprotect.cpp
diff --git a/test/asan/TestCases/Darwin/malloc_zone-protected.cc b/test/asan/TestCases/Darwin/malloc_zone-protected.cpp
index 362b60e20..362b60e20 100644
--- a/test/asan/TestCases/Darwin/malloc_zone-protected.cc
+++ b/test/asan/TestCases/Darwin/malloc_zone-protected.cpp
diff --git a/test/asan/TestCases/Darwin/mixing-global-constructors.cc b/test/asan/TestCases/Darwin/mixing-global-constructors.cpp
index 0b0f15cc7..0b0f15cc7 100644
--- a/test/asan/TestCases/Darwin/mixing-global-constructors.cc
+++ b/test/asan/TestCases/Darwin/mixing-global-constructors.cpp
diff --git a/test/asan/TestCases/Darwin/odr-lto.cc b/test/asan/TestCases/Darwin/odr-lto.cpp
index e1e454be0..e1e454be0 100644
--- a/test/asan/TestCases/Darwin/odr-lto.cc
+++ b/test/asan/TestCases/Darwin/odr-lto.cpp
diff --git a/test/asan/TestCases/Darwin/reexec-insert-libraries-env.cc b/test/asan/TestCases/Darwin/reexec-insert-libraries-env.cpp
index bee23f25c..bee23f25c 100644
--- a/test/asan/TestCases/Darwin/reexec-insert-libraries-env.cc
+++ b/test/asan/TestCases/Darwin/reexec-insert-libraries-env.cpp
diff --git a/test/asan/TestCases/Darwin/sandbox-symbolizer.cc b/test/asan/TestCases/Darwin/sandbox-symbolizer.cpp
index b36c4faed..b36c4faed 100644
--- a/test/asan/TestCases/Darwin/sandbox-symbolizer.cc
+++ b/test/asan/TestCases/Darwin/sandbox-symbolizer.cpp
diff --git a/test/asan/TestCases/Darwin/scribble.cc b/test/asan/TestCases/Darwin/scribble.cpp
index 8303cf316..8303cf316 100644
--- a/test/asan/TestCases/Darwin/scribble.cc
+++ b/test/asan/TestCases/Darwin/scribble.cpp
diff --git a/test/asan/TestCases/Darwin/suppressions-darwin.cc b/test/asan/TestCases/Darwin/suppressions-darwin.cpp
index 8c207b102..8c207b102 100644
--- a/test/asan/TestCases/Darwin/suppressions-darwin.cc
+++ b/test/asan/TestCases/Darwin/suppressions-darwin.cpp
diff --git a/test/asan/TestCases/Darwin/suppressions-function.cc b/test/asan/TestCases/Darwin/suppressions-function.cpp
index f58796fb8..f58796fb8 100644
--- a/test/asan/TestCases/Darwin/suppressions-function.cc
+++ b/test/asan/TestCases/Darwin/suppressions-function.cpp
diff --git a/test/asan/TestCases/Darwin/suppressions-sandbox.cc b/test/asan/TestCases/Darwin/suppressions-sandbox.cpp
index 966f21346..966f21346 100644
--- a/test/asan/TestCases/Darwin/suppressions-sandbox.cc
+++ b/test/asan/TestCases/Darwin/suppressions-sandbox.cpp
diff --git a/test/asan/TestCases/Darwin/unset-insert-libraries-on-exec.cc b/test/asan/TestCases/Darwin/unset-insert-libraries-on-exec.cpp
index 38fb3aa55..a4fa04744 100644
--- a/test/asan/TestCases/Darwin/unset-insert-libraries-on-exec.cc
+++ b/test/asan/TestCases/Darwin/unset-insert-libraries-on-exec.cpp
@@ -2,7 +2,7 @@
// executing other programs.
// RUN: %clangxx_asan %s -o %t
-// RUN: %clangxx %p/../Helpers/echo-env.cc -o %t-echo-env
+// RUN: %clangxx %p/../Helpers/echo-env.cpp -o %t-echo-env
// RUN: %clangxx -DSHARED_LIB %s \
// RUN: -dynamiclib -o %t-darwin-dummy-shared-lib-so.dylib
diff --git a/test/asan/TestCases/Darwin/uuid.cc b/test/asan/TestCases/Darwin/uuid.cpp
index 33638587e..ba2d4494d 100644
--- a/test/asan/TestCases/Darwin/uuid.cc
+++ b/test/asan/TestCases/Darwin/uuid.cpp
@@ -25,7 +25,7 @@ int main(int argc, char *argv[]) {
memcpy(mybuf, x, 10);
// CHECK: {{.*ERROR: AddressSanitizer: heap-use-after-free on address}}
// CHECK: Process module map:
- // CHECK: uuid.cc.tmp {{.*}} <[[UUID]]>
+ // CHECK: uuid.cpp.tmp {{.*}} <[[UUID]]>
fprintf(stderr, "Done.\n");
}
diff --git a/test/asan/TestCases/Helpers/blacklist-extra.cc b/test/asan/TestCases/Helpers/blacklist-extra.cpp
index 627115cdd..627115cdd 100644
--- a/test/asan/TestCases/Helpers/blacklist-extra.cc
+++ b/test/asan/TestCases/Helpers/blacklist-extra.cpp
diff --git a/test/asan/TestCases/Helpers/echo-env.cc b/test/asan/TestCases/Helpers/echo-env.cpp
index 65e91c155..48b46fcd8 100644
--- a/test/asan/TestCases/Helpers/echo-env.cc
+++ b/test/asan/TestCases/Helpers/echo-env.cpp
@@ -1,5 +1,5 @@
// Helper binary for
-// lit_tests/TestCases/Darwin/unset-insert-libraries-on-exec.cc
+// lit_tests/TestCases/Darwin/unset-insert-libraries-on-exec.cpp
// Prints the environment variable with the given name.
#include <stdio.h>
#include <stdlib.h>
diff --git a/test/asan/TestCases/Helpers/init-order-atexit-extra.cc b/test/asan/TestCases/Helpers/init-order-atexit-extra.cpp
index e4189d19d..e4189d19d 100644
--- a/test/asan/TestCases/Helpers/init-order-atexit-extra.cc
+++ b/test/asan/TestCases/Helpers/init-order-atexit-extra.cpp
diff --git a/test/asan/TestCases/Helpers/initialization-blacklist-extra.cc b/test/asan/TestCases/Helpers/initialization-blacklist-extra.cpp
index 09aed2112..09aed2112 100644
--- a/test/asan/TestCases/Helpers/initialization-blacklist-extra.cc
+++ b/test/asan/TestCases/Helpers/initialization-blacklist-extra.cpp
diff --git a/test/asan/TestCases/Helpers/initialization-blacklist-extra2.cc b/test/asan/TestCases/Helpers/initialization-blacklist-extra2.cpp
index 69455a0a6..69455a0a6 100644
--- a/test/asan/TestCases/Helpers/initialization-blacklist-extra2.cc
+++ b/test/asan/TestCases/Helpers/initialization-blacklist-extra2.cpp
diff --git a/test/asan/TestCases/Helpers/initialization-blacklist.txt b/test/asan/TestCases/Helpers/initialization-blacklist.txt
index 832946356..27e49e25f 100644
--- a/test/asan/TestCases/Helpers/initialization-blacklist.txt
+++ b/test/asan/TestCases/Helpers/initialization-blacklist.txt
@@ -1,3 +1,3 @@
global:*badGlobal*=init
type:*badNamespace::BadClass*=init
-src:*initialization-blacklist-extra2.cc=init
+src:*initialization-blacklist-extra2.cpp=init
diff --git a/test/asan/TestCases/Helpers/initialization-bug-extra.cc b/test/asan/TestCases/Helpers/initialization-bug-extra.cpp
index 3c4cb411d..3c4cb411d 100644
--- a/test/asan/TestCases/Helpers/initialization-bug-extra.cc
+++ b/test/asan/TestCases/Helpers/initialization-bug-extra.cpp
diff --git a/test/asan/TestCases/Helpers/initialization-bug-extra2.cc b/test/asan/TestCases/Helpers/initialization-bug-extra2.cpp
index a3d8f190e..a3d8f190e 100644
--- a/test/asan/TestCases/Helpers/initialization-bug-extra2.cc
+++ b/test/asan/TestCases/Helpers/initialization-bug-extra2.cpp
diff --git a/test/asan/TestCases/Helpers/initialization-constexpr-extra.cc b/test/asan/TestCases/Helpers/initialization-constexpr-extra.cpp
index b32466a98..b32466a98 100644
--- a/test/asan/TestCases/Helpers/initialization-constexpr-extra.cc
+++ b/test/asan/TestCases/Helpers/initialization-constexpr-extra.cpp
diff --git a/test/asan/TestCases/Helpers/initialization-nobug-extra.cc b/test/asan/TestCases/Helpers/initialization-nobug-extra.cpp
index 886165aff..886165aff 100644
--- a/test/asan/TestCases/Helpers/initialization-nobug-extra.cc
+++ b/test/asan/TestCases/Helpers/initialization-nobug-extra.cpp
diff --git a/test/asan/TestCases/Helpers/underflow.cc b/test/asan/TestCases/Helpers/underflow.cpp
index 26979482f..26979482f 100644
--- a/test/asan/TestCases/Helpers/underflow.cc
+++ b/test/asan/TestCases/Helpers/underflow.cpp
diff --git a/test/asan/TestCases/Linux/abort_on_error.cc b/test/asan/TestCases/Linux/abort_on_error.cpp
index 3fe98995f..a78048388 100644
--- a/test/asan/TestCases/Linux/abort_on_error.cc
+++ b/test/asan/TestCases/Linux/abort_on_error.cpp
@@ -1,5 +1,5 @@
// Check that with empty ASAN_OPTIONS, ASan reports on Linux don't crash
-// the process (abort_on_error=0). See also Darwin/abort_on_error.cc.
+// the process (abort_on_error=0). See also Darwin/abort_on_error.cpp.
// RUN: %clangxx_asan %s -o %t
diff --git a/test/asan/TestCases/Linux/activation-options.cc b/test/asan/TestCases/Linux/activation-options.cpp
index 39924c4b1..0074a6699 100644
--- a/test/asan/TestCases/Linux/activation-options.cc
+++ b/test/asan/TestCases/Linux/activation-options.cpp
@@ -6,9 +6,9 @@
// RUN: %clangxx -O0 %s -c -o %t.o
// RUN: %clangxx_asan -O0 %t.o %libdl -o %t
-// RUN: rm -f %t.asan.options.activation-options.cc.tmp
+// RUN: rm -f %t.asan.options.activation-options.cpp.tmp
// RUN: rm -f %t.asan.options.ABCDE
-// RUN: echo "help=1" >%t.asan.options.activation-options.cc.tmp
+// RUN: echo "help=1" >%t.asan.options.activation-options.cpp.tmp
// RUN: %env_asan_opts=start_deactivated=1 \
// RUN: ASAN_ACTIVATION_OPTIONS=include=%t.asan.options.%b %run %t 2>&1 | \
diff --git a/test/asan/TestCases/Linux/aligned_delete_test.cc b/test/asan/TestCases/Linux/aligned_delete_test.cpp
index 2325242e0..2325242e0 100644
--- a/test/asan/TestCases/Linux/aligned_delete_test.cc
+++ b/test/asan/TestCases/Linux/aligned_delete_test.cpp
diff --git a/test/asan/TestCases/Linux/allocator_oom_test.cc b/test/asan/TestCases/Linux/allocator_oom_test.cpp
index c450ae5bb..c450ae5bb 100644
--- a/test/asan/TestCases/Linux/allocator_oom_test.cc
+++ b/test/asan/TestCases/Linux/allocator_oom_test.cpp
diff --git a/test/asan/TestCases/Linux/asan_default_suppressions.cc b/test/asan/TestCases/Linux/asan_default_suppressions.cpp
index 5ff59c1df..5ff59c1df 100644
--- a/test/asan/TestCases/Linux/asan_default_suppressions.cc
+++ b/test/asan/TestCases/Linux/asan_default_suppressions.cpp
diff --git a/test/asan/TestCases/Linux/asan_dlopen_test.cc b/test/asan/TestCases/Linux/asan_dlopen_test.cpp
index 5081b7753..5081b7753 100644
--- a/test/asan/TestCases/Linux/asan_dlopen_test.cc
+++ b/test/asan/TestCases/Linux/asan_dlopen_test.cpp
diff --git a/test/asan/TestCases/Linux/asan_prelink_test.cc b/test/asan/TestCases/Linux/asan_prelink_test.cpp
index e00c215e9..e00c215e9 100644
--- a/test/asan/TestCases/Linux/asan_prelink_test.cc
+++ b/test/asan/TestCases/Linux/asan_prelink_test.cpp
diff --git a/test/asan/TestCases/Linux/asan_preload_test-1.cc b/test/asan/TestCases/Linux/asan_preload_test-1.cpp
index e11bd623d..e11bd623d 100644
--- a/test/asan/TestCases/Linux/asan_preload_test-1.cc
+++ b/test/asan/TestCases/Linux/asan_preload_test-1.cpp
diff --git a/test/asan/TestCases/Linux/asan_preload_test-2.cc b/test/asan/TestCases/Linux/asan_preload_test-2.cpp
index 817c560d4..817c560d4 100644
--- a/test/asan/TestCases/Linux/asan_preload_test-2.cc
+++ b/test/asan/TestCases/Linux/asan_preload_test-2.cpp
diff --git a/test/asan/TestCases/Linux/asan_preload_test-3.cc b/test/asan/TestCases/Linux/asan_preload_test-3.cpp
index e998ff647..e998ff647 100644
--- a/test/asan/TestCases/Linux/asan_preload_test-3.cc
+++ b/test/asan/TestCases/Linux/asan_preload_test-3.cpp
diff --git a/test/asan/TestCases/Linux/asan_rt_confict_test-1.cc b/test/asan/TestCases/Linux/asan_rt_confict_test-1.cpp
index 8cf761c90..8cf761c90 100644
--- a/test/asan/TestCases/Linux/asan_rt_confict_test-1.cc
+++ b/test/asan/TestCases/Linux/asan_rt_confict_test-1.cpp
diff --git a/test/asan/TestCases/Linux/asan_rt_confict_test-2.cc b/test/asan/TestCases/Linux/asan_rt_confict_test-2.cpp
index 6328cbb2c..6328cbb2c 100644
--- a/test/asan/TestCases/Linux/asan_rt_confict_test-2.cc
+++ b/test/asan/TestCases/Linux/asan_rt_confict_test-2.cpp
diff --git a/test/asan/TestCases/Linux/auto_memory_profile_test.cc b/test/asan/TestCases/Linux/auto_memory_profile_test.cpp
index 3f8ad4673..3f8ad4673 100644
--- a/test/asan/TestCases/Linux/auto_memory_profile_test.cc
+++ b/test/asan/TestCases/Linux/auto_memory_profile_test.cpp
diff --git a/test/asan/TestCases/Linux/bzero.cc b/test/asan/TestCases/Linux/bzero.cpp
index 430edb744..430edb744 100644
--- a/test/asan/TestCases/Linux/bzero.cc
+++ b/test/asan/TestCases/Linux/bzero.cpp
diff --git a/test/asan/TestCases/Linux/clang_gcc_abi.cc b/test/asan/TestCases/Linux/clang_gcc_abi.cpp
index e0ae3f1f8..0c3fa0aed 100644
--- a/test/asan/TestCases/Linux/clang_gcc_abi.cc
+++ b/test/asan/TestCases/Linux/clang_gcc_abi.cpp
@@ -11,12 +11,12 @@ __attribute__((noinline))
int boom() {
volatile int three = 3;
char * volatile s = (char *)malloc(three);
-// CHECK: #1 0x{{.*}} in boom {{.*}}clang_gcc_abi.cc:[[@LINE-1]]
+// CHECK: #1 0x{{.*}} in boom {{.*}}clang_gcc_abi.cpp:[[@LINE-1]]
return s[three]; //BOOM
}
__attribute__((naked, noinline)) void gcc_abi() {
-// CHECK: #2 0x{{.*}} in gcc_abi {{.*}}clang_gcc_abi.cc:[[@LINE+1]]
+// CHECK: #2 0x{{.*}} in gcc_abi {{.*}}clang_gcc_abi.cpp:[[@LINE+1]]
asm volatile("str fp, [sp, #-8]!\n\t"
"str lr, [sp, #4]\n\t"
"add fp, sp, #4\n\t"
@@ -29,7 +29,7 @@ __attribute__((naked, noinline)) void gcc_abi() {
}
__attribute__((naked, noinline)) void clang_abi() {
-// CHECK: #3 0x{{.*}} in clang_abi {{.*}}clang_gcc_abi.cc:[[@LINE+1]]
+// CHECK: #3 0x{{.*}} in clang_abi {{.*}}clang_gcc_abi.cpp:[[@LINE+1]]
asm volatile("push {r11, lr}\n\t"
"mov r11, sp\n\t"
"bl gcc_abi\n\t"
@@ -40,5 +40,5 @@ __attribute__((naked, noinline)) void clang_abi() {
int main() {
clang_abi();
-// CHECK: #4 0x{{.*}} in main {{.*}}clang_gcc_abi.cc:[[@LINE-1]]
+// CHECK: #4 0x{{.*}} in main {{.*}}clang_gcc_abi.cpp:[[@LINE-1]]
}
diff --git a/test/asan/TestCases/Linux/clone_test.cc b/test/asan/TestCases/Linux/clone_test.cpp
index 0b86238cc..0b86238cc 100644
--- a/test/asan/TestCases/Linux/clone_test.cc
+++ b/test/asan/TestCases/Linux/clone_test.cpp
diff --git a/test/asan/TestCases/Linux/coverage-missing.cc b/test/asan/TestCases/Linux/coverage-missing.cpp
index 10acef9af..10acef9af 100644
--- a/test/asan/TestCases/Linux/coverage-missing.cc
+++ b/test/asan/TestCases/Linux/coverage-missing.cpp
diff --git a/test/asan/TestCases/Linux/cuda_test.cc b/test/asan/TestCases/Linux/cuda_test.cpp
index e532f2ee7..e532f2ee7 100644
--- a/test/asan/TestCases/Linux/cuda_test.cc
+++ b/test/asan/TestCases/Linux/cuda_test.cpp
diff --git a/test/asan/TestCases/Linux/function-sections-are-bad.cc b/test/asan/TestCases/Linux/function-sections-are-bad.cpp
index 15aaccbc9..15aaccbc9 100644
--- a/test/asan/TestCases/Linux/function-sections-are-bad.cc
+++ b/test/asan/TestCases/Linux/function-sections-are-bad.cpp
diff --git a/test/asan/TestCases/Linux/global-overflow-bfd.cc b/test/asan/TestCases/Linux/global-overflow-bfd.cpp
index 117a761af..117a761af 100644
--- a/test/asan/TestCases/Linux/global-overflow-bfd.cc
+++ b/test/asan/TestCases/Linux/global-overflow-bfd.cpp
diff --git a/test/asan/TestCases/Linux/global-overflow-lld.cc b/test/asan/TestCases/Linux/global-overflow-lld.cpp
index f4d0bc977..f4d0bc977 100644
--- a/test/asan/TestCases/Linux/global-overflow-lld.cc
+++ b/test/asan/TestCases/Linux/global-overflow-lld.cpp
diff --git a/test/asan/TestCases/Linux/globals-gc-sections-lld.cc b/test/asan/TestCases/Linux/globals-gc-sections-lld.cpp
index 0d8bcdd1c..0d8bcdd1c 100644
--- a/test/asan/TestCases/Linux/globals-gc-sections-lld.cc
+++ b/test/asan/TestCases/Linux/globals-gc-sections-lld.cpp
diff --git a/test/asan/TestCases/Linux/init-order-dlopen.cc b/test/asan/TestCases/Linux/init-order-dlopen.cpp
index d469b9808..d469b9808 100644
--- a/test/asan/TestCases/Linux/init-order-dlopen.cc
+++ b/test/asan/TestCases/Linux/init-order-dlopen.cpp
diff --git a/test/asan/TestCases/Linux/init_fini_sections.cc b/test/asan/TestCases/Linux/init_fini_sections.cpp
index 3037b2329..3037b2329 100644
--- a/test/asan/TestCases/Linux/init_fini_sections.cc
+++ b/test/asan/TestCases/Linux/init_fini_sections.cpp
diff --git a/test/asan/TestCases/Linux/initialization-bug-any-order.cc b/test/asan/TestCases/Linux/initialization-bug-any-order.cpp
index 85fefd40e..5936cc6b9 100644
--- a/test/asan/TestCases/Linux/initialization-bug-any-order.cc
+++ b/test/asan/TestCases/Linux/initialization-bug-any-order.cpp
@@ -3,9 +3,9 @@
// independently on order in which we list source files (if we specify
// strict init-order checking).
-// RUN: %clangxx_asan -O0 %s %p/../Helpers/initialization-bug-extra.cc -o %t
+// RUN: %clangxx_asan -O0 %s %p/../Helpers/initialization-bug-extra.cpp -o %t
// RUN: %env_asan_opts=strict_init_order=true not %run %t 2>&1 | FileCheck %s
-// RUN: %clangxx_asan -O0 %p/../Helpers/initialization-bug-extra.cc %s -o %t
+// RUN: %clangxx_asan -O0 %p/../Helpers/initialization-bug-extra.cpp %s -o %t
// RUN: %env_asan_opts=strict_init_order=true not %run %t 2>&1 | FileCheck %s
// Do not test with optimization -- the error may be optimized away.
@@ -21,7 +21,7 @@ int __attribute__((noinline)) initX() {
return y + 1;
// CHECK: {{AddressSanitizer: initialization-order-fiasco}}
// CHECK: {{READ of size .* at 0x.* thread T0}}
- // CHECK: {{#0 0x.* in .*initX.* .*initialization-bug-any-order.cc:}}[[@LINE-3]]
+ // CHECK: {{#0 0x.* in .*initX.* .*initialization-bug-any-order.cpp:}}[[@LINE-3]]
// CHECK: {{0x.* is located 0 bytes inside of global variable .*y.*}}
}
diff --git a/test/asan/TestCases/Linux/interception_malloc_test.cc b/test/asan/TestCases/Linux/interception_malloc_test.cpp
index f6d6d340b..f6d6d340b 100644
--- a/test/asan/TestCases/Linux/interception_malloc_test.cc
+++ b/test/asan/TestCases/Linux/interception_malloc_test.cpp
diff --git a/test/asan/TestCases/Linux/interception_readdir_r_test.cc b/test/asan/TestCases/Linux/interception_readdir_r_test.cpp
index 987dff275..987dff275 100644
--- a/test/asan/TestCases/Linux/interception_readdir_r_test.cc
+++ b/test/asan/TestCases/Linux/interception_readdir_r_test.cpp
diff --git a/test/asan/TestCases/Linux/interception_test.cc b/test/asan/TestCases/Linux/interception_test.cpp
index fb9d01cfe..fb9d01cfe 100644
--- a/test/asan/TestCases/Linux/interception_test.cc
+++ b/test/asan/TestCases/Linux/interception_test.cpp
diff --git a/test/asan/TestCases/Linux/interface_symbols_linux.cc b/test/asan/TestCases/Linux/interface_symbols_linux.cpp
index 8c22976e7..8c22976e7 100644
--- a/test/asan/TestCases/Linux/interface_symbols_linux.cc
+++ b/test/asan/TestCases/Linux/interface_symbols_linux.cpp
diff --git a/test/asan/TestCases/Linux/kernel-area.cc b/test/asan/TestCases/Linux/kernel-area.cpp
index 41b507cdf..41b507cdf 100644
--- a/test/asan/TestCases/Linux/kernel-area.cc
+++ b/test/asan/TestCases/Linux/kernel-area.cpp
diff --git a/test/asan/TestCases/Linux/leak.cc b/test/asan/TestCases/Linux/leak.cpp
index e22cd6eac..e22cd6eac 100644
--- a/test/asan/TestCases/Linux/leak.cc
+++ b/test/asan/TestCases/Linux/leak.cpp
diff --git a/test/asan/TestCases/Linux/leak_check_segv.cc b/test/asan/TestCases/Linux/leak_check_segv.cpp
index 2a2010f7a..2a2010f7a 100644
--- a/test/asan/TestCases/Linux/leak_check_segv.cc
+++ b/test/asan/TestCases/Linux/leak_check_segv.cpp
diff --git a/test/asan/TestCases/Linux/local_alias.cc b/test/asan/TestCases/Linux/local_alias.cpp
index a8b3d75e3..a8b3d75e3 100644
--- a/test/asan/TestCases/Linux/local_alias.cc
+++ b/test/asan/TestCases/Linux/local_alias.cpp
diff --git a/test/asan/TestCases/Linux/long-object-path.cc b/test/asan/TestCases/Linux/long-object-path.cpp
index 592b0abb0..592b0abb0 100644
--- a/test/asan/TestCases/Linux/long-object-path.cc
+++ b/test/asan/TestCases/Linux/long-object-path.cpp
diff --git a/test/asan/TestCases/Linux/malloc-in-qsort.cc b/test/asan/TestCases/Linux/malloc-in-qsort.cpp
index ea2392442..ea2392442 100644
--- a/test/asan/TestCases/Linux/malloc-in-qsort.cc
+++ b/test/asan/TestCases/Linux/malloc-in-qsort.cpp
diff --git a/test/asan/TestCases/Linux/malloc_delete_mismatch.cc b/test/asan/TestCases/Linux/malloc_delete_mismatch.cpp
index 50d920e43..50d920e43 100644
--- a/test/asan/TestCases/Linux/malloc_delete_mismatch.cc
+++ b/test/asan/TestCases/Linux/malloc_delete_mismatch.cpp
diff --git a/test/asan/TestCases/Linux/memmem_test.cc b/test/asan/TestCases/Linux/memmem_test.cpp
index a838cb56a..a838cb56a 100644
--- a/test/asan/TestCases/Linux/memmem_test.cc
+++ b/test/asan/TestCases/Linux/memmem_test.cpp
diff --git a/test/asan/TestCases/Linux/mincore.cc b/test/asan/TestCases/Linux/mincore.cpp
index 30f450830..30f450830 100644
--- a/test/asan/TestCases/Linux/mincore.cc
+++ b/test/asan/TestCases/Linux/mincore.cpp
diff --git a/test/asan/TestCases/Linux/new_delete_mismatch.cc b/test/asan/TestCases/Linux/new_delete_mismatch.cpp
index 05f74bda7..05f74bda7 100644
--- a/test/asan/TestCases/Linux/new_delete_mismatch.cc
+++ b/test/asan/TestCases/Linux/new_delete_mismatch.cpp
diff --git a/test/asan/TestCases/Linux/new_delete_mismatch_global.cc b/test/asan/TestCases/Linux/new_delete_mismatch_global.cpp
index 3f1a78715..3f1a78715 100644
--- a/test/asan/TestCases/Linux/new_delete_mismatch_global.cc
+++ b/test/asan/TestCases/Linux/new_delete_mismatch_global.cpp
diff --git a/test/asan/TestCases/Linux/new_delete_mismatch_stack.cc b/test/asan/TestCases/Linux/new_delete_mismatch_stack.cpp
index bbf07cc21..bbf07cc21 100644
--- a/test/asan/TestCases/Linux/new_delete_mismatch_stack.cc
+++ b/test/asan/TestCases/Linux/new_delete_mismatch_stack.cpp
diff --git a/test/asan/TestCases/Linux/nohugepage_test.cc b/test/asan/TestCases/Linux/nohugepage_test.cpp
index 0fd7c558d..0fd7c558d 100644
--- a/test/asan/TestCases/Linux/nohugepage_test.cc
+++ b/test/asan/TestCases/Linux/nohugepage_test.cpp
diff --git a/test/asan/TestCases/Linux/odr-violation.cc b/test/asan/TestCases/Linux/odr-violation.cpp
index a1941fcc8..9cdafca91 100644
--- a/test/asan/TestCases/Linux/odr-violation.cc
+++ b/test/asan/TestCases/Linux/odr-violation.cpp
@@ -51,7 +51,7 @@ namespace foo { char G[SZ]; }
#include <stdio.h>
namespace foo { char G[100]; }
// CHECK: ERROR: AddressSanitizer: odr-violation
-// CHECK: size=100 'foo::G' {{.*}}odr-violation.cc:[[@LINE-2]]:22
+// CHECK: size=100 'foo::G' {{.*}}odr-violation.cpp:[[@LINE-2]]:22
// CHECK: size={{4|100}} 'foo::G'
int main(int argc, char **argv) {
printf("PASS: %p\n", &foo::G);
@@ -60,6 +60,6 @@ int main(int argc, char **argv) {
// CHECK: These globals were registered at these points:
// CHECK: ODR-EXE
-// CHECK: odr-violation.cc.dynamic
-// CHECK: SUMMARY: AddressSanitizer: odr-violation: global 'foo::G' at {{.*}}odr-violation.cc
+// CHECK: odr-violation.cpp.dynamic
+// CHECK: SUMMARY: AddressSanitizer: odr-violation: global 'foo::G' at {{.*}}odr-violation.cpp
// DISABLED: PASS
diff --git a/test/asan/TestCases/Linux/odr-vtable.cc b/test/asan/TestCases/Linux/odr-vtable.cpp
index fdbab4bb1..fdbab4bb1 100644
--- a/test/asan/TestCases/Linux/odr-vtable.cc
+++ b/test/asan/TestCases/Linux/odr-vtable.cpp
diff --git a/test/asan/TestCases/Linux/odr_indicators.cc b/test/asan/TestCases/Linux/odr_indicators.cpp
index 36176b552..36176b552 100644
--- a/test/asan/TestCases/Linux/odr_indicators.cc
+++ b/test/asan/TestCases/Linux/odr_indicators.cpp
diff --git a/test/asan/TestCases/Linux/overflow-in-qsort.cc b/test/asan/TestCases/Linux/overflow-in-qsort.cpp
index 6990518e4..6990518e4 100644
--- a/test/asan/TestCases/Linux/overflow-in-qsort.cc
+++ b/test/asan/TestCases/Linux/overflow-in-qsort.cpp
diff --git a/test/asan/TestCases/Linux/preinit_test.cc b/test/asan/TestCases/Linux/preinit_test.cpp
index f8c2b6bf5..f8c2b6bf5 100644
--- a/test/asan/TestCases/Linux/preinit_test.cc
+++ b/test/asan/TestCases/Linux/preinit_test.cpp
diff --git a/test/asan/TestCases/Linux/preinstalled_signal.cc b/test/asan/TestCases/Linux/preinstalled_signal.cpp
index 2b50944c6..2b50944c6 100644
--- a/test/asan/TestCases/Linux/preinstalled_signal.cc
+++ b/test/asan/TestCases/Linux/preinstalled_signal.cpp
diff --git a/test/asan/TestCases/Linux/print_memory_profile_test.cc b/test/asan/TestCases/Linux/print_memory_profile_test.cpp
index e7896be40..e7896be40 100644
--- a/test/asan/TestCases/Linux/print_memory_profile_test.cc
+++ b/test/asan/TestCases/Linux/print_memory_profile_test.cpp
diff --git a/test/asan/TestCases/Linux/pthread_create_from_constructor.cc b/test/asan/TestCases/Linux/pthread_create_from_constructor.cpp
index 8f9b0b4fe..8f9b0b4fe 100644
--- a/test/asan/TestCases/Linux/pthread_create_from_constructor.cc
+++ b/test/asan/TestCases/Linux/pthread_create_from_constructor.cpp
diff --git a/test/asan/TestCases/Linux/pthread_create_version.cc b/test/asan/TestCases/Linux/pthread_create_version.cpp
index efdb8ca97..efdb8ca97 100644
--- a/test/asan/TestCases/Linux/pthread_create_version.cc
+++ b/test/asan/TestCases/Linux/pthread_create_version.cpp
diff --git a/test/asan/TestCases/Linux/ptrace.cc b/test/asan/TestCases/Linux/ptrace.cpp
index bd3d2d27e..255bfe6b7 100644
--- a/test/asan/TestCases/Linux/ptrace.cc
+++ b/test/asan/TestCases/Linux/ptrace.cpp
@@ -99,7 +99,7 @@ int main(void) {
#endif
res = ptrace((enum __ptrace_request)__PTRACE_REQUEST, pid, __PTRACE_ARGS);
// CHECK: AddressSanitizer: stack-buffer-overflow
- // CHECK: {{.*ptrace.cc:}}[[@LINE-2]]
+ // CHECK: {{.*ptrace.cpp:}}[[@LINE-2]]
assert(!res);
PRINT_REG_PC(regs);
diff --git a/test/asan/TestCases/Linux/quarantine_size_mb.cc b/test/asan/TestCases/Linux/quarantine_size_mb.cpp
index f7bccbfbe..f7bccbfbe 100644
--- a/test/asan/TestCases/Linux/quarantine_size_mb.cc
+++ b/test/asan/TestCases/Linux/quarantine_size_mb.cpp
diff --git a/test/asan/TestCases/Linux/recoverable-lsan.cc b/test/asan/TestCases/Linux/recoverable-lsan.cpp
index 935645327..935645327 100644
--- a/test/asan/TestCases/Linux/recoverable-lsan.cc
+++ b/test/asan/TestCases/Linux/recoverable-lsan.cpp
diff --git a/test/asan/TestCases/Linux/recvfrom.cc b/test/asan/TestCases/Linux/recvfrom.cpp
index 9c6eec35c..46aa202c2 100644
--- a/test/asan/TestCases/Linux/recvfrom.cc
+++ b/test/asan/TestCases/Linux/recvfrom.cpp
@@ -41,7 +41,7 @@ static void *client_thread_udp(void *data) {
succeeded = sendto(sockfd, buf, kBufSize, 0, (struct sockaddr *)&serveraddr,
sizeof(serveraddr));
// CHECK-SENDTO: {{READ of size 10 at 0x.* thread T1}}
- // CHECK-SENDTO: {{ #1 0x.* in client_thread_udp.*recvfrom.cc:}}[[@LINE-3]]
+ // CHECK-SENDTO: {{ #1 0x.* in client_thread_udp.*recvfrom.cpp:}}[[@LINE-3]]
CHECK_ERROR(succeeded < 0, "in sending message");
return NULL;
}
@@ -72,9 +72,9 @@ int main() {
recvfrom(sockfd, buf, kBufSize, 0, NULL, NULL); // BOOM
// CHECK-RECVFROM: {{WRITE of size 10 at 0x.* thread T0}}
- // CHECK-RECVFROM: {{ #1 0x.* in main.*recvfrom.cc:}}[[@LINE-2]]
+ // CHECK-RECVFROM: {{ #1 0x.* in main.*recvfrom.cpp:}}[[@LINE-2]]
// CHECK-RECVFROM: {{Address 0x.* is located in stack of thread T0 at offset}}
- // CHECK-RECVFROM-NEXT: in{{.*}}main{{.*}}recvfrom.cc
+ // CHECK-RECVFROM-NEXT: in{{.*}}main{{.*}}recvfrom.cpp
succeeded = pthread_join(client_thread, NULL);
CHECK_ERROR(succeeded, "joining thread");
return 0;
diff --git a/test/asan/TestCases/Linux/release_to_os_test.cc b/test/asan/TestCases/Linux/release_to_os_test.cpp
index 3e28ffde4..3e28ffde4 100644
--- a/test/asan/TestCases/Linux/release_to_os_test.cc
+++ b/test/asan/TestCases/Linux/release_to_os_test.cpp
diff --git a/test/asan/TestCases/Linux/rlimit_mmap_test.cc b/test/asan/TestCases/Linux/rlimit_mmap_test.cpp
index 7f37727b2..7f37727b2 100644
--- a/test/asan/TestCases/Linux/rlimit_mmap_test.cc
+++ b/test/asan/TestCases/Linux/rlimit_mmap_test.cpp
diff --git a/test/asan/TestCases/Linux/sanbox_read_proc_self_maps_test.cc b/test/asan/TestCases/Linux/sanbox_read_proc_self_maps_test.cpp
index d9099edff..d9099edff 100644
--- a/test/asan/TestCases/Linux/sanbox_read_proc_self_maps_test.cc
+++ b/test/asan/TestCases/Linux/sanbox_read_proc_self_maps_test.cpp
diff --git a/test/asan/TestCases/Linux/shmctl.cc b/test/asan/TestCases/Linux/shmctl.cpp
index e1752bc89..e1752bc89 100644
--- a/test/asan/TestCases/Linux/shmctl.cc
+++ b/test/asan/TestCases/Linux/shmctl.cpp
diff --git a/test/asan/TestCases/Linux/signal_during_stop_the_world.cc b/test/asan/TestCases/Linux/signal_during_stop_the_world.cpp
index b1a41fe20..b1a41fe20 100644
--- a/test/asan/TestCases/Linux/signal_during_stop_the_world.cc
+++ b/test/asan/TestCases/Linux/signal_during_stop_the_world.cpp
diff --git a/test/asan/TestCases/Linux/sized_delete_test.cc b/test/asan/TestCases/Linux/sized_delete_test.cpp
index 5d8c7010e..5d8c7010e 100644
--- a/test/asan/TestCases/Linux/sized_delete_test.cc
+++ b/test/asan/TestCases/Linux/sized_delete_test.cpp
diff --git a/test/asan/TestCases/Linux/stack-overflow-recovery-mode.cc b/test/asan/TestCases/Linux/stack-overflow-recovery-mode.cpp
index e99665953..e99665953 100644
--- a/test/asan/TestCases/Linux/stack-overflow-recovery-mode.cc
+++ b/test/asan/TestCases/Linux/stack-overflow-recovery-mode.cpp
diff --git a/test/asan/TestCases/Linux/stack-overflow-sigbus.cc b/test/asan/TestCases/Linux/stack-overflow-sigbus.cpp
index 8c9599c9f..8c9599c9f 100644
--- a/test/asan/TestCases/Linux/stack-overflow-sigbus.cc
+++ b/test/asan/TestCases/Linux/stack-overflow-sigbus.cpp
diff --git a/test/asan/TestCases/Linux/stack-trace-dlclose.cc b/test/asan/TestCases/Linux/stack-trace-dlclose.cpp
index 899e0dfc6..899e0dfc6 100644
--- a/test/asan/TestCases/Linux/stack-trace-dlclose.cc
+++ b/test/asan/TestCases/Linux/stack-trace-dlclose.cpp
diff --git a/test/asan/TestCases/Linux/static_tls.cc b/test/asan/TestCases/Linux/static_tls.cpp
index 5e569ddab..5e569ddab 100644
--- a/test/asan/TestCases/Linux/static_tls.cc
+++ b/test/asan/TestCases/Linux/static_tls.cpp
diff --git a/test/asan/TestCases/Linux/swapcontext_annotation.cc b/test/asan/TestCases/Linux/swapcontext_annotation.cpp
index 5eae27a32..5eae27a32 100644
--- a/test/asan/TestCases/Linux/swapcontext_annotation.cc
+++ b/test/asan/TestCases/Linux/swapcontext_annotation.cpp
diff --git a/test/asan/TestCases/Linux/swapcontext_test.cc b/test/asan/TestCases/Linux/swapcontext_test.cpp
index 2660ffe3b..2660ffe3b 100644
--- a/test/asan/TestCases/Linux/swapcontext_test.cc
+++ b/test/asan/TestCases/Linux/swapcontext_test.cpp
diff --git a/test/asan/TestCases/Linux/syscalls.cc b/test/asan/TestCases/Linux/syscalls.cpp
index ec14bca76..ec14bca76 100644
--- a/test/asan/TestCases/Linux/syscalls.cc
+++ b/test/asan/TestCases/Linux/syscalls.cpp
diff --git a/test/asan/TestCases/Linux/thread_local_quarantine_pthread_join.cc b/test/asan/TestCases/Linux/thread_local_quarantine_pthread_join.cpp
index 8a5bb25ee..8a5bb25ee 100644
--- a/test/asan/TestCases/Linux/thread_local_quarantine_pthread_join.cc
+++ b/test/asan/TestCases/Linux/thread_local_quarantine_pthread_join.cpp
diff --git a/test/asan/TestCases/Linux/thread_local_quarantine_size_kb.cc b/test/asan/TestCases/Linux/thread_local_quarantine_size_kb.cpp
index 46af1a0e0..46af1a0e0 100644
--- a/test/asan/TestCases/Linux/thread_local_quarantine_size_kb.cc
+++ b/test/asan/TestCases/Linux/thread_local_quarantine_size_kb.cpp
diff --git a/test/asan/TestCases/Linux/uar_signals.cc b/test/asan/TestCases/Linux/uar_signals.cpp
index f96a2fecb..f96a2fecb 100644
--- a/test/asan/TestCases/Linux/uar_signals.cc
+++ b/test/asan/TestCases/Linux/uar_signals.cpp
diff --git a/test/asan/TestCases/Linux/unpoison_tls.cc b/test/asan/TestCases/Linux/unpoison_tls.cpp
index e22345342..e22345342 100644
--- a/test/asan/TestCases/Linux/unpoison_tls.cc
+++ b/test/asan/TestCases/Linux/unpoison_tls.cpp
diff --git a/test/asan/TestCases/Linux/vfork.cc b/test/asan/TestCases/Linux/vfork.cpp
index 31a32dc56..31a32dc56 100644
--- a/test/asan/TestCases/Linux/vfork.cc
+++ b/test/asan/TestCases/Linux/vfork.cpp
diff --git a/test/asan/TestCases/Posix/asan-symbolize-bad-path.cc b/test/asan/TestCases/Posix/asan-symbolize-bad-path.cpp
index 3f93122e9..3f93122e9 100644
--- a/test/asan/TestCases/Posix/asan-symbolize-bad-path.cc
+++ b/test/asan/TestCases/Posix/asan-symbolize-bad-path.cpp
diff --git a/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cc b/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cpp
index 11d5928a8..6e24a08ad 100644
--- a/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cc
+++ b/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cpp
@@ -38,11 +38,11 @@ int main(int argc, char *argv[]) {
inc2(array, -1); // BOOM
// CHECK: ERROR: AddressSanitizer: heap-buffer-overflow
// CHECK: READ of size 4 at 0x{{.*}}
- // CHECK: #0 {{.*}} in inc2 {{.*}}asan-symbolize-sanity-test.cc:[[@LINE+21]]
- // CHECK: #1 {{.*}} in main {{.*}}asan-symbolize-sanity-test.cc:[[@LINE-4]]
+ // CHECK: #0 {{.*}} in inc2 {{.*}}asan-symbolize-sanity-test.cpp:[[@LINE+21]]
+ // CHECK: #1 {{.*}} in main {{.*}}asan-symbolize-sanity-test.cpp:[[@LINE-4]]
// CHECK: allocated by thread T{{.*}} here:
// CHECK: #{{.*}} in {{(wrap_|__interceptor_)?}}malloc
- // CHECK: #{{.*}} in main {{.*}}asan-symbolize-sanity-test.cc:[[@LINE-9]]
+ // CHECK: #{{.*}} in main {{.*}}asan-symbolize-sanity-test.cpp:[[@LINE-9]]
return 0;
}
#else // SHARED_LIBS
diff --git a/test/asan/TestCases/Posix/asan_symbolize_script/logging_options_in_help.cc b/test/asan/TestCases/Posix/asan_symbolize_script/logging_options_in_help.cpp
index b3df1cb35..b3df1cb35 100644
--- a/test/asan/TestCases/Posix/asan_symbolize_script/logging_options_in_help.cc
+++ b/test/asan/TestCases/Posix/asan_symbolize_script/logging_options_in_help.cpp
diff --git a/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_help_output.cc b/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_help_output.cpp
index 71f32e0d6..71f32e0d6 100644
--- a/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_help_output.cc
+++ b/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_help_output.cpp
diff --git a/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_symbolicate.cc b/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_symbolicate.cpp
index 3f3ad9bfd..3f3ad9bfd 100644
--- a/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_symbolicate.cc
+++ b/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_symbolicate.cpp
diff --git a/test/asan/TestCases/Posix/asan_symbolize_script/set_log_dest.cc b/test/asan/TestCases/Posix/asan_symbolize_script/set_log_dest.cpp
index f2c309808..f2c309808 100644
--- a/test/asan/TestCases/Posix/asan_symbolize_script/set_log_dest.cc
+++ b/test/asan/TestCases/Posix/asan_symbolize_script/set_log_dest.cpp
diff --git a/test/asan/TestCases/Posix/asan_symbolize_script/set_log_level.cc b/test/asan/TestCases/Posix/asan_symbolize_script/set_log_level.cpp
index b30fd6ec3..b30fd6ec3 100644
--- a/test/asan/TestCases/Posix/asan_symbolize_script/set_log_level.cc
+++ b/test/asan/TestCases/Posix/asan_symbolize_script/set_log_level.cpp
diff --git a/test/asan/TestCases/Posix/asprintf.cc b/test/asan/TestCases/Posix/asprintf.cpp
index 6946e5013..6946e5013 100644
--- a/test/asan/TestCases/Posix/asprintf.cc
+++ b/test/asan/TestCases/Posix/asprintf.cpp
diff --git a/test/asan/TestCases/Posix/assign_large_valloc_to_global.cc b/test/asan/TestCases/Posix/assign_large_valloc_to_global.cpp
index 8031d04aa..8031d04aa 100644
--- a/test/asan/TestCases/Posix/assign_large_valloc_to_global.cc
+++ b/test/asan/TestCases/Posix/assign_large_valloc_to_global.cpp
diff --git a/test/asan/TestCases/Posix/bcmp_test.cc b/test/asan/TestCases/Posix/bcmp_test.cpp
index 44aa9cd24..44aa9cd24 100644
--- a/test/asan/TestCases/Posix/bcmp_test.cc
+++ b/test/asan/TestCases/Posix/bcmp_test.cpp
diff --git a/test/asan/TestCases/Posix/closed-fds.cc b/test/asan/TestCases/Posix/closed-fds.cpp
index b2604bba5..c18653bc2 100644
--- a/test/asan/TestCases/Posix/closed-fds.cc
+++ b/test/asan/TestCases/Posix/closed-fds.cpp
@@ -30,6 +30,6 @@ int main(int argc, char **argv) {
// CHECK-FILE: {{.*ERROR: AddressSanitizer: heap-use-after-free on address}}
// CHECK-FILE: {{0x.* at pc 0x.* bp 0x.* sp 0x.*}}
// CHECK-FILE: {{WRITE of size 1 at 0x.* thread T0}}
- // CHECK-FILE: {{ #0 0x.* in main .*closed-fds.cc:}}[[@LINE-4]]
+ // CHECK-FILE: {{ #0 0x.* in main .*closed-fds.cpp:}}[[@LINE-4]]
return 0;
}
diff --git a/test/asan/TestCases/Posix/concurrent_overflow.cc b/test/asan/TestCases/Posix/concurrent_overflow.cpp
index 345b54685..345b54685 100644
--- a/test/asan/TestCases/Posix/concurrent_overflow.cc
+++ b/test/asan/TestCases/Posix/concurrent_overflow.cpp
diff --git a/test/asan/TestCases/Posix/coverage-fork.cc b/test/asan/TestCases/Posix/coverage-fork.cpp
index 22d2e3584..22d2e3584 100644
--- a/test/asan/TestCases/Posix/coverage-fork.cc
+++ b/test/asan/TestCases/Posix/coverage-fork.cpp
diff --git a/test/asan/TestCases/Posix/coverage-module-unloaded.cc b/test/asan/TestCases/Posix/coverage-module-unloaded.cpp
index 322a1bad1..322a1bad1 100644
--- a/test/asan/TestCases/Posix/coverage-module-unloaded.cc
+++ b/test/asan/TestCases/Posix/coverage-module-unloaded.cpp
diff --git a/test/asan/TestCases/Posix/coverage-reset.cc b/test/asan/TestCases/Posix/coverage-reset.cpp
index 152be2ab3..b3b7a575a 100644
--- a/test/asan/TestCases/Posix/coverage-reset.cc
+++ b/test/asan/TestCases/Posix/coverage-reset.cpp
@@ -29,8 +29,8 @@ int main(int argc, char **argv) {
bar2();
__sanitizer_cov_dump();
// CHECK: RESET
-// CHECK-DAG: SanitizerCoverage: ./coverage-reset.cc{{.*}}.sancov: 2 PCs written
-// CHECK-DAG: SanitizerCoverage: ./libcoverage-reset.cc{{.*}}.sancov: 2 PCs written
+// CHECK-DAG: SanitizerCoverage: ./coverage-reset.cpp{{.*}}.sancov: 2 PCs written
+// CHECK-DAG: SanitizerCoverage: ./libcoverage-reset.cpp{{.*}}.sancov: 2 PCs written
fprintf(stderr, "RESET\n");
__sanitizer_cov_reset();
@@ -38,8 +38,8 @@ int main(int argc, char **argv) {
bar1();
__sanitizer_cov_dump();
// CHECK: RESET
-// CHECK-DAG: SanitizerCoverage: ./coverage-reset.cc{{.*}}.sancov: 1 PCs written
-// CHECK-DAG: SanitizerCoverage: ./libcoverage-reset.cc{{.*}}.sancov: 1 PCs written
+// CHECK-DAG: SanitizerCoverage: ./coverage-reset.cpp{{.*}}.sancov: 1 PCs written
+// CHECK-DAG: SanitizerCoverage: ./libcoverage-reset.cpp{{.*}}.sancov: 1 PCs written
fprintf(stderr, "RESET\n");
__sanitizer_cov_reset();
@@ -47,7 +47,7 @@ int main(int argc, char **argv) {
foo2();
__sanitizer_cov_dump();
// CHECK: RESET
-// CHECK: SanitizerCoverage: ./coverage-reset.cc{{.*}}.sancov: 2 PCs written
+// CHECK: SanitizerCoverage: ./coverage-reset.cpp{{.*}}.sancov: 2 PCs written
fprintf(stderr, "RESET\n");
__sanitizer_cov_reset();
@@ -55,13 +55,13 @@ int main(int argc, char **argv) {
bar2();
__sanitizer_cov_dump();
// CHECK: RESET
-// CHECK: SanitizerCoverage: ./libcoverage-reset.cc{{.*}}.sancov: 2 PCs written
+// CHECK: SanitizerCoverage: ./libcoverage-reset.cpp{{.*}}.sancov: 2 PCs written
fprintf(stderr, "RESET\n");
__sanitizer_cov_reset();
// CHECK: RESET
bar2();
-// CHECK: SanitizerCoverage: ./libcoverage-reset.cc{{.*}}.sancov: 1 PCs written
+// CHECK: SanitizerCoverage: ./libcoverage-reset.cpp{{.*}}.sancov: 1 PCs written
}
#endif
diff --git a/test/asan/TestCases/Posix/coverage.cc b/test/asan/TestCases/Posix/coverage.cpp
index 9dbd72eab..9dbd72eab 100644
--- a/test/asan/TestCases/Posix/coverage.cc
+++ b/test/asan/TestCases/Posix/coverage.cpp
diff --git a/test/asan/TestCases/Posix/current_allocated_bytes.cc b/test/asan/TestCases/Posix/current_allocated_bytes.cpp
index c49e433b1..c49e433b1 100644
--- a/test/asan/TestCases/Posix/current_allocated_bytes.cc
+++ b/test/asan/TestCases/Posix/current_allocated_bytes.cpp
diff --git a/test/asan/TestCases/Posix/deep_call_stack.cc b/test/asan/TestCases/Posix/deep_call_stack.cpp
index e6e82a475..e6e82a475 100644
--- a/test/asan/TestCases/Posix/deep_call_stack.cc
+++ b/test/asan/TestCases/Posix/deep_call_stack.cpp
diff --git a/test/asan/TestCases/Posix/deep_thread_stack.cc b/test/asan/TestCases/Posix/deep_thread_stack.cpp
index 535da79ff..535da79ff 100644
--- a/test/asan/TestCases/Posix/deep_thread_stack.cc
+++ b/test/asan/TestCases/Posix/deep_thread_stack.cpp
diff --git a/test/asan/TestCases/Posix/dlclose-test.cc b/test/asan/TestCases/Posix/dlclose-test.cpp
index 160c1c940..160c1c940 100644
--- a/test/asan/TestCases/Posix/dlclose-test.cc
+++ b/test/asan/TestCases/Posix/dlclose-test.cpp
diff --git a/test/asan/TestCases/Posix/fgets_fputs.cc b/test/asan/TestCases/Posix/fgets_fputs.cpp
index 34c952f2e..34c952f2e 100644
--- a/test/asan/TestCases/Posix/fgets_fputs.cc
+++ b/test/asan/TestCases/Posix/fgets_fputs.cpp
diff --git a/test/asan/TestCases/Posix/fread_fwrite.cc b/test/asan/TestCases/Posix/fread_fwrite.cpp
index c06292604..c06292604 100644
--- a/test/asan/TestCases/Posix/fread_fwrite.cc
+++ b/test/asan/TestCases/Posix/fread_fwrite.cpp
diff --git a/test/asan/TestCases/Posix/free_hook_realloc.cc b/test/asan/TestCases/Posix/free_hook_realloc.cpp
index cbc5d6fed..cbc5d6fed 100644
--- a/test/asan/TestCases/Posix/free_hook_realloc.cc
+++ b/test/asan/TestCases/Posix/free_hook_realloc.cpp
diff --git a/test/asan/TestCases/Posix/freopen.cc b/test/asan/TestCases/Posix/freopen.cpp
index c137abb8f..c137abb8f 100644
--- a/test/asan/TestCases/Posix/freopen.cc
+++ b/test/asan/TestCases/Posix/freopen.cpp
diff --git a/test/asan/TestCases/Posix/gc-test.cc b/test/asan/TestCases/Posix/gc-test.cpp
index 56d8c398f..56d8c398f 100644
--- a/test/asan/TestCases/Posix/gc-test.cc
+++ b/test/asan/TestCases/Posix/gc-test.cpp
diff --git a/test/asan/TestCases/Posix/glob.cc b/test/asan/TestCases/Posix/glob.cpp
index 16b4ace8e..16b4ace8e 100644
--- a/test/asan/TestCases/Posix/glob.cc
+++ b/test/asan/TestCases/Posix/glob.cpp
diff --git a/test/asan/TestCases/Posix/halt_on_error-torture.cc b/test/asan/TestCases/Posix/halt_on_error-torture.cpp
index 559f9434e..559f9434e 100644
--- a/test/asan/TestCases/Posix/halt_on_error-torture.cc
+++ b/test/asan/TestCases/Posix/halt_on_error-torture.cpp
diff --git a/test/asan/TestCases/Posix/halt_on_error_suppress_equal_pcs.cc b/test/asan/TestCases/Posix/halt_on_error_suppress_equal_pcs.cpp
index 6b926180c..6b926180c 100644
--- a/test/asan/TestCases/Posix/halt_on_error_suppress_equal_pcs.cc
+++ b/test/asan/TestCases/Posix/halt_on_error_suppress_equal_pcs.cpp
diff --git a/test/asan/TestCases/Posix/handle_abort_on_error.cc b/test/asan/TestCases/Posix/handle_abort_on_error.cpp
index 1be060e06..1be060e06 100644
--- a/test/asan/TestCases/Posix/handle_abort_on_error.cc
+++ b/test/asan/TestCases/Posix/handle_abort_on_error.cpp
diff --git a/test/asan/TestCases/Posix/init-order-pthread-create.cc b/test/asan/TestCases/Posix/init-order-pthread-create.cpp
index 19c000fec..19c000fec 100644
--- a/test/asan/TestCases/Posix/init-order-pthread-create.cc
+++ b/test/asan/TestCases/Posix/init-order-pthread-create.cpp
diff --git a/test/asan/TestCases/Posix/interception-in-shared-lib-test.cc b/test/asan/TestCases/Posix/interception-in-shared-lib-test.cpp
index b31b035f9..455390a8d 100644
--- a/test/asan/TestCases/Posix/interception-in-shared-lib-test.cc
+++ b/test/asan/TestCases/Posix/interception-in-shared-lib-test.cpp
@@ -23,7 +23,7 @@ int main(int argc, char *argv[]) {
my_memset(buf, 11);
// CHECK: {{.*ERROR: AddressSanitizer: stack-buffer-overflow}}
// CHECK: {{WRITE of size 11 at 0x.* thread T0}}
- // CHECK: {{0x.* in my_memset .*interception-in-shared-lib-test.cc:}}[[@LINE-10]]
+ // CHECK: {{0x.* in my_memset .*interception-in-shared-lib-test.cpp:}}[[@LINE-10]]
return 0;
}
#endif
diff --git a/test/asan/TestCases/Posix/invalid-pointer-pairs-threads.cc b/test/asan/TestCases/Posix/invalid-pointer-pairs-threads.cpp
index ee8a1c70c..d32dae9c0 100644
--- a/test/asan/TestCases/Posix/invalid-pointer-pairs-threads.cc
+++ b/test/asan/TestCases/Posix/invalid-pointer-pairs-threads.cpp
@@ -44,7 +44,7 @@ int main(int argc, char **argv) {
char *parent_pointer = &local;
// B: ERROR: AddressSanitizer: invalid-pointer-pair
- // B: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-threads.cc:[[@LINE+1]]
+ // B: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-threads.cpp:[[@LINE+1]]
unsigned r = parent_pointer - pointers[0];
}
diff --git a/test/asan/TestCases/Posix/ioctl.cc b/test/asan/TestCases/Posix/ioctl.cpp
index 7269dfddb..c871f94e1 100644
--- a/test/asan/TestCases/Posix/ioctl.cc
+++ b/test/asan/TestCases/Posix/ioctl.cpp
@@ -21,7 +21,7 @@ int main(int argc, char **argv) {
int res = ioctl(fd, FIONBIO, &nonblock + 1);
// CHECK: AddressSanitizer: stack-buffer-overflow
// CHECK: READ of size 4 at
- // CHECK: {{#.* in main .*ioctl.cc:}}[[@LINE-3]]
+ // CHECK: {{#.* in main .*ioctl.cpp:}}[[@LINE-3]]
assert(res == 0);
close(fd);
return 0;
diff --git a/test/asan/TestCases/Posix/large_allocator_unpoisons_on_free.cc b/test/asan/TestCases/Posix/large_allocator_unpoisons_on_free.cpp
index b39fa74a3..b39fa74a3 100644
--- a/test/asan/TestCases/Posix/large_allocator_unpoisons_on_free.cc
+++ b/test/asan/TestCases/Posix/large_allocator_unpoisons_on_free.cpp
diff --git a/test/asan/TestCases/Posix/lto-constmerge-odr.cc b/test/asan/TestCases/Posix/lto-constmerge-odr.cpp
index 9dc1397f6..9dc1397f6 100644
--- a/test/asan/TestCases/Posix/lto-constmerge-odr.cc
+++ b/test/asan/TestCases/Posix/lto-constmerge-odr.cpp
diff --git a/test/asan/TestCases/Posix/mmap_limit_mb.cc b/test/asan/TestCases/Posix/mmap_limit_mb.cpp
index cb613f535..cb613f535 100644
--- a/test/asan/TestCases/Posix/mmap_limit_mb.cc
+++ b/test/asan/TestCases/Posix/mmap_limit_mb.cpp
diff --git a/test/asan/TestCases/Posix/new_array_cookie_test.cc b/test/asan/TestCases/Posix/new_array_cookie_test.cpp
index 40a9b7874..edbdb4016 100644
--- a/test/asan/TestCases/Posix/new_array_cookie_test.cc
+++ b/test/asan/TestCases/Posix/new_array_cookie_test.cpp
@@ -20,7 +20,7 @@ int main(int argc, char **argv) {
C *buffer = new C[argc];
buffer[-2].x = 10;
// CHECK: AddressSanitizer: heap-buffer-overflow
-// CHECK: in main {{.*}}new_array_cookie_test.cc:[[@LINE-2]]
+// CHECK: in main {{.*}}new_array_cookie_test.cpp:[[@LINE-2]]
// CHECK: is located 0 bytes inside of 12-byte region
// NO_COOKIE: ZZZZZZZZ
delete [] buffer;
diff --git a/test/asan/TestCases/Posix/new_array_cookie_uaf_test.cc b/test/asan/TestCases/Posix/new_array_cookie_uaf_test.cpp
index 335a56757..335a56757 100644
--- a/test/asan/TestCases/Posix/new_array_cookie_uaf_test.cc
+++ b/test/asan/TestCases/Posix/new_array_cookie_uaf_test.cpp
diff --git a/test/asan/TestCases/Posix/new_array_cookie_with_new_from_class.cc b/test/asan/TestCases/Posix/new_array_cookie_with_new_from_class.cpp
index e7f774674..e7f774674 100644
--- a/test/asan/TestCases/Posix/new_array_cookie_with_new_from_class.cc
+++ b/test/asan/TestCases/Posix/new_array_cookie_with_new_from_class.cpp
diff --git a/test/asan/TestCases/Posix/no-fd.cc b/test/asan/TestCases/Posix/no-fd.cpp
index 086b01412..086b01412 100644
--- a/test/asan/TestCases/Posix/no-fd.cc
+++ b/test/asan/TestCases/Posix/no-fd.cpp
diff --git a/test/asan/TestCases/Posix/print_cmdline.cc b/test/asan/TestCases/Posix/print_cmdline.cpp
index 8c83bd97e..8c83bd97e 100644
--- a/test/asan/TestCases/Posix/print_cmdline.cc
+++ b/test/asan/TestCases/Posix/print_cmdline.cpp
diff --git a/test/asan/TestCases/Posix/readv.cc b/test/asan/TestCases/Posix/readv.cpp
index 27436a1ad..27436a1ad 100644
--- a/test/asan/TestCases/Posix/readv.cc
+++ b/test/asan/TestCases/Posix/readv.cpp
diff --git a/test/asan/TestCases/Posix/shared-lib-test.cc b/test/asan/TestCases/Posix/shared-lib-test.cpp
index 6de6d9fdf..6f0a9f74a 100644
--- a/test/asan/TestCases/Posix/shared-lib-test.cc
+++ b/test/asan/TestCases/Posix/shared-lib-test.cpp
@@ -34,7 +34,7 @@ int main(int argc, char *argv[]) {
// CHECK: {{.*ERROR: AddressSanitizer: global-buffer-overflow}}
// CHECK: {{READ of size 4 at 0x.* thread T0}}
// CHECK: {{ #0 0x.*}}
- // CHECK: {{ #1 0x.* in main .*shared-lib-test.cc:}}[[@LINE-4]]
+ // CHECK: {{ #1 0x.* in main .*shared-lib-test.cpp:}}[[@LINE-4]]
return 0;
}
#else // SHARED_LIB
diff --git a/test/asan/TestCases/Posix/stack-overflow.cc b/test/asan/TestCases/Posix/stack-overflow.cpp
index d6b062ed3..d6b062ed3 100644
--- a/test/asan/TestCases/Posix/stack-overflow.cc
+++ b/test/asan/TestCases/Posix/stack-overflow.cpp
diff --git a/test/asan/TestCases/Posix/stack-use-after-return.cc b/test/asan/TestCases/Posix/stack-use-after-return.cpp
index 02588d708..bb7f84309 100644
--- a/test/asan/TestCases/Posix/stack-use-after-return.cc
+++ b/test/asan/TestCases/Posix/stack-use-after-return.cpp
@@ -56,11 +56,11 @@ void Func2(char *x) {
fprintf(stderr, "2: %p\n", x);
*x = 1;
// CHECK: WRITE of size 1 {{.*}} thread T0
- // CHECK: #0{{.*}}Func2{{.*}}stack-use-after-return.cc:[[@LINE-2]]
+ // CHECK: #0{{.*}}Func2{{.*}}stack-use-after-return.cpp:[[@LINE-2]]
// CHECK: is located in stack of thread T0 at offset
// CHECK: 'local'{{.*}} <== Memory access at offset {{16|32}} is inside this variable
// THREAD: WRITE of size 1 {{.*}} thread T{{[1-9]}}
- // THREAD: #0{{.*}}Func2{{.*}}stack-use-after-return.cc:[[@LINE-6]]
+ // THREAD: #0{{.*}}Func2{{.*}}stack-use-after-return.cpp:[[@LINE-6]]
// THREAD: is located in stack of thread T{{[1-9]}} at offset
// THREAD: 'local'{{.*}} <== Memory access at offset {{16|32}} is inside this variable
// CHECK-20: T0: FakeStack created:{{.*}} stack_size_log: 20
diff --git a/test/asan/TestCases/Posix/start-deactivated.cc b/test/asan/TestCases/Posix/start-deactivated.cpp
index 9c674ac57..9c674ac57 100644
--- a/test/asan/TestCases/Posix/start-deactivated.cc
+++ b/test/asan/TestCases/Posix/start-deactivated.cpp
diff --git a/test/asan/TestCases/Posix/strerror_r_test.cc b/test/asan/TestCases/Posix/strerror_r_test.cpp
index e6df44177..e6df44177 100644
--- a/test/asan/TestCases/Posix/strerror_r_test.cc
+++ b/test/asan/TestCases/Posix/strerror_r_test.cpp
diff --git a/test/asan/TestCases/Posix/strndup_oob_test.cc b/test/asan/TestCases/Posix/strndup_oob_test.cpp
index 22bbf7c7e..46c9dceec 100644
--- a/test/asan/TestCases/Posix/strndup_oob_test.cc
+++ b/test/asan/TestCases/Posix/strndup_oob_test.cpp
@@ -17,11 +17,11 @@ int main(int argc, char **argv) {
char *copy = strndup(kString, 2);
int x = copy[2 + argc]; // BOOM
// CHECK: AddressSanitizer: heap-buffer-overflow
- // CHECK: #0 {{.*}}main {{.*}}strndup_oob_test.cc:[[@LINE-2]]
+ // CHECK: #0 {{.*}}main {{.*}}strndup_oob_test.cpp:[[@LINE-2]]
// CHECK-LABEL: allocated by thread T{{.*}} here:
// CHECK: #{{[01]}} {{.*}}strndup
- // CHECK: #{{.*}}main {{.*}}strndup_oob_test.cc:[[@LINE-6]]
+ // CHECK: #{{.*}}main {{.*}}strndup_oob_test.cpp:[[@LINE-6]]
// CHECK-LABEL: SUMMARY
- // CHECK: strndup_oob_test.cc:[[@LINE-7]]
+ // CHECK: strndup_oob_test.cpp:[[@LINE-7]]
return x;
}
diff --git a/test/asan/TestCases/Posix/strndup_oob_test2.cc b/test/asan/TestCases/Posix/strndup_oob_test2.cpp
index 8cc822d7c..774e70720 100644
--- a/test/asan/TestCases/Posix/strndup_oob_test2.cc
+++ b/test/asan/TestCases/Posix/strndup_oob_test2.cpp
@@ -17,6 +17,6 @@ int main(int argc, char **argv) {
char *copy = strndup(kChars, 3);
copy = strndup(kChars, 10);
// CHECK: AddressSanitizer: global-buffer-overflow
- // CHECK: {{.*}}main {{.*}}.cc:[[@LINE-2]]
+ // CHECK: {{.*}}main {{.*}}.cpp:[[@LINE-2]]
return *copy;
}
diff --git a/test/asan/TestCases/Posix/tsd_dtor_leak.cc b/test/asan/TestCases/Posix/tsd_dtor_leak.cpp
index 860f3459e..860f3459e 100644
--- a/test/asan/TestCases/Posix/tsd_dtor_leak.cc
+++ b/test/asan/TestCases/Posix/tsd_dtor_leak.cpp
diff --git a/test/asan/TestCases/Posix/wait.cc b/test/asan/TestCases/Posix/wait.cpp
index 85e819369..7ca1c57a2 100644
--- a/test/asan/TestCases/Posix/wait.cc
+++ b/test/asan/TestCases/Posix/wait.cpp
@@ -24,7 +24,7 @@ int main(int argc, char **argv) {
// CHECK: stack-buffer-overflow
// CHECK: {{WRITE of size .* at 0x.* thread T0}}
// CHECK: {{in .*wait}}
- // CHECK: {{in main .*wait.cc:}}
+ // CHECK: {{in main .*wait.cpp:}}
// CHECK: is located in stack of thread T0 at offset
// CHECK: {{in main}}
return res == -1 ? 1 : 0;
diff --git a/test/asan/TestCases/Posix/wait3.cc b/test/asan/TestCases/Posix/wait3.cpp
index 081a73e16..7fb4d6512 100644
--- a/test/asan/TestCases/Posix/wait3.cc
+++ b/test/asan/TestCases/Posix/wait3.cpp
@@ -26,7 +26,7 @@ int main(int argc, char **argv) {
// CHECK: stack-buffer-overflow
// CHECK: {{WRITE of size .* at 0x.* thread T0}}
// CHECK: {{in .*wait}}
- // CHECK: {{in main .*wait3.cc:}}
+ // CHECK: {{in main .*wait3.cpp:}}
// CHECK: is located in stack of thread T0 at offset
// CHECK: {{in main}}
return res == -1 ? 1 : 0;
diff --git a/test/asan/TestCases/Posix/wait4.cc b/test/asan/TestCases/Posix/wait4.cpp
index aee5570b8..1e574d99f 100644
--- a/test/asan/TestCases/Posix/wait4.cc
+++ b/test/asan/TestCases/Posix/wait4.cpp
@@ -34,7 +34,7 @@ int main(int argc, char **argv) {
// CHECK: stack-buffer-overflow
// CHECK: {{WRITE of size .* at 0x.* thread T0}}
// CHECK: {{in .*wait}}
- // CHECK: {{in main .*wait4.cc:}}
+ // CHECK: {{in main .*wait4.cpp:}}
// CHECK: is located in stack of thread T0 at offset
// CHECK: {{in main}}
return res == -1 ? 1 : 0;
diff --git a/test/asan/TestCases/Posix/waitid.cc b/test/asan/TestCases/Posix/waitid.cpp
index 20fb0c694..5e635c777 100644
--- a/test/asan/TestCases/Posix/waitid.cc
+++ b/test/asan/TestCases/Posix/waitid.cpp
@@ -20,7 +20,7 @@ int main(int argc, char **argv) {
// CHECK: stack-buffer-overflow
// CHECK: {{WRITE of size .* at 0x.* thread T0}}
// CHECK: {{in .*waitid}}
- // CHECK: {{in main .*waitid.cc:}}
+ // CHECK: {{in main .*waitid.cpp:}}
// CHECK: is located in stack of thread T0 at offset
// CHECK: {{in main}}
return res != -1;
diff --git a/test/asan/TestCases/Windows/aligned_mallocs.cc b/test/asan/TestCases/Windows/aligned_mallocs.cpp
index 48bb22101..48bb22101 100644
--- a/test/asan/TestCases/Windows/aligned_mallocs.cc
+++ b/test/asan/TestCases/Windows/aligned_mallocs.cpp
diff --git a/test/asan/TestCases/Windows/allocators_sanity.cc b/test/asan/TestCases/Windows/allocators_sanity.cpp
index 2738b4e7b..2738b4e7b 100644
--- a/test/asan/TestCases/Windows/allocators_sanity.cc
+++ b/test/asan/TestCases/Windows/allocators_sanity.cpp
diff --git a/test/asan/TestCases/Windows/beginthreadex.cc b/test/asan/TestCases/Windows/beginthreadex.cpp
index 05d72a539..05d72a539 100644
--- a/test/asan/TestCases/Windows/beginthreadex.cc
+++ b/test/asan/TestCases/Windows/beginthreadex.cpp
diff --git a/test/asan/TestCases/Windows/bind_io_completion_callback.cc b/test/asan/TestCases/Windows/bind_io_completion_callback.cpp
index ef7e45867..ef7e45867 100644
--- a/test/asan/TestCases/Windows/bind_io_completion_callback.cc
+++ b/test/asan/TestCases/Windows/bind_io_completion_callback.cpp
diff --git a/test/asan/TestCases/Windows/bitfield.cc b/test/asan/TestCases/Windows/bitfield.cpp
index 174c92dbe..174c92dbe 100644
--- a/test/asan/TestCases/Windows/bitfield.cc
+++ b/test/asan/TestCases/Windows/bitfield.cpp
diff --git a/test/asan/TestCases/Windows/bitfield_uaf.cc b/test/asan/TestCases/Windows/bitfield_uaf.cpp
index 6462d31bf..9095b805e 100644
--- a/test/asan/TestCases/Windows/bitfield_uaf.cc
+++ b/test/asan/TestCases/Windows/bitfield_uaf.cpp
@@ -14,7 +14,7 @@ void make_access(S *s) {
s->bf2 = 2;
// CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]]
// CHECK: READ of size {{[124]}} at [[ADDR]]
-// CHECK: {{#0 .* make_access.*bitfield_uaf.cc}}:[[@LINE-3]]
+// CHECK: {{#0 .* make_access.*bitfield_uaf.cpp}}:[[@LINE-3]]
// CHECK: {{#1 .* main}}
}
@@ -24,10 +24,10 @@ int main(void) {
// CHECK: [[ADDR]] is located 0 bytes inside of 4-byte region
// CHECK-LABEL: freed by thread T0 here:
// CHECK: {{#0 .* free }}
-// CHECK: {{#1 .* main .*bitfield_uaf.cc}}:[[@LINE-4]]
+// CHECK: {{#1 .* main .*bitfield_uaf.cpp}}:[[@LINE-4]]
// CHECK-LABEL: previously allocated by thread T0 here:
// CHECK: {{#0 .* malloc }}
-// CHECK: {{#1 .* main .*bitfield_uaf.cc}}:[[@LINE-8]]
+// CHECK: {{#1 .* main .*bitfield_uaf.cpp}}:[[@LINE-8]]
make_access(s);
return 0;
}
diff --git a/test/asan/TestCases/Windows/calloc_left_oob.cc b/test/asan/TestCases/Windows/calloc_left_oob.cpp
index d48d59f3a..309f4d36f 100644
--- a/test/asan/TestCases/Windows/calloc_left_oob.cc
+++ b/test/asan/TestCases/Windows/calloc_left_oob.cpp
@@ -8,10 +8,10 @@ int main() {
buffer[-1] = 42;
// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 4 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*calloc_left_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*calloc_left_oob.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located 4 bytes to the left of 168-byte region
// CHECK: allocated by thread T0 here:
// CHECK-NEXT: {{#0 .* calloc }}
-// CHECK-NEXT: {{#1 .* main .*calloc_left_oob.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*calloc_left_oob.cpp}}:[[@LINE-8]]
free(buffer);
}
diff --git a/test/asan/TestCases/Windows/calloc_right_oob.cc b/test/asan/TestCases/Windows/calloc_right_oob.cpp
index 4d114fd83..723da5535 100644
--- a/test/asan/TestCases/Windows/calloc_right_oob.cc
+++ b/test/asan/TestCases/Windows/calloc_right_oob.cpp
@@ -8,10 +8,10 @@ int main() {
buffer[42] = 42;
// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 4 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*calloc_right_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*calloc_right_oob.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located 0 bytes to the right of 168-byte region
// CHECK: allocated by thread T0 here:
// CHECK-NEXT: {{#0 .* calloc }}
-// CHECK-NEXT: {{#1 .* main .*calloc_right_oob.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*calloc_right_oob.cpp}}:[[@LINE-8]]
free(buffer);
}
diff --git a/test/asan/TestCases/Windows/calloc_uaf.cc b/test/asan/TestCases/Windows/calloc_uaf.cpp
index bd14bb079..54577f014 100644
--- a/test/asan/TestCases/Windows/calloc_uaf.cc
+++ b/test/asan/TestCases/Windows/calloc_uaf.cpp
@@ -9,12 +9,12 @@ int main() {
buffer[0] = 42;
// CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 4 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*calloc_uaf.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*calloc_uaf.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located 0 bytes inside of 168-byte region
// CHECK: freed by thread T0 here:
// CHECK-NEXT: {{#0 .* free }}
-// CHECK-NEXT: {{#1 .* main .*calloc_uaf.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*calloc_uaf.cpp}}:[[@LINE-8]]
// CHECK: previously allocated by thread T0 here:
// CHECK-NEXT: {{#0 .* calloc }}
-// CHECK-NEXT: {{#1 .* main .*calloc_uaf.cc}}:[[@LINE-12]]
+// CHECK-NEXT: {{#1 .* main .*calloc_uaf.cpp}}:[[@LINE-12]]
}
diff --git a/test/asan/TestCases/Windows/coverage-basic.cc b/test/asan/TestCases/Windows/coverage-basic.cpp
index 1469e1c30..1469e1c30 100644
--- a/test/asan/TestCases/Windows/coverage-basic.cc
+++ b/test/asan/TestCases/Windows/coverage-basic.cpp
diff --git a/test/asan/TestCases/Windows/coverage-dll-stdio.cc b/test/asan/TestCases/Windows/coverage-dll-stdio.cpp
index 5cba9a76c..f2bfaad28 100644
--- a/test/asan/TestCases/Windows/coverage-dll-stdio.cc
+++ b/test/asan/TestCases/Windows/coverage-dll-stdio.cpp
@@ -2,7 +2,7 @@
// __local_stdio_printf_options function isn't instrumented for coverage.
// RUN: rm -rf %t && mkdir %t && cd %t
-// RUN: %clang_cl_asan -fsanitize-coverage=func,trace-pc-guard -Od %p/dll_host.cc -Fet.exe
+// RUN: %clang_cl_asan -fsanitize-coverage=func,trace-pc-guard -Od %p/dll_host.cpp -Fet.exe
// RUN: %clang_cl_asan -fsanitize-coverage=func,trace-pc-guard -LD -Od %s -Fet.dll
// RUN: %run ./t.exe t.dll 2>&1 | FileCheck %s
diff --git a/test/asan/TestCases/Windows/crash_read_write.cc b/test/asan/TestCases/Windows/crash_read_write.cpp
index 74200cca1..74200cca1 100644
--- a/test/asan/TestCases/Windows/crash_read_write.cc
+++ b/test/asan/TestCases/Windows/crash_read_write.cpp
diff --git a/test/asan/TestCases/Windows/crt_initializers.cc b/test/asan/TestCases/Windows/crt_initializers.cpp
index f33c16362..f33c16362 100644
--- a/test/asan/TestCases/Windows/crt_initializers.cc
+++ b/test/asan/TestCases/Windows/crt_initializers.cpp
diff --git a/test/asan/TestCases/Windows/delay_dbghelp.cc b/test/asan/TestCases/Windows/delay_dbghelp.cpp
index 81cd2d389..81cd2d389 100644
--- a/test/asan/TestCases/Windows/delay_dbghelp.cc
+++ b/test/asan/TestCases/Windows/delay_dbghelp.cpp
diff --git a/test/asan/TestCases/Windows/demangled_names.cc b/test/asan/TestCases/Windows/demangled_names.cpp
index 6d3019ef0..1e655b43d 100644
--- a/test/asan/TestCases/Windows/demangled_names.cc
+++ b/test/asan/TestCases/Windows/demangled_names.cpp
@@ -43,8 +43,8 @@ int main() {
free(buffer);
A<char*> a(buffer);
// CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]]
-// CHECK: foo::bar<42>{{.*}}demangled_names.cc
-// CHECK: foo::spam{{.*}}demangled_names.cc
-// CHECK: baz<char *,1>{{.*}}demangled_names.cc
-// CHECK: A<char *>::~A<char *>{{.*}}demangled_names.cc
+// CHECK: foo::bar<42>{{.*}}demangled_names.cpp
+// CHECK: foo::spam{{.*}}demangled_names.cpp
+// CHECK: baz<char *,1>{{.*}}demangled_names.cpp
+// CHECK: A<char *>::~A<char *>{{.*}}demangled_names.cpp
}
diff --git a/test/asan/TestCases/Windows/dll_aligned_mallocs.cc b/test/asan/TestCases/Windows/dll_aligned_mallocs.cpp
index 8ef428462..a6a1a3bb9 100644
--- a/test/asan/TestCases/Windows/dll_aligned_mallocs.cc
+++ b/test/asan/TestCases/Windows/dll_aligned_mallocs.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
// RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
// RUN: %run %t %t.dll | FileCheck %s
diff --git a/test/asan/TestCases/Windows/dll_allocators_sanity.cc b/test/asan/TestCases/Windows/dll_allocators_sanity.cpp
index 35b47c433..9e0543cb6 100644
--- a/test/asan/TestCases/Windows/dll_allocators_sanity.cc
+++ b/test/asan/TestCases/Windows/dll_allocators_sanity.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
// RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
// RUN: %run %t %t.dll | FileCheck %s
diff --git a/test/asan/TestCases/Windows/dll_and_lib.cc b/test/asan/TestCases/Windows/dll_and_lib.cpp
index bddaa32df..bddaa32df 100644
--- a/test/asan/TestCases/Windows/dll_and_lib.cc
+++ b/test/asan/TestCases/Windows/dll_and_lib.cpp
diff --git a/test/asan/TestCases/Windows/dll_cerr.cc b/test/asan/TestCases/Windows/dll_cerr.cpp
index 792c05f70..1e0967888 100644
--- a/test/asan/TestCases/Windows/dll_cerr.cc
+++ b/test/asan/TestCases/Windows/dll_cerr.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
// RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
// RUN: %run %t %t.dll 2>&1 | FileCheck %s
diff --git a/test/asan/TestCases/Windows/dll_control_c.cc b/test/asan/TestCases/Windows/dll_control_c.cpp
index 40d010d07..e30276325 100644
--- a/test/asan/TestCases/Windows/dll_control_c.cc
+++ b/test/asan/TestCases/Windows/dll_control_c.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
// RUN: %clang_cl_asan -LD -O2 %s -Fe%t.dll
// RUNX: %run %t %t.dll 2>&1 | FileCheck %s
diff --git a/test/asan/TestCases/Windows/dll_global_dead_strip.c b/test/asan/TestCases/Windows/dll_global_dead_strip.c
index 845095d1d..e5716be4e 100644
--- a/test/asan/TestCases/Windows/dll_global_dead_strip.c
+++ b/test/asan/TestCases/Windows/dll_global_dead_strip.c
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
//
// RUN: %clang_cl_asan /Gw -LD -Od %s -Fe%t.dll
// RUN: %env_asan_opts=report_globals=2 %run %t %t.dll 2>&1 | FileCheck %s --check-prefix=NOSTRIP
diff --git a/test/asan/TestCases/Windows/dll_heap_allocation.cc b/test/asan/TestCases/Windows/dll_heap_allocation.cpp
index b4df9d4f2..b4df9d4f2 100644
--- a/test/asan/TestCases/Windows/dll_heap_allocation.cc
+++ b/test/asan/TestCases/Windows/dll_heap_allocation.cpp
diff --git a/test/asan/TestCases/Windows/dll_host.cc b/test/asan/TestCases/Windows/dll_host.cpp
index 30678e3eb..30678e3eb 100644
--- a/test/asan/TestCases/Windows/dll_host.cc
+++ b/test/asan/TestCases/Windows/dll_host.cpp
diff --git a/test/asan/TestCases/Windows/dll_intercept_memchr.cc b/test/asan/TestCases/Windows/dll_intercept_memchr.cpp
index 7891a2afe..093134fac 100644
--- a/test/asan/TestCases/Windows/dll_intercept_memchr.cc
+++ b/test/asan/TestCases/Windows/dll_intercept_memchr.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
// RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
// RUN: not %run %t %t.dll 2>&1 | FileCheck %s
@@ -19,9 +19,9 @@ int test_function() {
// CHECK: READ of size 7 at [[ADDR]] thread T0
// CHECK-NEXT: __asan_wrap_memchr
// CHECK-NEXT: memchr
-// CHECK-NEXT: test_function {{.*}}dll_intercept_memchr.cc:[[@LINE-5]]
+// CHECK-NEXT: test_function {{.*}}dll_intercept_memchr.cpp:[[@LINE-5]]
// CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
-// CHECK-NEXT: test_function {{.*}}dll_intercept_memchr.cc
+// CHECK-NEXT: test_function {{.*}}dll_intercept_memchr.cpp
// CHECK: 'buff'{{.*}} <== Memory access at offset {{.*}} overflows this variable
return 0;
}
diff --git a/test/asan/TestCases/Windows/dll_intercept_memcpy.cc b/test/asan/TestCases/Windows/dll_intercept_memcpy.cpp
index 2c284e761..7b4fbb63b 100644
--- a/test/asan/TestCases/Windows/dll_intercept_memcpy.cc
+++ b/test/asan/TestCases/Windows/dll_intercept_memcpy.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
// RUN: %clang_cl_asan -Wno-fortify-source -LD -Od %s -Fe%t.dll
// RUN: not %run %t %t.dll 2>&1 | FileCheck %s
@@ -24,9 +24,9 @@ int test_function() {
// CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 6 at [[ADDR]] thread T0
// CHECK-NEXT: __asan_{{.*}}memcpy
-// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy.cc:[[@LINE-4]]
+// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy.cpp:[[@LINE-4]]
// CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
-// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy.cc
+// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy.cpp
// CHECK: 'buff2'{{.*}} <== Memory access at offset {{.*}} overflows this variable
return 0;
}
diff --git a/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc b/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cpp
index 49fde377f..f2b8cdb5f 100644
--- a/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc
+++ b/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
// RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
// RUN: not %run %t %t.dll 2>&1 | FileCheck %s
@@ -26,9 +26,9 @@ int test_function() {
// CHECK: WRITE of size 6 at [[ADDR]] thread T0
// CHECK-NEXT: __asan_{{.*}}mem{{.*}}
// CHECK-NEXT: call_memcpy
-// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy_indirect.cc:[[@LINE-5]]
+// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy_indirect.cpp:[[@LINE-5]]
// CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
-// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy_indirect.cc
+// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy_indirect.cpp
// CHECK: 'buff2'{{.*}} <== Memory access at offset {{.*}} overflows this variable
return 0;
}
diff --git a/test/asan/TestCases/Windows/dll_intercept_memset.cc b/test/asan/TestCases/Windows/dll_intercept_memset.cpp
index ccf2e2183..789a19935 100644
--- a/test/asan/TestCases/Windows/dll_intercept_memset.cc
+++ b/test/asan/TestCases/Windows/dll_intercept_memset.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
// RUN: %clang_cl_asan -Wno-fortify-source -LD -Od %s -Fe%t.dll
// RUN: not %run %t %t.dll 2>&1 | FileCheck %s
@@ -24,9 +24,9 @@ int test_function() {
// CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 6 at [[ADDR]] thread T0
// CHECK-NEXT: __asan_memset
-// CHECK-NEXT: test_function {{.*}}dll_intercept_memset.cc:[[@LINE-4]]
+// CHECK-NEXT: test_function {{.*}}dll_intercept_memset.cpp:[[@LINE-4]]
// CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
-// CHECK-NEXT: test_function {{.*}}dll_intercept_memset.cc
+// CHECK-NEXT: test_function {{.*}}dll_intercept_memset.cpp
// CHECK: 'buff'{{.*}} <== Memory access at offset {{.*}} overflows this variable
return 0;
}
diff --git a/test/asan/TestCases/Windows/dll_intercept_strlen.cc b/test/asan/TestCases/Windows/dll_intercept_strlen.cpp
index 2e10c504a..e15dec137 100644
--- a/test/asan/TestCases/Windows/dll_intercept_strlen.cc
+++ b/test/asan/TestCases/Windows/dll_intercept_strlen.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
// RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
// RUN: not %run %t %t.dll 2>&1 | FileCheck %s
@@ -20,9 +20,9 @@ int test_function() {
// FIXME: Should be READ of size 1, see issue 155.
// CHECK: READ of size {{[0-9]+}} at [[ADDR]] thread T0
// CHECK-NEXT: {{#0 .*}}strlen
-// CHECK-NEXT: {{#1 .* test_function .*}}dll_intercept_strlen.cc:[[@LINE-5]]
+// CHECK-NEXT: {{#1 .* test_function .*}}dll_intercept_strlen.cpp:[[@LINE-5]]
//
// CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
-// CHECK-NEXT: test_function {{.*}}dll_intercept_strlen.cc:
+// CHECK-NEXT: test_function {{.*}}dll_intercept_strlen.cpp:
return len > 42;
}
diff --git a/test/asan/TestCases/Windows/dll_large_function.cc b/test/asan/TestCases/Windows/dll_large_function.cpp
index 039d01f84..039d01f84 100644
--- a/test/asan/TestCases/Windows/dll_large_function.cc
+++ b/test/asan/TestCases/Windows/dll_large_function.cpp
diff --git a/test/asan/TestCases/Windows/dll_malloc_left_oob.cc b/test/asan/TestCases/Windows/dll_malloc_left_oob.cpp
index 4ed50e9c6..bab857714 100644
--- a/test/asan/TestCases/Windows/dll_malloc_left_oob.cc
+++ b/test/asan/TestCases/Windows/dll_malloc_left_oob.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
// RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
// RUN: not %run %t %t.dll 2>&1 | FileCheck %s
@@ -9,14 +9,14 @@ int test_function() {
buffer[-1] = 42;
// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: test_function {{.*}}dll_malloc_left_oob.cc:[[@LINE-3]]
-// CHECK-NEXT: main {{.*}}dll_host.cc
+// CHECK-NEXT: test_function {{.*}}dll_malloc_left_oob.cpp:[[@LINE-3]]
+// CHECK-NEXT: main {{.*}}dll_host.cpp
//
// CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region
// CHECK-LABEL: allocated by thread T0 here:
// CHECK-NEXT: malloc
-// CHECK-NEXT: test_function {{.*}}dll_malloc_left_oob.cc:[[@LINE-10]]
-// CHECK-NEXT: main {{.*}}dll_host.cc
+// CHECK-NEXT: test_function {{.*}}dll_malloc_left_oob.cpp:[[@LINE-10]]
+// CHECK-NEXT: main {{.*}}dll_host.cpp
// CHECK-LABEL: SUMMARY
free(buffer);
return 0;
diff --git a/test/asan/TestCases/Windows/dll_malloc_uaf.cc b/test/asan/TestCases/Windows/dll_malloc_uaf.cpp
index adaded1df..290541f6d 100644
--- a/test/asan/TestCases/Windows/dll_malloc_uaf.cc
+++ b/test/asan/TestCases/Windows/dll_malloc_uaf.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
// RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
// RUN: not %run %t %t.dll 2>&1 | FileCheck %s
@@ -11,18 +11,18 @@ int test_function() {
buffer[0] = 42;
// CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 4 at [[ADDR]] thread T0
-// CHECK-NEXT: test_function {{.*}}dll_malloc_uaf.cc:[[@LINE-3]]
+// CHECK-NEXT: test_function {{.*}}dll_malloc_uaf.cpp:[[@LINE-3]]
// CHECK-NEXT: main {{.*}}dll_host
//
// CHECK: [[ADDR]] is located 0 bytes inside of 42-byte region
// CHECK-LABEL: freed by thread T0 here:
// CHECK-NEXT: free
-// CHECK-NEXT: test_function {{.*}}dll_malloc_uaf.cc:[[@LINE-10]]
+// CHECK-NEXT: test_function {{.*}}dll_malloc_uaf.cpp:[[@LINE-10]]
// CHECK-NEXT: main {{.*}}dll_host
//
// CHECK-LABEL: previously allocated by thread T0 here:
// CHECK-NEXT: malloc
-// CHECK-NEXT: test_function {{.*}}dll_malloc_uaf.cc:[[@LINE-16]]
+// CHECK-NEXT: test_function {{.*}}dll_malloc_uaf.cpp:[[@LINE-16]]
// CHECK-NEXT: main {{.*}}dll_host
return 0;
}
diff --git a/test/asan/TestCases/Windows/dll_noreturn.cc b/test/asan/TestCases/Windows/dll_noreturn.cpp
index dfe51aadb..8b8e4d149 100644
--- a/test/asan/TestCases/Windows/dll_noreturn.cc
+++ b/test/asan/TestCases/Windows/dll_noreturn.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
// RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
// RUN: not %run %t %t.dll 2>&1 | FileCheck %s
@@ -11,12 +11,12 @@ void noreturn_f() {
_exit(1);
// CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: noreturn_f{{.*}}dll_noreturn.cc:[[@LINE-4]]
-// CHECK-NEXT: test_function{{.*}}dll_noreturn.cc
-// CHECK-NEXT: main{{.*}}dll_host.cc
+// CHECK-NEXT: noreturn_f{{.*}}dll_noreturn.cpp:[[@LINE-4]]
+// CHECK-NEXT: test_function{{.*}}dll_noreturn.cpp
+// CHECK-NEXT: main{{.*}}dll_host.cpp
//
// CHECK: Address [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:.*]] in frame
-// CHECK-NEXT: noreturn_f{{.*}}dll_noreturn.cc
+// CHECK-NEXT: noreturn_f{{.*}}dll_noreturn.cpp
// CHECK: 'buffer'{{.*}} <== Memory access at offset [[OFFSET]] underflows this variable
// CHECK-LABEL: SUMMARY
}
diff --git a/test/asan/TestCases/Windows/dll_null_deref.cc b/test/asan/TestCases/Windows/dll_null_deref.cpp
index 5b3d97705..0c826a0f3 100644
--- a/test/asan/TestCases/Windows/dll_null_deref.cc
+++ b/test/asan/TestCases/Windows/dll_null_deref.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
// RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
// RUN: not %run %t %t.dll 2>&1 | FileCheck %s
@@ -12,7 +12,7 @@ static void NullDeref(int *ptr) {
extern "C" __declspec(dllexport)
int test_function() {
NullDeref((int*)0);
- // CHECK: {{ #1 0x.* in test_function .*\dll_null_deref.cc:}}[[@LINE-1]]
+ // CHECK: {{ #1 0x.* in test_function .*\dll_null_deref.cpp:}}[[@LINE-1]]
// CHECK: AddressSanitizer can not provide additional info.
return 0;
}
diff --git a/test/asan/TestCases/Windows/dll_operator_array_new_left_oob.cc b/test/asan/TestCases/Windows/dll_operator_array_new_left_oob.cpp
index 3983a2651..95064d7ae 100644
--- a/test/asan/TestCases/Windows/dll_operator_array_new_left_oob.cc
+++ b/test/asan/TestCases/Windows/dll_operator_array_new_left_oob.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
// RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
// RUN: not %run %t %t.dll 2>&1 | FileCheck %s
@@ -8,8 +8,8 @@ int test_function() {
buffer[-1] = 42;
// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_left_oob.cc:[[@LINE-3]]
-// CHECK-NEXT: main {{.*}}dll_host.cc
+// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_left_oob.cpp:[[@LINE-3]]
+// CHECK-NEXT: main {{.*}}dll_host.cpp
//
// CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region
// CHECK-LABEL: allocated by thread T0 here:
@@ -17,8 +17,8 @@ int test_function() {
// operator new/delete in DLLs when using -MT CRT.
// FIXME: The 'operator new' frame should have [].
// CHECK: operator new
-// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_left_oob.cc:[[@LINE-13]]
-// CHECK-NEXT: main {{.*}}dll_host.cc
+// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_left_oob.cpp:[[@LINE-13]]
+// CHECK-NEXT: main {{.*}}dll_host.cpp
// CHECK-LABEL: SUMMARY
delete [] buffer;
return 0;
diff --git a/test/asan/TestCases/Windows/dll_operator_array_new_with_dtor_left_oob.cc b/test/asan/TestCases/Windows/dll_operator_array_new_with_dtor_left_oob.cpp
index 4b0e45d85..a08524f7b 100644
--- a/test/asan/TestCases/Windows/dll_operator_array_new_with_dtor_left_oob.cc
+++ b/test/asan/TestCases/Windows/dll_operator_array_new_with_dtor_left_oob.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
// RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
// RUN: not %run %t %t.dll 2>&1 | FileCheck %s
@@ -13,8 +13,8 @@ int test_function() {
buffer[-(1 + sizeof(void*) / 4)].x = 42;
// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 4 at [[ADDR]] thread T0
-// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_with_dtor_left_oob.cc:[[@LINE-3]]
-// CHECK-NEXT: main {{.*}}dll_host.cc
+// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_with_dtor_left_oob.cpp:[[@LINE-3]]
+// CHECK-NEXT: main {{.*}}dll_host.cpp
//
// FIXME: Currently it says "4 bytes ... left of 172-byte region",
// should be "8 bytes ... left of 168-byte region", see
@@ -25,8 +25,8 @@ int test_function() {
// FIXME: The operator new frame should have [].
// CHECK-LABEL: allocated by thread T0 here:
// CHECK: operator new
-// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_with_dtor_left_oob.cc:[[@LINE-16]]
-// CHECK-NEXT: main {{.*}}dll_host.cc
+// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_with_dtor_left_oob.cpp:[[@LINE-16]]
+// CHECK-NEXT: main {{.*}}dll_host.cpp
// CHECK-LABEL: SUMMARY
delete [] buffer;
return 0;
diff --git a/test/asan/TestCases/Windows/dll_poison_unpoison.cc b/test/asan/TestCases/Windows/dll_poison_unpoison.cpp
index bbc2730e1..6a23da764 100644
--- a/test/asan/TestCases/Windows/dll_poison_unpoison.cc
+++ b/test/asan/TestCases/Windows/dll_poison_unpoison.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
// RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
// RUN: not %run %t %t.dll 2>&1 | FileCheck %s
@@ -24,12 +24,12 @@ int test_function() {
should_crash(&buffer[96]);
// CHECK: AddressSanitizer: use-after-poison on address [[ADDR:0x[0-9a-f]+]]
// CHECK-NEXT: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: should_crash{{.*}}\dll_poison_unpoison.cc
-// CHECK-NEXT: test_function{{.*}}\dll_poison_unpoison.cc:[[@LINE-4]]
+// CHECK-NEXT: should_crash{{.*}}\dll_poison_unpoison.cpp
+// CHECK-NEXT: test_function{{.*}}\dll_poison_unpoison.cpp:[[@LINE-4]]
// CHECK-NEXT: main
//
// CHECK: [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:.*]] in frame
-// CHECK-NEXT: test_function{{.*}}\dll_poison_unpoison.cc
+// CHECK-NEXT: test_function{{.*}}\dll_poison_unpoison.cpp
// CHECK: 'buffer'{{.*}} <== Memory access at offset [[OFFSET]] is inside this variable
return 0;
}
diff --git a/test/asan/TestCases/Windows/dll_report_globals_symbolization_at_startup.cc b/test/asan/TestCases/Windows/dll_report_globals_symbolization_at_startup.cpp
index 0a8e3d8cd..0a8e3d8cd 100644
--- a/test/asan/TestCases/Windows/dll_report_globals_symbolization_at_startup.cc
+++ b/test/asan/TestCases/Windows/dll_report_globals_symbolization_at_startup.cpp
diff --git a/test/asan/TestCases/Windows/dll_seh.cc b/test/asan/TestCases/Windows/dll_seh.cpp
index 033892e74..3651463c5 100644
--- a/test/asan/TestCases/Windows/dll_seh.cc
+++ b/test/asan/TestCases/Windows/dll_seh.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
//
// Check both -GS and -GS- builds:
// RUN: %clang_cl_asan -GS -LD -Od %s -Fe%t.dll
diff --git a/test/asan/TestCases/Windows/dll_stack_use_after_return.cc b/test/asan/TestCases/Windows/dll_stack_use_after_return.cpp
index 44313195b..3f36fccb0 100644
--- a/test/asan/TestCases/Windows/dll_stack_use_after_return.cc
+++ b/test/asan/TestCases/Windows/dll_stack_use_after_return.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
// RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
// RUN: %env_asan_opts=detect_stack_use_after_return=1 not %run %t %t.dll 2>&1 | FileCheck %s
@@ -17,11 +17,11 @@ int test_function() {
*x = 42;
// CHECK: AddressSanitizer: stack-use-after-return
// CHECK: WRITE of size 1 at [[ADDR:.*]] thread T0
-// CHECK-NEXT: test_function{{.*}}dll_stack_use_after_return.cc:[[@LINE-3]]
+// CHECK-NEXT: test_function{{.*}}dll_stack_use_after_return.cpp:[[@LINE-3]]
// CHECK-NEXT: main
//
// CHECK: Address [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:.*]] in frame
-// CHECK-NEXT: #0 {{.*}} foo{{.*}}dll_stack_use_after_return.cc
+// CHECK-NEXT: #0 {{.*}} foo{{.*}}dll_stack_use_after_return.cpp
// CHECK: 'stack_buffer'{{.*}} <== Memory access at offset [[OFFSET]] is inside this variable
return 0;
}
diff --git a/test/asan/TestCases/Windows/dll_thread_stack_array_left_oob.cc b/test/asan/TestCases/Windows/dll_thread_stack_array_left_oob.cpp
index 8959846b1..c25da9008 100644
--- a/test/asan/TestCases/Windows/dll_thread_stack_array_left_oob.cc
+++ b/test/asan/TestCases/Windows/dll_thread_stack_array_left_oob.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
// RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
// RUN: not %run %t %t.dll 2>&1 | FileCheck %s
@@ -11,10 +11,10 @@ DWORD WINAPI thread_proc(void *context) {
stack_buffer[subscript] = 42;
// CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T1
-// CHECK-NEXT: thread_proc{{.*}}dll_thread_stack_array_left_oob.cc:[[@LINE-3]]
+// CHECK-NEXT: thread_proc{{.*}}dll_thread_stack_array_left_oob.cpp:[[@LINE-3]]
//
// CHECK: Address [[ADDR]] is located in stack of thread T1 at offset [[OFFSET:.*]] in frame
-// CHECK-NEXT: thread_proc{{.*}}dll_thread_stack_array_left_oob.cc
+// CHECK-NEXT: thread_proc{{.*}}dll_thread_stack_array_left_oob.cpp
//
// CHECK: 'stack_buffer'{{.*}} <== Memory access at offset [[OFFSET]] underflows this variable
@@ -25,8 +25,8 @@ extern "C" __declspec(dllexport)
int test_function() {
HANDLE thr = CreateThread(NULL, 0, thread_proc, NULL, 0, NULL);
// CHECK-LABEL: Thread T1 created by T0 here:
-// CHECK: test_function{{.*}}dll_thread_stack_array_left_oob.cc:[[@LINE-2]]
-// CHECK-NEXT: main{{.*}}dll_host.cc
+// CHECK: test_function{{.*}}dll_thread_stack_array_left_oob.cpp:[[@LINE-2]]
+// CHECK-NEXT: main{{.*}}dll_host.cpp
// CHECK-LABEL: SUMMARY
if (thr == 0)
return 1;
diff --git a/test/asan/TestCases/Windows/dll_unload.cc b/test/asan/TestCases/Windows/dll_unload.cpp
index 055567a0f..055567a0f 100644
--- a/test/asan/TestCases/Windows/dll_unload.cc
+++ b/test/asan/TestCases/Windows/dll_unload.cpp
diff --git a/test/asan/TestCases/Windows/double_free.cc b/test/asan/TestCases/Windows/double_free.cpp
index 7a1dd3b5b..68437462a 100644
--- a/test/asan/TestCases/Windows/double_free.cc
+++ b/test/asan/TestCases/Windows/double_free.cpp
@@ -9,13 +9,13 @@ int main() {
free(x);
// CHECK: AddressSanitizer: attempting double-free on [[ADDR:0x[0-9a-f]+]]
// CHECK-NEXT: {{#0 .* free }}
-// CHECK-NEXT: {{#1 .* main .*double_free.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#1 .* main .*double_free.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located 0 bytes inside of 168-byte region
// CHECK-LABEL: freed by thread T0 here:
// CHECK-NEXT: {{#0 .* free }}
-// CHECK-NEXT: {{#1 .* main .*double_free.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*double_free.cpp}}:[[@LINE-8]]
// CHECK-LABEL: previously allocated by thread T0 here:
// CHECK-NEXT: {{#0 .* malloc }}
-// CHECK-NEXT: {{#1 .* main .*double_free.cc}}:[[@LINE-12]]
+// CHECK-NEXT: {{#1 .* main .*double_free.cpp}}:[[@LINE-12]]
return 0;
}
diff --git a/test/asan/TestCases/Windows/double_operator_delete.cc b/test/asan/TestCases/Windows/double_operator_delete.cpp
index 99a8fc472..168e531a8 100644
--- a/test/asan/TestCases/Windows/double_operator_delete.cc
+++ b/test/asan/TestCases/Windows/double_operator_delete.cpp
@@ -10,16 +10,16 @@ int main() {
// CHECK: AddressSanitizer: attempting double-free on [[ADDR:0x[0-9a-f]+]]
// FIXME: The 'operator delete' frame should have [].
// CHECK-NEXT: {{#0 .* operator delete}}
-// CHECK-NEXT: {{#1 .* main .*double_operator_delete.cc}}:[[@LINE-4]]
+// CHECK-NEXT: {{#1 .* main .*double_operator_delete.cpp}}:[[@LINE-4]]
// CHECK: [[ADDR]] is located 0 bytes inside of 168-byte region
// CHECK-LABEL: freed by thread T0 here:
// FIXME: The 'operator delete' frame should have [].
// CHECK-NEXT: {{#0 .* operator delete}}
-// CHECK-NEXT: {{#1 .* main .*double_operator_delete.cc}}:[[@LINE-10]]
+// CHECK-NEXT: {{#1 .* main .*double_operator_delete.cpp}}:[[@LINE-10]]
// CHECK-LABEL: previously allocated by thread T0 here:
// FIXME: The 'operator new' frame should have [].
// CHECK-NEXT: {{#0 .* operator new}}
-// CHECK-NEXT: {{#1 .* main .*double_operator_delete.cc}}:[[@LINE-15]]
+// CHECK-NEXT: {{#1 .* main .*double_operator_delete.cpp}}:[[@LINE-15]]
return 0;
}
diff --git a/test/asan/TestCases/Windows/free_hook_realloc.cc b/test/asan/TestCases/Windows/free_hook_realloc.cpp
index 11e8c9975..11e8c9975 100644
--- a/test/asan/TestCases/Windows/free_hook_realloc.cc
+++ b/test/asan/TestCases/Windows/free_hook_realloc.cpp
diff --git a/test/asan/TestCases/Windows/fuse-lld-globals.cc b/test/asan/TestCases/Windows/fuse-lld-globals.cpp
index 4148d562f..cb068431e 100644
--- a/test/asan/TestCases/Windows/fuse-lld-globals.cc
+++ b/test/asan/TestCases/Windows/fuse-lld-globals.cpp
@@ -10,7 +10,7 @@ int main(int argc, char **argv) {
memset(ZZZ, 0, 10);
int res = YYY[argc * 10]; // BOOOM
// CHECK: {{READ of size 1 at 0x.* thread T0}}
- // CHECK: {{ #0 0x.* in main .*fuse-lld-globals.cc:}}[[@LINE-2]]
+ // CHECK: {{ #0 0x.* in main .*fuse-lld-globals.cpp:}}[[@LINE-2]]
// CHECK: {{0x.* is located 0 bytes to the right of global variable}}
// CHECK: {{.*YYY.* of size 10}}
res += XXX[argc] + ZZZ[argc];
diff --git a/test/asan/TestCases/Windows/fuse-lld.cc b/test/asan/TestCases/Windows/fuse-lld.cpp
index 2aee0385d..5fa5945df 100644
--- a/test/asan/TestCases/Windows/fuse-lld.cc
+++ b/test/asan/TestCases/Windows/fuse-lld.cpp
@@ -13,7 +13,7 @@ int main() {
return x[5];
// CHECK: heap-use-after-free
// CHECK: free
- // CHECK: main{{.*}}fuse-lld.cc:[[@LINE-4]]:3
+ // CHECK: main{{.*}}fuse-lld.cpp:[[@LINE-4]]:3
// CHECK: malloc
- // CHECK: main{{.*}}fuse-lld.cc:[[@LINE-7]]:20
+ // CHECK: main{{.*}}fuse-lld.cpp:[[@LINE-7]]:20
}
diff --git a/test/asan/TestCases/Windows/global_const_string.cc b/test/asan/TestCases/Windows/global_const_string.cpp
index 546419dad..546419dad 100644
--- a/test/asan/TestCases/Windows/global_const_string.cc
+++ b/test/asan/TestCases/Windows/global_const_string.cpp
diff --git a/test/asan/TestCases/Windows/global_const_string_oob.cc b/test/asan/TestCases/Windows/global_const_string_oob.cpp
index f31190f7d..241d14f42 100644
--- a/test/asan/TestCases/Windows/global_const_string_oob.cc
+++ b/test/asan/TestCases/Windows/global_const_string_oob.cpp
@@ -12,8 +12,8 @@ int main(void) {
// CHECK-NOT: Boo
// CHECK: AddressSanitizer: global-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: READ of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*global_const_string_oob.cc:}}[[@LINE-5]]
-// CHECK: [[ADDR]] is located 5 bytes to the right of global variable [[STR:.*]] defined in {{'.*global_const_string_oob.cc:7:.*' .*}} of size 11
+// CHECK-NEXT: {{#0 .* main .*global_const_string_oob.cpp:}}[[@LINE-5]]
+// CHECK: [[ADDR]] is located 5 bytes to the right of global variable [[STR:.*]] defined in {{'.*global_const_string_oob.cpp:7:.*' .*}} of size 11
// CHECK: [[STR]] is ascii string 'foobarspam'
return 0;
}
diff --git a/test/asan/TestCases/Windows/heapalloc.cc b/test/asan/TestCases/Windows/heapalloc.cpp
index cb07b8fb0..cb07b8fb0 100644
--- a/test/asan/TestCases/Windows/heapalloc.cc
+++ b/test/asan/TestCases/Windows/heapalloc.cpp
diff --git a/test/asan/TestCases/Windows/heapalloc_dll_double_free.cc b/test/asan/TestCases/Windows/heapalloc_dll_double_free.cpp
index 496289ae1..496289ae1 100644
--- a/test/asan/TestCases/Windows/heapalloc_dll_double_free.cc
+++ b/test/asan/TestCases/Windows/heapalloc_dll_double_free.cpp
diff --git a/test/asan/TestCases/Windows/heapalloc_dll_unload_realloc_uaf.cc b/test/asan/TestCases/Windows/heapalloc_dll_unload_realloc_uaf.cpp
index 79b30f4a9..79b30f4a9 100644
--- a/test/asan/TestCases/Windows/heapalloc_dll_unload_realloc_uaf.cc
+++ b/test/asan/TestCases/Windows/heapalloc_dll_unload_realloc_uaf.cpp
diff --git a/test/asan/TestCases/Windows/heapalloc_doublefree.cc b/test/asan/TestCases/Windows/heapalloc_doublefree.cpp
index 3394a9233..3394a9233 100644
--- a/test/asan/TestCases/Windows/heapalloc_doublefree.cc
+++ b/test/asan/TestCases/Windows/heapalloc_doublefree.cpp
diff --git a/test/asan/TestCases/Windows/heapalloc_flags_fallback.cc b/test/asan/TestCases/Windows/heapalloc_flags_fallback.cpp
index e040fd581..e040fd581 100644
--- a/test/asan/TestCases/Windows/heapalloc_flags_fallback.cc
+++ b/test/asan/TestCases/Windows/heapalloc_flags_fallback.cpp
diff --git a/test/asan/TestCases/Windows/heapalloc_huge.cc b/test/asan/TestCases/Windows/heapalloc_huge.cpp
index 3a6ce7854..3a6ce7854 100644
--- a/test/asan/TestCases/Windows/heapalloc_huge.cc
+++ b/test/asan/TestCases/Windows/heapalloc_huge.cpp
diff --git a/test/asan/TestCases/Windows/heapalloc_rtl_transfer.cc b/test/asan/TestCases/Windows/heapalloc_rtl_transfer.cpp
index a36e59470..a36e59470 100644
--- a/test/asan/TestCases/Windows/heapalloc_rtl_transfer.cc
+++ b/test/asan/TestCases/Windows/heapalloc_rtl_transfer.cpp
diff --git a/test/asan/TestCases/Windows/heapalloc_sanity.cc b/test/asan/TestCases/Windows/heapalloc_sanity.cpp
index a2ee68621..a2ee68621 100644
--- a/test/asan/TestCases/Windows/heapalloc_sanity.cc
+++ b/test/asan/TestCases/Windows/heapalloc_sanity.cpp
diff --git a/test/asan/TestCases/Windows/heapalloc_transfer.cc b/test/asan/TestCases/Windows/heapalloc_transfer.cpp
index 497d36b41..497d36b41 100644
--- a/test/asan/TestCases/Windows/heapalloc_transfer.cc
+++ b/test/asan/TestCases/Windows/heapalloc_transfer.cpp
diff --git a/test/asan/TestCases/Windows/heapalloc_uaf.cc b/test/asan/TestCases/Windows/heapalloc_uaf.cpp
index e0f1f8657..e0f1f8657 100644
--- a/test/asan/TestCases/Windows/heapalloc_uaf.cc
+++ b/test/asan/TestCases/Windows/heapalloc_uaf.cpp
diff --git a/test/asan/TestCases/Windows/heapalloc_zero_size.cc b/test/asan/TestCases/Windows/heapalloc_zero_size.cpp
index 40396ed5f..40396ed5f 100644
--- a/test/asan/TestCases/Windows/heapalloc_zero_size.cc
+++ b/test/asan/TestCases/Windows/heapalloc_zero_size.cpp
diff --git a/test/asan/TestCases/Windows/heaprealloc.cc b/test/asan/TestCases/Windows/heaprealloc.cpp
index add644c05..add644c05 100644
--- a/test/asan/TestCases/Windows/heaprealloc.cc
+++ b/test/asan/TestCases/Windows/heaprealloc.cpp
diff --git a/test/asan/TestCases/Windows/heaprealloc_alloc_zero.cc b/test/asan/TestCases/Windows/heaprealloc_alloc_zero.cpp
index 7b1272ea5..7b1272ea5 100644
--- a/test/asan/TestCases/Windows/heaprealloc_alloc_zero.cc
+++ b/test/asan/TestCases/Windows/heaprealloc_alloc_zero.cpp
diff --git a/test/asan/TestCases/Windows/heaprealloc_zero_size.cc b/test/asan/TestCases/Windows/heaprealloc_zero_size.cpp
index 96bc9b90c..96bc9b90c 100644
--- a/test/asan/TestCases/Windows/heaprealloc_zero_size.cc
+++ b/test/asan/TestCases/Windows/heaprealloc_zero_size.cpp
diff --git a/test/asan/TestCases/Windows/hello_world.cc b/test/asan/TestCases/Windows/hello_world.cpp
index 0caeb3555..0caeb3555 100644
--- a/test/asan/TestCases/Windows/hello_world.cc
+++ b/test/asan/TestCases/Windows/hello_world.cpp
diff --git a/test/asan/TestCases/Windows/intercept_memcpy.cc b/test/asan/TestCases/Windows/intercept_memcpy.cpp
index 846c6d8b3..db8de07bf 100644
--- a/test/asan/TestCases/Windows/intercept_memcpy.cc
+++ b/test/asan/TestCases/Windows/intercept_memcpy.cpp
@@ -24,7 +24,7 @@ int main() {
// CHECK: WRITE of size 6 at [[ADDR]] thread T0
// CHECK-NEXT: __asan_{{.*}}mem{{.*}}
// CHECK-NEXT: call_mem{{.*}}
-// CHECK-NEXT: main {{.*}}intercept_memcpy.cc:[[@LINE-5]]
+// CHECK-NEXT: main {{.*}}intercept_memcpy.cpp:[[@LINE-5]]
// CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
// CHECK-NEXT: #0 {{.*}} main
// CHECK: 'buff2'{{.*}} <== Memory access at offset {{.*}} overflows this variable
diff --git a/test/asan/TestCases/Windows/intercept_strdup.cc b/test/asan/TestCases/Windows/intercept_strdup.cpp
index 2bef08d68..46a59ead6 100644
--- a/test/asan/TestCases/Windows/intercept_strdup.cc
+++ b/test/asan/TestCases/Windows/intercept_strdup.cpp
@@ -17,7 +17,7 @@ int main() {
ptr[subscript] = 42;
// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK: {{#0 .* main .*}}intercept_strdup.cc:[[@LINE-3]]
+// CHECK: {{#0 .* main .*}}intercept_strdup.cpp:[[@LINE-3]]
// CHECK: [[ADDR]] is located 1 bytes to the left of 6-byte region
// CHECK: allocated by thread T0 here:
//
@@ -27,6 +27,6 @@ int main() {
//
// The local call to _strdup above may be the second or third frame depending
// on whether we're using the dynamic config.
-// CHECK: #{{[12]}} {{.*}} in main {{.*}}intercept_strdup.cc:[[@LINE-21]]
+// CHECK: #{{[12]}} {{.*}} in main {{.*}}intercept_strdup.cpp:[[@LINE-21]]
free(ptr);
}
diff --git a/test/asan/TestCases/Windows/intercept_strlen.cc b/test/asan/TestCases/Windows/intercept_strlen.cpp
index 217aab2de..0cedf9f22 100644
--- a/test/asan/TestCases/Windows/intercept_strlen.cc
+++ b/test/asan/TestCases/Windows/intercept_strlen.cpp
@@ -19,9 +19,9 @@ int main() {
// FIXME: Should be READ of size 1, see issue 155.
// CHECK: READ of size {{[0-9]+}} at [[ADDR]] thread T0
// CHECK: strlen
-// CHECK-NEXT: main {{.*}}intercept_strlen.cc:[[@LINE-5]]
+// CHECK-NEXT: main {{.*}}intercept_strlen.cpp:[[@LINE-5]]
// CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
-// CHECK-NEXT: main {{.*}}intercept_strlen.cc
+// CHECK-NEXT: main {{.*}}intercept_strlen.cpp
// CHECK: 'str'{{.*}} <== Memory access at offset {{.*}} overflows this variable
return len < 6;
}
diff --git a/test/asan/TestCases/Windows/interface_symbols_windows.cc b/test/asan/TestCases/Windows/interface_symbols_windows.cpp
index 1738b87e8..1738b87e8 100644
--- a/test/asan/TestCases/Windows/interface_symbols_windows.cc
+++ b/test/asan/TestCases/Windows/interface_symbols_windows.cpp
diff --git a/test/asan/TestCases/Windows/iostream_sbo.cc b/test/asan/TestCases/Windows/iostream_sbo.cpp
index 46f452a32..46f452a32 100644
--- a/test/asan/TestCases/Windows/iostream_sbo.cc
+++ b/test/asan/TestCases/Windows/iostream_sbo.cpp
diff --git a/test/asan/TestCases/Windows/longjmp.cc b/test/asan/TestCases/Windows/longjmp.cpp
index 443933e8a..443933e8a 100644
--- a/test/asan/TestCases/Windows/longjmp.cc
+++ b/test/asan/TestCases/Windows/longjmp.cpp
diff --git a/test/asan/TestCases/Windows/malloc_left_oob.cc b/test/asan/TestCases/Windows/malloc_left_oob.cpp
index 131dff2ef..cf8a1b708 100644
--- a/test/asan/TestCases/Windows/malloc_left_oob.cc
+++ b/test/asan/TestCases/Windows/malloc_left_oob.cpp
@@ -8,10 +8,10 @@ int main() {
buffer[-1] = 42;
// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*malloc_left_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*malloc_left_oob.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region
// CHECK: allocated by thread T0 here:
// CHECK-NEXT: {{#0 .* malloc }}
-// CHECK-NEXT: {{#1 .* main .*malloc_left_oob.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*malloc_left_oob.cpp}}:[[@LINE-8]]
free(buffer);
}
diff --git a/test/asan/TestCases/Windows/malloc_right_oob.cc b/test/asan/TestCases/Windows/malloc_right_oob.cpp
index 4fef3065c..acb55a3a2 100644
--- a/test/asan/TestCases/Windows/malloc_right_oob.cc
+++ b/test/asan/TestCases/Windows/malloc_right_oob.cpp
@@ -8,10 +8,10 @@ int main() {
buffer[42] = 42;
// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*malloc_right_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*malloc_right_oob.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located 0 bytes to the right of 42-byte region
// CHECK: allocated by thread T0 here:
// CHECK-NEXT: {{#0 .* malloc }}
-// CHECK-NEXT: {{#1 .* main .*malloc_right_oob.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*malloc_right_oob.cpp}}:[[@LINE-8]]
free(buffer);
}
diff --git a/test/asan/TestCases/Windows/malloc_uaf.cc b/test/asan/TestCases/Windows/malloc_uaf.cpp
index 5385a5c3c..8cecc680e 100644
--- a/test/asan/TestCases/Windows/malloc_uaf.cc
+++ b/test/asan/TestCases/Windows/malloc_uaf.cpp
@@ -9,12 +9,12 @@ int main() {
buffer[0] = 42;
// CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*malloc_uaf.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*malloc_uaf.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located 0 bytes inside of 42-byte region
// CHECK: freed by thread T0 here:
// CHECK-NEXT: {{#0 .* free }}
-// CHECK-NEXT: {{#1 .* main .*malloc_uaf.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*malloc_uaf.cpp}}:[[@LINE-8]]
// CHECK: previously allocated by thread T0 here:
// CHECK-NEXT: {{#0 .* malloc }}
-// CHECK-NEXT: {{#1 .* main .*malloc_uaf.cc}}:[[@LINE-12]]
+// CHECK-NEXT: {{#1 .* main .*malloc_uaf.cpp}}:[[@LINE-12]]
}
diff --git a/test/asan/TestCases/Windows/null_deref.cc b/test/asan/TestCases/Windows/null_deref.cpp
index 9515602ce..6582bac9e 100644
--- a/test/asan/TestCases/Windows/null_deref.cc
+++ b/test/asan/TestCases/Windows/null_deref.cpp
@@ -10,6 +10,6 @@ static void NullDeref(int *ptr) {
}
int main() {
NullDeref((int*)0);
- // CHECK: {{ #1 0x.* in main.*null_deref.cc:}}[[@LINE-1]]:3
+ // CHECK: {{ #1 0x.* in main.*null_deref.cpp:}}[[@LINE-1]]:3
// CHECK: AddressSanitizer can not provide additional info.
}
diff --git a/test/asan/TestCases/Windows/null_deref_multiple_dlls.cc b/test/asan/TestCases/Windows/null_deref_multiple_dlls.cpp
index 281dffa4f..09a572e58 100644
--- a/test/asan/TestCases/Windows/null_deref_multiple_dlls.cc
+++ b/test/asan/TestCases/Windows/null_deref_multiple_dlls.cpp
@@ -31,7 +31,7 @@ static void NullDeref(int *ptr) {
__declspec(dllexport) void foo2() {
NullDeref((int*)0);
- // CHECK: {{ #1 0x.* in foo2.*null_deref_multiple_dlls.cc:}}[[@LINE-1]]
+ // CHECK: {{ #1 0x.* in foo2.*null_deref_multiple_dlls.cpp:}}[[@LINE-1]]
// CHECK: AddressSanitizer can not provide additional info.
}
#else
diff --git a/test/asan/TestCases/Windows/oom.cc b/test/asan/TestCases/Windows/oom.cpp
index bf19aa09c..bf19aa09c 100644
--- a/test/asan/TestCases/Windows/oom.cc
+++ b/test/asan/TestCases/Windows/oom.cpp
diff --git a/test/asan/TestCases/Windows/operator_array_new_left_oob.cc b/test/asan/TestCases/Windows/operator_array_new_left_oob.cpp
index fec8e15b7..a1abd7e1e 100644
--- a/test/asan/TestCases/Windows/operator_array_new_left_oob.cc
+++ b/test/asan/TestCases/Windows/operator_array_new_left_oob.cpp
@@ -6,12 +6,12 @@ int main() {
buffer[-1] = 42;
// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*operator_array_new_left_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*operator_array_new_left_oob.cpp}}:[[@LINE-3]]
//
// CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region
// CHECK-LABEL: allocated by thread T0 here:
// FIXME: The 'operator new' frame should have [].
// CHECK-NEXT: {{#0 .* operator new}}
-// CHECK-NEXT: {{#1 .* main .*operator_array_new_left_oob.cc}}:[[@LINE-10]]
+// CHECK-NEXT: {{#1 .* main .*operator_array_new_left_oob.cpp}}:[[@LINE-10]]
delete [] buffer;
}
diff --git a/test/asan/TestCases/Windows/operator_array_new_right_oob.cc b/test/asan/TestCases/Windows/operator_array_new_right_oob.cpp
index 51c910a2f..05395c0bf 100644
--- a/test/asan/TestCases/Windows/operator_array_new_right_oob.cc
+++ b/test/asan/TestCases/Windows/operator_array_new_right_oob.cpp
@@ -8,11 +8,11 @@ int main() {
buffer[42] = 42;
// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK: {{#0 .* main .*operator_array_new_right_oob.cc}}:[[@LINE-3]]
+// CHECK: {{#0 .* main .*operator_array_new_right_oob.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located 0 bytes to the right of 42-byte region
// CHECK: allocated by thread T0 here:
// FIXME: The 'operator new' frame should have [].
// CHECK: {{#0 .* operator new}}
-// CHECK: {{#1 .* main .*operator_array_new_right_oob.cc}}:[[@LINE-9]]
+// CHECK: {{#1 .* main .*operator_array_new_right_oob.cpp}}:[[@LINE-9]]
delete [] buffer;
}
diff --git a/test/asan/TestCases/Windows/operator_array_new_uaf.cc b/test/asan/TestCases/Windows/operator_array_new_uaf.cpp
index e6bc1ac1c..552ca9d87 100644
--- a/test/asan/TestCases/Windows/operator_array_new_uaf.cc
+++ b/test/asan/TestCases/Windows/operator_array_new_uaf.cpp
@@ -9,16 +9,16 @@ int main() {
buffer[0] = 42;
// CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK: {{#0 .* main .*operator_array_new_uaf.cc}}:[[@LINE-3]]
+// CHECK: {{#0 .* main .*operator_array_new_uaf.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located 0 bytes inside of 42-byte region
// CHECK-LABEL: freed by thread T0 here:
// FIXME: The 'operator delete' frame should have [].
// CHECK: {{#0 .* operator delete}}
-// CHECK: {{#1 .* main .*operator_array_new_uaf.cc}}:[[@LINE-9]]
+// CHECK: {{#1 .* main .*operator_array_new_uaf.cpp}}:[[@LINE-9]]
// CHECK-LABEL: previously allocated by thread T0 here:
// FIXME: The 'operator new' frame should have [].
// CHECK: {{#0 .* operator new}}
-// CHECK: {{#1 .* main .*operator_array_new_uaf.cc}}:[[@LINE-14]]
+// CHECK: {{#1 .* main .*operator_array_new_uaf.cpp}}:[[@LINE-14]]
return 0;
}
diff --git a/test/asan/TestCases/Windows/operator_array_new_with_dtor_left_oob.cc b/test/asan/TestCases/Windows/operator_array_new_with_dtor_left_oob.cpp
index e91d05ea7..0af00fb7c 100644
--- a/test/asan/TestCases/Windows/operator_array_new_with_dtor_left_oob.cc
+++ b/test/asan/TestCases/Windows/operator_array_new_with_dtor_left_oob.cpp
@@ -11,7 +11,7 @@ int main() {
buffer[-(1 + sizeof(void*) / 4)].x = 42;
// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 4 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*operator_array_new_with_dtor_left_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*operator_array_new_with_dtor_left_oob.cpp}}:[[@LINE-3]]
//
// FIXME: Currently it says "4 bytes ... left of 172-byte region",
// should be "8 bytes ... left of 168-byte region", see
@@ -20,6 +20,6 @@ int main() {
// CHECK-LABEL: allocated by thread T0 here:
// FIXME: The 'operator new' frame should have [].
// CHECK-NEXT: {{#0 .* operator new}}
-// CHECK-NEXT: {{#1 .* main .*operator_array_new_with_dtor_left_oob.cc}}:[[@LINE-13]]
+// CHECK-NEXT: {{#1 .* main .*operator_array_new_with_dtor_left_oob.cpp}}:[[@LINE-13]]
delete [] buffer;
}
diff --git a/test/asan/TestCases/Windows/operator_delete_wrong_argument.cc b/test/asan/TestCases/Windows/operator_delete_wrong_argument.cpp
index d82bf588e..d8891859f 100644
--- a/test/asan/TestCases/Windows/operator_delete_wrong_argument.cc
+++ b/test/asan/TestCases/Windows/operator_delete_wrong_argument.cpp
@@ -8,5 +8,5 @@ int main() {
delete (x + 1);
// CHECK: AddressSanitizer: attempting free on address which was not malloc()-ed
// CHECK: {{#0 0x.* operator delete}}
-// CHECK: {{#1 .* main .*operator_delete_wrong_argument.cc}}:[[@LINE-3]]
+// CHECK: {{#1 .* main .*operator_delete_wrong_argument.cpp}}:[[@LINE-3]]
}
diff --git a/test/asan/TestCases/Windows/operator_new_left_oob.cc b/test/asan/TestCases/Windows/operator_new_left_oob.cpp
index 2a0fb70e4..404b6a284 100644
--- a/test/asan/TestCases/Windows/operator_new_left_oob.cc
+++ b/test/asan/TestCases/Windows/operator_new_left_oob.cpp
@@ -8,10 +8,10 @@ int main() {
buffer[-1] = 42;
// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK: {{#0 .* main .*operator_new_left_oob.cc}}:[[@LINE-3]]
+// CHECK: {{#0 .* main .*operator_new_left_oob.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located 1 bytes to the left of 1-byte region
// CHECK: allocated by thread T0 here:
// CHECK: {{#0 .* operator new}}
-// CHECK: {{#1 .* main .*operator_new_left_oob.cc}}:[[@LINE-8]]
+// CHECK: {{#1 .* main .*operator_new_left_oob.cpp}}:[[@LINE-8]]
delete buffer;
}
diff --git a/test/asan/TestCases/Windows/operator_new_right_oob.cc b/test/asan/TestCases/Windows/operator_new_right_oob.cpp
index 9ff08d33c..113266bbb 100644
--- a/test/asan/TestCases/Windows/operator_new_right_oob.cc
+++ b/test/asan/TestCases/Windows/operator_new_right_oob.cpp
@@ -8,10 +8,10 @@ int main() {
buffer[1] = 42;
// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK: {{#0 .* main .*operator_new_right_oob.cc}}:[[@LINE-3]]
+// CHECK: {{#0 .* main .*operator_new_right_oob.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located 0 bytes to the right of 1-byte region
// CHECK: allocated by thread T0 here:
// CHECK: {{#0 .* operator new}}
-// CHECK: {{#1 .* main .*operator_new_right_oob.cc}}:[[@LINE-8]]
+// CHECK: {{#1 .* main .*operator_new_right_oob.cpp}}:[[@LINE-8]]
delete buffer;
}
diff --git a/test/asan/TestCases/Windows/operator_new_uaf.cc b/test/asan/TestCases/Windows/operator_new_uaf.cpp
index e1453727d..fe8fc9022 100644
--- a/test/asan/TestCases/Windows/operator_new_uaf.cc
+++ b/test/asan/TestCases/Windows/operator_new_uaf.cpp
@@ -9,14 +9,14 @@ int main() {
*buffer = 42;
// CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK: {{#0 .* main .*operator_new_uaf.cc}}:[[@LINE-3]]
+// CHECK: {{#0 .* main .*operator_new_uaf.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located 0 bytes inside of 1-byte region
// CHECK-LABEL: freed by thread T0 here:
// CHECK: {{#0 .* operator delete}}
-// CHECK: {{#1 .* main .*operator_new_uaf.cc}}:[[@LINE-8]]
+// CHECK: {{#1 .* main .*operator_new_uaf.cpp}}:[[@LINE-8]]
// CHECK-LABEL: previously allocated by thread T0 here:
// CHECK: {{#0 .* operator new}}
-// CHECK: {{#1 .* main .*operator_new_uaf.cc}}:[[@LINE-12]]
+// CHECK: {{#1 .* main .*operator_new_uaf.cpp}}:[[@LINE-12]]
return 0;
}
diff --git a/test/asan/TestCases/Windows/queue_user_work_item.cc b/test/asan/TestCases/Windows/queue_user_work_item.cpp
index 2a8beb828..2a8beb828 100644
--- a/test/asan/TestCases/Windows/queue_user_work_item.cc
+++ b/test/asan/TestCases/Windows/queue_user_work_item.cpp
diff --git a/test/asan/TestCases/Windows/queue_user_work_item_report.cc b/test/asan/TestCases/Windows/queue_user_work_item_report.cpp
index 9de3d925f..cc57b3b7e 100644
--- a/test/asan/TestCases/Windows/queue_user_work_item_report.cc
+++ b/test/asan/TestCases/Windows/queue_user_work_item_report.cpp
@@ -11,7 +11,7 @@ DWORD CALLBACK work_item(LPVOID) {
stack_buffer[subscript] = 42;
// CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T{{[0-9]+}}
- // CHECK: {{#0 .* work_item.*queue_user_work_item_report.cc}}:[[@LINE-3]]
+ // CHECK: {{#0 .* work_item.*queue_user_work_item_report.cpp}}:[[@LINE-3]]
SetEvent(done);
return 0;
}
diff --git a/test/asan/TestCases/Windows/realloc_left_oob.cc b/test/asan/TestCases/Windows/realloc_left_oob.cpp
index 376214e34..08fd6c91b 100644
--- a/test/asan/TestCases/Windows/realloc_left_oob.cc
+++ b/test/asan/TestCases/Windows/realloc_left_oob.cpp
@@ -8,10 +8,10 @@ int main() {
buffer[-1] = 42;
// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*realloc_left_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*realloc_left_oob.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region
// CHECK: allocated by thread T0 here:
// CHECK-NEXT: {{#0 .* realloc }}
-// CHECK-NEXT: {{#1 .* main .*realloc_left_oob.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*realloc_left_oob.cpp}}:[[@LINE-8]]
free(buffer);
}
diff --git a/test/asan/TestCases/Windows/realloc_right_oob.cc b/test/asan/TestCases/Windows/realloc_right_oob.cpp
index 57934e478..aded5a057 100644
--- a/test/asan/TestCases/Windows/realloc_right_oob.cc
+++ b/test/asan/TestCases/Windows/realloc_right_oob.cpp
@@ -8,10 +8,10 @@ int main() {
buffer[42] = 42;
// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*realloc_right_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*realloc_right_oob.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located 0 bytes to the right of 42-byte region
// CHECK: allocated by thread T0 here:
// CHECK-NEXT: {{#0 .* realloc }}
-// CHECK-NEXT: {{#1 .* main .*realloc_right_oob.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*realloc_right_oob.cpp}}:[[@LINE-8]]
free(buffer);
}
diff --git a/test/asan/TestCases/Windows/realloc_uaf.cc b/test/asan/TestCases/Windows/realloc_uaf.cpp
index 8e318736b..7454d5ab2 100644
--- a/test/asan/TestCases/Windows/realloc_uaf.cc
+++ b/test/asan/TestCases/Windows/realloc_uaf.cpp
@@ -9,12 +9,12 @@ int main() {
buffer[0] = 42;
// CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*realloc_uaf.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*realloc_uaf.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located 0 bytes inside of 42-byte region
// CHECK: freed by thread T0 here:
// CHECK-NEXT: {{#0 .* free }}
-// CHECK-NEXT: {{#1 .* main .*realloc_uaf.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*realloc_uaf.cpp}}:[[@LINE-8]]
// CHECK: previously allocated by thread T0 here:
// CHECK-NEXT: {{#0 .* realloc }}
-// CHECK-NEXT: {{#1 .* main .*realloc_uaf.cc}}:[[@LINE-12]]
+// CHECK-NEXT: {{#1 .* main .*realloc_uaf.cpp}}:[[@LINE-12]]
}
diff --git a/test/asan/TestCases/Windows/recalloc_sanity.cc b/test/asan/TestCases/Windows/recalloc_sanity.cpp
index 41df5d002..41df5d002 100644
--- a/test/asan/TestCases/Windows/recalloc_sanity.cc
+++ b/test/asan/TestCases/Windows/recalloc_sanity.cpp
diff --git a/test/asan/TestCases/Windows/report_after_syminitialize.cc b/test/asan/TestCases/Windows/report_after_syminitialize.cpp
index eec502974..c406152e9 100644
--- a/test/asan/TestCases/Windows/report_after_syminitialize.cc
+++ b/test/asan/TestCases/Windows/report_after_syminitialize.cpp
@@ -20,6 +20,6 @@ int main() {
// CHECK: Hint: address points to the zero page.
// CHECK: {{WARNING: .*DbgHelp}}
// CHECK: {{WARNING: Failed to use and restart external symbolizer}}
- // CHECK: {{#0 0x.* in main.*report_after_syminitialize.cc:}}[[@LINE-6]]
+ // CHECK: {{#0 0x.* in main.*report_after_syminitialize.cpp:}}[[@LINE-6]]
// CHECK: AddressSanitizer can not provide additional info.
}
diff --git a/test/asan/TestCases/Windows/report_globals_reload_dll.cc b/test/asan/TestCases/Windows/report_globals_reload_dll.cpp
index eb6d4bc39..eb6d4bc39 100644
--- a/test/asan/TestCases/Windows/report_globals_reload_dll.cc
+++ b/test/asan/TestCases/Windows/report_globals_reload_dll.cpp
diff --git a/test/asan/TestCases/Windows/report_globals_vs_freelibrary.cc b/test/asan/TestCases/Windows/report_globals_vs_freelibrary.cpp
index 9619aff6a..9619aff6a 100644
--- a/test/asan/TestCases/Windows/report_globals_vs_freelibrary.cc
+++ b/test/asan/TestCases/Windows/report_globals_vs_freelibrary.cpp
diff --git a/test/asan/TestCases/Windows/rtlallocateheap.cc b/test/asan/TestCases/Windows/rtlallocateheap.cpp
index 6ef1caa0e..6ef1caa0e 100644
--- a/test/asan/TestCases/Windows/rtlallocateheap.cc
+++ b/test/asan/TestCases/Windows/rtlallocateheap.cpp
diff --git a/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_double_free.cc b/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_double_free.cpp
index 078114506..078114506 100644
--- a/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_double_free.cc
+++ b/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_double_free.cpp
diff --git a/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_realloc.cc b/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_realloc.cpp
index a2758cad2..a2758cad2 100644
--- a/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_realloc.cc
+++ b/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_realloc.cpp
diff --git a/test/asan/TestCases/Windows/rtlallocateheap_flags_fallback.cc b/test/asan/TestCases/Windows/rtlallocateheap_flags_fallback.cpp
index d7e81ac3a..d7e81ac3a 100644
--- a/test/asan/TestCases/Windows/rtlallocateheap_flags_fallback.cc
+++ b/test/asan/TestCases/Windows/rtlallocateheap_flags_fallback.cpp
diff --git a/test/asan/TestCases/Windows/rtlallocateheap_zero.cc b/test/asan/TestCases/Windows/rtlallocateheap_zero.cpp
index 92d2940a5..92d2940a5 100644
--- a/test/asan/TestCases/Windows/rtlallocateheap_zero.cc
+++ b/test/asan/TestCases/Windows/rtlallocateheap_zero.cpp
diff --git a/test/asan/TestCases/Windows/seh.cc b/test/asan/TestCases/Windows/seh.cpp
index 4cb0c55bc..4cb0c55bc 100644
--- a/test/asan/TestCases/Windows/seh.cc
+++ b/test/asan/TestCases/Windows/seh.cpp
diff --git a/test/asan/TestCases/Windows/shadow_conflict_32.cc b/test/asan/TestCases/Windows/shadow_conflict_32.cpp
index a2b6b4688..9e144be91 100644
--- a/test/asan/TestCases/Windows/shadow_conflict_32.cc
+++ b/test/asan/TestCases/Windows/shadow_conflict_32.cpp
@@ -24,6 +24,6 @@ extern "C" __declspec(dllexport) int test_function() { return 0; }
// CHECK: =={{[0-9:]+}}==ASan shadow was supposed to be located in the [0x2fff0000-0x3fffffff] range.
// CHECK: =={{[0-9:]+}}==Dumping process modules
-// CHECK-DAG: {{0x30000000-0x300.....}} {{.*}}\shadow_conflict_32.cc.tmp_dll.dll
-// CHECK-DAG: {{0x........-0x........}} {{.*}}\shadow_conflict_32.cc.tmp.exe
+// CHECK-DAG: {{0x30000000-0x300.....}} {{.*}}\shadow_conflict_32.cpp.tmp_dll.dll
+// CHECK-DAG: {{0x........-0x........}} {{.*}}\shadow_conflict_32.cpp.tmp.exe
// CHECK-DAG: {{0x........-0x........}} {{.*}}\ntdll.dll
diff --git a/test/asan/TestCases/Windows/shadow_mapping_failure.cc b/test/asan/TestCases/Windows/shadow_mapping_failure.cpp
index c77468994..c77468994 100644
--- a/test/asan/TestCases/Windows/shadow_mapping_failure.cc
+++ b/test/asan/TestCases/Windows/shadow_mapping_failure.cpp
diff --git a/test/asan/TestCases/Windows/stack_array_left_oob.cc b/test/asan/TestCases/Windows/stack_array_left_oob.cpp
index ea7119b4c..ff3618539 100644
--- a/test/asan/TestCases/Windows/stack_array_left_oob.cc
+++ b/test/asan/TestCases/Windows/stack_array_left_oob.cpp
@@ -9,8 +9,8 @@ int main() {
buffer[subscript] = 42;
// CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*stack_array_left_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*stack_array_left_oob.cpp}}:[[@LINE-3]]
// CHECK: Address [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:.*]] in frame
-// CHECK-NEXT: {{#0 .* main .*stack_array_left_oob.cc}}
+// CHECK-NEXT: {{#0 .* main .*stack_array_left_oob.cpp}}
// CHECK: 'buffer'{{.*}} <== Memory access at offset [[OFFSET]] underflows this variable
}
diff --git a/test/asan/TestCases/Windows/stack_array_right_oob.cc b/test/asan/TestCases/Windows/stack_array_right_oob.cpp
index bbcb96f8f..20270ffce 100644
--- a/test/asan/TestCases/Windows/stack_array_right_oob.cc
+++ b/test/asan/TestCases/Windows/stack_array_right_oob.cpp
@@ -9,8 +9,8 @@ int main() {
buffer[subscript] = 42;
// CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*stack_array_right_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*stack_array_right_oob.cpp}}:[[@LINE-3]]
// CHECK: Address [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:.*]] in frame
-// CHECK-NEXT: {{#0 .* main .*stack_array_right_oob.cc}}
+// CHECK-NEXT: {{#0 .* main .*stack_array_right_oob.cpp}}
// CHECK: 'buffer'{{.*}} <== Memory access at offset [[OFFSET]] overflows this variable
}
diff --git a/test/asan/TestCases/Windows/stack_array_sanity.cc b/test/asan/TestCases/Windows/stack_array_sanity.cpp
index 156e9f86f..156e9f86f 100644
--- a/test/asan/TestCases/Windows/stack_array_sanity.cc
+++ b/test/asan/TestCases/Windows/stack_array_sanity.cpp
diff --git a/test/asan/TestCases/Windows/stack_use_after_return.cc b/test/asan/TestCases/Windows/stack_use_after_return.cpp
index 4070bf628..9773084f8 100644
--- a/test/asan/TestCases/Windows/stack_use_after_return.cc
+++ b/test/asan/TestCases/Windows/stack_use_after_return.cpp
@@ -13,10 +13,10 @@ int main() {
*x = 42;
// CHECK: AddressSanitizer: stack-use-after-return
// CHECK: WRITE of size 1 at {{.*}} thread T0
-// CHECK-NEXT: {{#0 0x.* in main .*stack_use_after_return.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 0x.* in main .*stack_use_after_return.cpp}}:[[@LINE-3]]
//
// CHECK: is located in stack of thread T0 at offset [[OFFSET:.*]] in frame
-// CHECK-NEXT: {{#0 0x.* in foo.*stack_use_after_return.cc}}
+// CHECK-NEXT: {{#0 0x.* in foo.*stack_use_after_return.cpp}}
//
// CHECK: 'stack_buffer'{{.*}} <== Memory access at offset [[OFFSET]] is inside this variable
}
diff --git a/test/asan/TestCases/Windows/symbols_path.cc b/test/asan/TestCases/Windows/symbols_path.cpp
index f12172761..bb07570d8 100644
--- a/test/asan/TestCases/Windows/symbols_path.cc
+++ b/test/asan/TestCases/Windows/symbols_path.cpp
@@ -13,10 +13,10 @@ int main() {
buffer[-1] = 42;
// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*symbols_path.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*symbols_path.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region
// CHECK: allocated by thread T0 here:
// CHECK-NEXT: {{#0 .* malloc}}
-// CHECK-NEXT: {{#1 .* main .*symbols_path.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*symbols_path.cpp}}:[[@LINE-8]]
free(buffer);
}
diff --git a/test/asan/TestCases/Windows/thread_simple.cc b/test/asan/TestCases/Windows/thread_simple.cpp
index fd9ac4c28..fd9ac4c28 100644
--- a/test/asan/TestCases/Windows/thread_simple.cc
+++ b/test/asan/TestCases/Windows/thread_simple.cpp
diff --git a/test/asan/TestCases/Windows/thread_stack_array_left_oob.cc b/test/asan/TestCases/Windows/thread_stack_array_left_oob.cpp
index 2280c1036..2b99bc790 100644
--- a/test/asan/TestCases/Windows/thread_stack_array_left_oob.cc
+++ b/test/asan/TestCases/Windows/thread_stack_array_left_oob.cpp
@@ -9,7 +9,7 @@ DWORD WINAPI thread_proc(void *) {
stack_buffer[subscript] = 42;
// CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T1
-// CHECK: {{#0 .* thread_proc.*thread_stack_array_left_oob.cc}}:[[@LINE-3]]
+// CHECK: {{#0 .* thread_proc.*thread_stack_array_left_oob.cpp}}:[[@LINE-3]]
// CHECK: Address [[ADDR]] is located in stack of thread T1 at offset {{.*}} in frame
// CHECK: thread_proc
return 0;
@@ -18,7 +18,7 @@ DWORD WINAPI thread_proc(void *) {
int main() {
HANDLE thr = CreateThread(NULL, 0, thread_proc, NULL, 0, NULL);
// CHECK: Thread T1 created by T0 here:
-// CHECK: {{#[01] .* main .*thread_stack_array_left_oob.cc}}:[[@LINE-2]]
+// CHECK: {{#[01] .* main .*thread_stack_array_left_oob.cpp}}:[[@LINE-2]]
// A failure to create a thread should fail the test!
if (thr == 0) return 0;
diff --git a/test/asan/TestCases/Windows/thread_stack_array_right_oob.cc b/test/asan/TestCases/Windows/thread_stack_array_right_oob.cpp
index 939b984c5..eaae86936 100644
--- a/test/asan/TestCases/Windows/thread_stack_array_right_oob.cc
+++ b/test/asan/TestCases/Windows/thread_stack_array_right_oob.cpp
@@ -9,7 +9,7 @@ DWORD WINAPI thread_proc(void *) {
stack_buffer[subscript] = 42;
// CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T1
-// CHECK: {{#0 .* thread_proc.*thread_stack_array_right_oob.cc}}:[[@LINE-3]]
+// CHECK: {{#0 .* thread_proc.*thread_stack_array_right_oob.cpp}}:[[@LINE-3]]
// CHECK: Address [[ADDR]] is located in stack of thread T1 at offset {{.*}} in frame
// CHECK: thread_proc
return 0;
@@ -18,7 +18,7 @@ DWORD WINAPI thread_proc(void *) {
int main(void) {
HANDLE thr = CreateThread(NULL, 0, thread_proc, NULL, 0, NULL);
// CHECK: Thread T1 created by T0 here:
-// CHECK: {{#[01] .* main .*thread_stack_array_right_oob.cc}}:[[@LINE-2]]
+// CHECK: {{#[01] .* main .*thread_stack_array_right_oob.cpp}}:[[@LINE-2]]
// A failure to create a thread should fail the test!
if (thr == 0) return 0;
diff --git a/test/asan/TestCases/Windows/thread_stack_reuse.cc b/test/asan/TestCases/Windows/thread_stack_reuse.cpp
index e7b12ca2a..e7b12ca2a 100644
--- a/test/asan/TestCases/Windows/thread_stack_reuse.cc
+++ b/test/asan/TestCases/Windows/thread_stack_reuse.cpp
diff --git a/test/asan/TestCases/Windows/thread_stress.cc b/test/asan/TestCases/Windows/thread_stress.cpp
index e25cc6a3c..e25cc6a3c 100644
--- a/test/asan/TestCases/Windows/thread_stress.cc
+++ b/test/asan/TestCases/Windows/thread_stress.cpp
diff --git a/test/asan/TestCases/Windows/thread_suspended.cc b/test/asan/TestCases/Windows/thread_suspended.cpp
index b30cf1484..b30cf1484 100644
--- a/test/asan/TestCases/Windows/thread_suspended.cc
+++ b/test/asan/TestCases/Windows/thread_suspended.cpp
diff --git a/test/asan/TestCases/Windows/tls_init.cc b/test/asan/TestCases/Windows/tls_init.cpp
index a8569f802..a8569f802 100644
--- a/test/asan/TestCases/Windows/tls_init.cc
+++ b/test/asan/TestCases/Windows/tls_init.cpp
diff --git a/test/asan/TestCases/Windows/unsymbolized.cc b/test/asan/TestCases/Windows/unsymbolized.cpp
index 5854dc56d..2c4525801 100644
--- a/test/asan/TestCases/Windows/unsymbolized.cc
+++ b/test/asan/TestCases/Windows/unsymbolized.cpp
@@ -20,6 +20,6 @@ int do_uaf(void) {
free(x);
return x[5];
// CHECK: AddressSanitizer: heap-use-after-free
- // CHECK: #0 {{0x[a-f0-9]+ \(.*[\\/]unsymbolized.cc.*.exe\+(0x40|0x14000)[a-f0-9]{4}\)}}
- // CHECK: #1 {{0x[a-f0-9]+ \(.*[\\/]unsymbolized.cc.*.exe\+(0x40|0x14000)[a-f0-9]{4}\)}}
+ // CHECK: #0 {{0x[a-f0-9]+ \(.*[\\/]unsymbolized.cpp.*.exe\+(0x40|0x14000)[a-f0-9]{4}\)}}
+ // CHECK: #1 {{0x[a-f0-9]+ \(.*[\\/]unsymbolized.cpp.*.exe\+(0x40|0x14000)[a-f0-9]{4}\)}}
}
diff --git a/test/asan/TestCases/Windows/use_after_realloc.cc b/test/asan/TestCases/Windows/use_after_realloc.cpp
index c39f4cf06..ce116f9aa 100644
--- a/test/asan/TestCases/Windows/use_after_realloc.cc
+++ b/test/asan/TestCases/Windows/use_after_realloc.cpp
@@ -11,13 +11,13 @@ int main() {
stale[0] = 42;
// CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*use_after_realloc.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*use_after_realloc.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located 0 bytes inside of 32-byte region
// CHECK: freed by thread T0 here:
// CHECK-NEXT: {{#0 .* realloc }}
-// CHECK-NEXT: {{#1 .* main .*use_after_realloc.cc}}:[[@LINE-9]]
+// CHECK-NEXT: {{#1 .* main .*use_after_realloc.cpp}}:[[@LINE-9]]
// CHECK: previously allocated by thread T0 here:
// CHECK-NEXT: {{#0 .* realloc }}
-// CHECK-NEXT: {{#1 .* main .*use_after_realloc.cc}}:[[@LINE-14]]
+// CHECK-NEXT: {{#1 .* main .*use_after_realloc.cpp}}:[[@LINE-14]]
free(buffer);
}
diff --git a/test/asan/TestCases/Windows/use_after_return_linkage.cc b/test/asan/TestCases/Windows/use_after_return_linkage.cpp
index 48c5065a0..48c5065a0 100644
--- a/test/asan/TestCases/Windows/use_after_return_linkage.cc
+++ b/test/asan/TestCases/Windows/use_after_return_linkage.cpp
diff --git a/test/asan/TestCases/Windows/user-exception.cc b/test/asan/TestCases/Windows/user-exception.cpp
index ba14a8b23..ba14a8b23 100644
--- a/test/asan/TestCases/Windows/user-exception.cc
+++ b/test/asan/TestCases/Windows/user-exception.cpp
diff --git a/test/asan/TestCases/Windows/windows_h.cc b/test/asan/TestCases/Windows/windows_h.cpp
index f20edec0c..f20edec0c 100644
--- a/test/asan/TestCases/Windows/windows_h.cc
+++ b/test/asan/TestCases/Windows/windows_h.cpp
diff --git a/test/asan/TestCases/Windows/wrong_downcast_on_heap.cc b/test/asan/TestCases/Windows/wrong_downcast_on_heap.cpp
index a703d178d..b96270894 100644
--- a/test/asan/TestCases/Windows/wrong_downcast_on_heap.cc
+++ b/test/asan/TestCases/Windows/wrong_downcast_on_heap.cpp
@@ -17,7 +17,7 @@ int main(void) {
c->extra_field = 42;
// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 4 at [[ADDR]] thread T0
-// CHECK: {{#0 0x[0-9a-f]* in main .*wrong_downcast_on_heap.cc}}:[[@LINE-3]]
+// CHECK: {{#0 0x[0-9a-f]* in main .*wrong_downcast_on_heap.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located 0 bytes to the right of 4-byte region
// CHECK: allocated by thread T0 here:
// CHECK: #0 {{.*}} operator new
diff --git a/test/asan/TestCases/Windows/wrong_downcast_on_stack.cc b/test/asan/TestCases/Windows/wrong_downcast_on_stack.cpp
index 5e28eb639..267775e46 100644
--- a/test/asan/TestCases/Windows/wrong_downcast_on_stack.cc
+++ b/test/asan/TestCases/Windows/wrong_downcast_on_stack.cpp
@@ -17,7 +17,7 @@ int main(void) {
c->extra_field = 42;
// CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: WRITE of size 4 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 0x[0-9a-f]* in main .*wrong_downcast_on_stack.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 0x[0-9a-f]* in main .*wrong_downcast_on_stack.cpp}}:[[@LINE-3]]
// CHECK: [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:[0-9]+]] in frame
// CHECK-NEXT: {{#0 0x[0-9a-f]* in main }}
// CHECK: 'p'{{.*}} <== Memory access at offset [[OFFSET]] overflows this variable
diff --git a/test/asan/TestCases/alloca_big_alignment.cc b/test/asan/TestCases/alloca_big_alignment.cpp
index 0b49424bf..0b49424bf 100644
--- a/test/asan/TestCases/alloca_big_alignment.cc
+++ b/test/asan/TestCases/alloca_big_alignment.cpp
diff --git a/test/asan/TestCases/alloca_constant_size.cc b/test/asan/TestCases/alloca_constant_size.cpp
index 8910ea9f8..8910ea9f8 100644
--- a/test/asan/TestCases/alloca_constant_size.cc
+++ b/test/asan/TestCases/alloca_constant_size.cpp
diff --git a/test/asan/TestCases/alloca_detect_custom_size_.cc b/test/asan/TestCases/alloca_detect_custom_size_.cpp
index 271359bf7..271359bf7 100644
--- a/test/asan/TestCases/alloca_detect_custom_size_.cc
+++ b/test/asan/TestCases/alloca_detect_custom_size_.cpp
diff --git a/test/asan/TestCases/alloca_instruments_all_paddings.cc b/test/asan/TestCases/alloca_instruments_all_paddings.cpp
index 5bf6f80ac..5bf6f80ac 100644
--- a/test/asan/TestCases/alloca_instruments_all_paddings.cc
+++ b/test/asan/TestCases/alloca_instruments_all_paddings.cpp
diff --git a/test/asan/TestCases/alloca_loop_unpoisoning.cc b/test/asan/TestCases/alloca_loop_unpoisoning.cpp
index f9d32aafd..f9d32aafd 100644
--- a/test/asan/TestCases/alloca_loop_unpoisoning.cc
+++ b/test/asan/TestCases/alloca_loop_unpoisoning.cpp
diff --git a/test/asan/TestCases/alloca_overflow_partial.cc b/test/asan/TestCases/alloca_overflow_partial.cpp
index afac40ce6..afac40ce6 100644
--- a/test/asan/TestCases/alloca_overflow_partial.cc
+++ b/test/asan/TestCases/alloca_overflow_partial.cpp
diff --git a/test/asan/TestCases/alloca_overflow_right.cc b/test/asan/TestCases/alloca_overflow_right.cpp
index 615dd1485..615dd1485 100644
--- a/test/asan/TestCases/alloca_overflow_right.cc
+++ b/test/asan/TestCases/alloca_overflow_right.cpp
diff --git a/test/asan/TestCases/alloca_safe_access.cc b/test/asan/TestCases/alloca_safe_access.cpp
index 1cd0dada7..1cd0dada7 100644
--- a/test/asan/TestCases/alloca_safe_access.cc
+++ b/test/asan/TestCases/alloca_safe_access.cpp
diff --git a/test/asan/TestCases/alloca_underflow_left.cc b/test/asan/TestCases/alloca_underflow_left.cpp
index 8720e8cce..8720e8cce 100644
--- a/test/asan/TestCases/alloca_underflow_left.cc
+++ b/test/asan/TestCases/alloca_underflow_left.cpp
diff --git a/test/asan/TestCases/alloca_vla_interact.cc b/test/asan/TestCases/alloca_vla_interact.cpp
index 92b0afafc..92b0afafc 100644
--- a/test/asan/TestCases/alloca_vla_interact.cc
+++ b/test/asan/TestCases/alloca_vla_interact.cpp
diff --git a/test/asan/TestCases/asan_and_llvm_coverage_test.cc b/test/asan/TestCases/asan_and_llvm_coverage_test.cpp
index 2ba5a42d1..2ba5a42d1 100644
--- a/test/asan/TestCases/asan_and_llvm_coverage_test.cc
+++ b/test/asan/TestCases/asan_and_llvm_coverage_test.cpp
diff --git a/test/asan/TestCases/asan_options-help.cc b/test/asan/TestCases/asan_options-help.cpp
index 96a9cd98f..96a9cd98f 100644
--- a/test/asan/TestCases/asan_options-help.cc
+++ b/test/asan/TestCases/asan_options-help.cpp
diff --git a/test/asan/TestCases/atexit_stats.cc b/test/asan/TestCases/atexit_stats.cpp
index c8d97da52..c8d97da52 100644
--- a/test/asan/TestCases/atexit_stats.cc
+++ b/test/asan/TestCases/atexit_stats.cpp
diff --git a/test/asan/TestCases/blacklist.cc b/test/asan/TestCases/blacklist.cpp
index 7c31484c2..9508f6f4d 100644
--- a/test/asan/TestCases/blacklist.cc
+++ b/test/asan/TestCases/blacklist.cpp
@@ -2,15 +2,15 @@
// RUN: echo "fun:*brokenFunction*" > %tmp
// RUN: echo "global:*badGlobal*" >> %tmp
-// RUN: echo "src:*blacklist-extra.cc" >> %tmp
+// RUN: echo "src:*blacklist-extra.cpp" >> %tmp
// RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O0 %s -o %t \
-// RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1
+// RUN: %p/Helpers/blacklist-extra.cpp && %run %t 2>&1
// RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O1 %s -o %t \
-// RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1
+// RUN: %p/Helpers/blacklist-extra.cpp && %run %t 2>&1
// RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O2 %s -o %t \
-// RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1
+// RUN: %p/Helpers/blacklist-extra.cpp && %run %t 2>&1
// RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O3 %s -o %t \
-// RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1
+// RUN: %p/Helpers/blacklist-extra.cpp && %run %t 2>&1
// badGlobal is accessed improperly, but we blacklisted it. Align
// it to make sure memory past the end of badGlobal will be in
@@ -26,7 +26,7 @@ int brokenFunction(int argc) {
return x[argc * 10]; // BOOM
}
-// This function is defined in Helpers/blacklist-extra.cc, a source file which
+// This function is defined in Helpers/blacklist-extra.cpp, a source file which
// is blacklisted by name
int externalBrokenFunction(int x);
diff --git a/test/asan/TestCases/calloc-overflow.cc b/test/asan/TestCases/calloc-overflow.cpp
index 74582378f..9a0d41ff8 100644
--- a/test/asan/TestCases/calloc-overflow.cc
+++ b/test/asan/TestCases/calloc-overflow.cpp
@@ -11,7 +11,7 @@ int main() {
void *p = calloc(-1, 1000);
// CHECK: {{ERROR: AddressSanitizer: calloc parameters overflow: count \* size \(.* \* 1000\) cannot be represented in type size_t}}
// CHECK: {{#0 0x.* in .*calloc}}
- // CHECK: {{#1 0x.* in main .*calloc-overflow.cc:}}[[@LINE-3]]
+ // CHECK: {{#1 0x.* in main .*calloc-overflow.cpp:}}[[@LINE-3]]
// CHECK: SUMMARY: AddressSanitizer: calloc-overflow
printf("calloc returned: %zu\n", (size_t)p);
diff --git a/test/asan/TestCases/contiguous_container.cc b/test/asan/TestCases/contiguous_container.cpp
index 3f754562a..3f754562a 100644
--- a/test/asan/TestCases/contiguous_container.cc
+++ b/test/asan/TestCases/contiguous_container.cpp
diff --git a/test/asan/TestCases/contiguous_container_crash.cc b/test/asan/TestCases/contiguous_container_crash.cpp
index 2b555f901..2b555f901 100644
--- a/test/asan/TestCases/contiguous_container_crash.cc
+++ b/test/asan/TestCases/contiguous_container_crash.cpp
diff --git a/test/asan/TestCases/coverage-and-lsan.cc b/test/asan/TestCases/coverage-and-lsan.cpp
index 60851dabb..60851dabb 100644
--- a/test/asan/TestCases/coverage-and-lsan.cc
+++ b/test/asan/TestCases/coverage-and-lsan.cpp
diff --git a/test/asan/TestCases/coverage-disabled.cc b/test/asan/TestCases/coverage-disabled.cpp
index 46a822dff..46a822dff 100644
--- a/test/asan/TestCases/coverage-disabled.cc
+++ b/test/asan/TestCases/coverage-disabled.cpp
diff --git a/test/asan/TestCases/coverage-trace-pc.cc b/test/asan/TestCases/coverage-trace-pc.cpp
index c03a6f02f..c03a6f02f 100644
--- a/test/asan/TestCases/coverage-trace-pc.cc
+++ b/test/asan/TestCases/coverage-trace-pc.cpp
diff --git a/test/asan/TestCases/debug_double_free.cc b/test/asan/TestCases/debug_double_free.cpp
index 44c820b63..44c820b63 100644
--- a/test/asan/TestCases/debug_double_free.cc
+++ b/test/asan/TestCases/debug_double_free.cpp
diff --git a/test/asan/TestCases/debug_locate.cc b/test/asan/TestCases/debug_locate.cpp
index 5971a7727..5971a7727 100644
--- a/test/asan/TestCases/debug_locate.cc
+++ b/test/asan/TestCases/debug_locate.cpp
diff --git a/test/asan/TestCases/debug_mapping.cc b/test/asan/TestCases/debug_mapping.cpp
index 40083f028..40083f028 100644
--- a/test/asan/TestCases/debug_mapping.cc
+++ b/test/asan/TestCases/debug_mapping.cpp
diff --git a/test/asan/TestCases/debug_ppc64_mapping.cc b/test/asan/TestCases/debug_ppc64_mapping.cpp
index a67804023..a67804023 100644
--- a/test/asan/TestCases/debug_ppc64_mapping.cc
+++ b/test/asan/TestCases/debug_ppc64_mapping.cpp
diff --git a/test/asan/TestCases/debug_report.cc b/test/asan/TestCases/debug_report.cpp
index 14bb70e9f..14bb70e9f 100644
--- a/test/asan/TestCases/debug_report.cc
+++ b/test/asan/TestCases/debug_report.cpp
diff --git a/test/asan/TestCases/debug_stacks.cc b/test/asan/TestCases/debug_stacks.cpp
index 7c320bfcb..7c320bfcb 100644
--- a/test/asan/TestCases/debug_stacks.cc
+++ b/test/asan/TestCases/debug_stacks.cpp
diff --git a/test/asan/TestCases/deep_stack_uaf.cc b/test/asan/TestCases/deep_stack_uaf.cpp
index bdf0dbdb4..bdf0dbdb4 100644
--- a/test/asan/TestCases/deep_stack_uaf.cc
+++ b/test/asan/TestCases/deep_stack_uaf.cpp
diff --git a/test/asan/TestCases/deep_tail_call.cc b/test/asan/TestCases/deep_tail_call.cpp
index 628ef06db..628ef06db 100644
--- a/test/asan/TestCases/deep_tail_call.cc
+++ b/test/asan/TestCases/deep_tail_call.cpp
diff --git a/test/asan/TestCases/default_blacklist.cc b/test/asan/TestCases/default_blacklist.cpp
index 84c0438f3..84c0438f3 100644
--- a/test/asan/TestCases/default_blacklist.cc
+++ b/test/asan/TestCases/default_blacklist.cpp
diff --git a/test/asan/TestCases/default_options.cc b/test/asan/TestCases/default_options.cpp
index 27af76d7f..27af76d7f 100644
--- a/test/asan/TestCases/default_options.cc
+++ b/test/asan/TestCases/default_options.cpp
diff --git a/test/asan/TestCases/describe_address.cc b/test/asan/TestCases/describe_address.cpp
index 868c0eb1c..868c0eb1c 100644
--- a/test/asan/TestCases/describe_address.cc
+++ b/test/asan/TestCases/describe_address.cpp
diff --git a/test/asan/TestCases/double-free.cc b/test/asan/TestCases/double-free.cpp
index 2a26b23fb..b01e41005 100644
--- a/test/asan/TestCases/double-free.cc
+++ b/test/asan/TestCases/double-free.cpp
@@ -19,12 +19,12 @@ int main(int argc, char **argv) {
free(x + argc - 1); // BOOM
// CHECK: AddressSanitizer: attempting double-free{{.*}}in thread T0
// CHECK: #0 0x{{.*}} in {{.*}}free
- // CHECK: #1 0x{{.*}} in main {{.*}}double-free.cc:[[@LINE-3]]
+ // CHECK: #1 0x{{.*}} in main {{.*}}double-free.cpp:[[@LINE-3]]
// CHECK: freed by thread T0 here:
// MALLOC-CTX: #0 0x{{.*}} in {{.*}}free
- // MALLOC-CTX: #1 0x{{.*}} in main {{.*}}double-free.cc:[[@LINE-7]]
+ // MALLOC-CTX: #1 0x{{.*}} in main {{.*}}double-free.cpp:[[@LINE-7]]
// CHECK: allocated by thread T0 here:
- // MALLOC-CTX: double-free.cc:[[@LINE-12]]
+ // MALLOC-CTX: double-free.cpp:[[@LINE-12]]
// CHECK-RECOVER: AddressSanitizer: attempting double-free{{.*}}in thread T0
// CHECK-RECOVER-NOT: AddressSanitizer CHECK failed:
return res;
diff --git a/test/asan/TestCases/error_report_callback.cc b/test/asan/TestCases/error_report_callback.cpp
index 8c5bbe418..8c5bbe418 100644
--- a/test/asan/TestCases/error_report_callback.cc
+++ b/test/asan/TestCases/error_report_callback.cpp
diff --git a/test/asan/TestCases/exitcode.cc b/test/asan/TestCases/exitcode.cpp
index cb1054099..cb1054099 100644
--- a/test/asan/TestCases/exitcode.cc
+++ b/test/asan/TestCases/exitcode.cpp
diff --git a/test/asan/TestCases/force_inline_opt0.cc b/test/asan/TestCases/force_inline_opt0.cpp
index e6e5d26c7..e6e5d26c7 100644
--- a/test/asan/TestCases/force_inline_opt0.cc
+++ b/test/asan/TestCases/force_inline_opt0.cpp
diff --git a/test/asan/TestCases/frexp_interceptor.cc b/test/asan/TestCases/frexp_interceptor.cpp
index d75ba992b..d75ba992b 100644
--- a/test/asan/TestCases/frexp_interceptor.cc
+++ b/test/asan/TestCases/frexp_interceptor.cpp
diff --git a/test/asan/TestCases/global-demangle.cc b/test/asan/TestCases/global-demangle.cpp
index 5f7ff91b1..5f7ff91b1 100644
--- a/test/asan/TestCases/global-demangle.cc
+++ b/test/asan/TestCases/global-demangle.cpp
diff --git a/test/asan/TestCases/global-location.cc b/test/asan/TestCases/global-location.cpp
index 795e50bf6..42711f97c 100644
--- a/test/asan/TestCases/global-location.cc
+++ b/test/asan/TestCases/global-location.cpp
@@ -13,9 +13,9 @@ struct C {
};
int global[10];
-// GLOB: 0x{{.*}} is located 4 bytes to the right of global variable 'global' defined in '{{.*}}global-location.cc:[[@LINE-1]]:5' {{.*}} of size 40
+// GLOB: 0x{{.*}} is located 4 bytes to the right of global variable 'global' defined in '{{.*}}global-location.cpp:[[@LINE-1]]:5' {{.*}} of size 40
int C::array[10];
-// CLASS_STATIC: 0x{{.*}} is located 4 bytes to the right of global variable 'C::array' defined in '{{.*}}global-location.cc:[[@LINE-1]]:8' {{.*}} of size 40
+// CLASS_STATIC: 0x{{.*}} is located 4 bytes to the right of global variable 'C::array' defined in '{{.*}}global-location.cpp:[[@LINE-1]]:8' {{.*}} of size 40
int main(int argc, char **argv) {
int one = argc - 1;
@@ -24,12 +24,12 @@ int main(int argc, char **argv) {
case 'c': return C::array[one * 11];
case 'f':
static int array[10];
- // FUNC_STATIC: 0x{{.*}} is located 4 bytes to the right of global variable 'array' defined in '{{.*}}global-location.cc:[[@LINE-1]]:16' {{.*}} of size 40
+ // FUNC_STATIC: 0x{{.*}} is located 4 bytes to the right of global variable 'array' defined in '{{.*}}global-location.cpp:[[@LINE-1]]:16' {{.*}} of size 40
memset(array, 0, 10);
return array[one * 11];
case 'l':
const char *str = "0123456789";
- // LITERAL: 0x{{.*}} is located 0 bytes to the right of global variable {{.*}} defined in '{{.*}}global-location.cc:[[@LINE-1]]:23' {{.*}} of size 11
+ // LITERAL: 0x{{.*}} is located 0 bytes to the right of global variable {{.*}} defined in '{{.*}}global-location.cpp:[[@LINE-1]]:23' {{.*}} of size 11
return str[one * 11];
}
return 0;
diff --git a/test/asan/TestCases/global-overflow.cc b/test/asan/TestCases/global-overflow.cpp
index a39a95306..d0aab2ade 100644
--- a/test/asan/TestCases/global-overflow.cc
+++ b/test/asan/TestCases/global-overflow.cpp
@@ -13,7 +13,7 @@ int main(int argc, char **argv) {
memset(ZZZ, 0, 10);
int res = YYY[argc * 10]; // BOOOM
// CHECK: {{READ of size 1 at 0x.* thread T0}}
- // CHECK: {{ #0 0x.* in main .*global-overflow.cc:}}[[@LINE-2]]
+ // CHECK: {{ #0 0x.* in main .*global-overflow.cpp:}}[[@LINE-2]]
// CHECK: {{0x.* is located 0 bytes to the right of global variable}}
// CHECK: {{.*YYY.* of size 10}}
res += XXX[argc] + ZZZ[argc];
diff --git a/test/asan/TestCases/global-underflow.cc b/test/asan/TestCases/global-underflow.cc
deleted file mode 100644
index 4a0351356..000000000
--- a/test/asan/TestCases/global-underflow.cc
+++ /dev/null
@@ -1,17 +0,0 @@
-// RUN: %clangxx_asan -O0 %s %p/Helpers/underflow.cc -o %t && not %run %t 2>&1 | FileCheck %s
-// RUN: %clangxx_asan -O1 %s %p/Helpers/underflow.cc -o %t && not %run %t 2>&1 | FileCheck %s
-// RUN: %clangxx_asan -O2 %s %p/Helpers/underflow.cc -o %t && not %run %t 2>&1 | FileCheck %s
-// RUN: %clangxx_asan -O3 %s %p/Helpers/underflow.cc -o %t && not %run %t 2>&1 | FileCheck %s
-
-int XXX[2] = {2, 3};
-extern int YYY[];
-#include <string.h>
-int main(int argc, char **argv) {
- memset(XXX, 0, 2*sizeof(int));
- // CHECK: {{READ of size 4 at 0x.* thread T0}}
- // CHECK: {{ #0 0x.* in main .*global-underflow.cc:}}[[@LINE+3]]
- // CHECK: {{0x.* is located 4 bytes to the left of global variable}}
- // CHECK: {{.*YYY.* of size 12}}
- int res = YYY[-1];
- return res;
-}
diff --git a/test/asan/TestCases/global-underflow.cpp b/test/asan/TestCases/global-underflow.cpp
new file mode 100644
index 000000000..81aac5897
--- /dev/null
+++ b/test/asan/TestCases/global-underflow.cpp
@@ -0,0 +1,17 @@
+// RUN: %clangxx_asan -O0 %s %p/Helpers/underflow.cpp -o %t && not %run %t 2>&1 | FileCheck %s
+// RUN: %clangxx_asan -O1 %s %p/Helpers/underflow.cpp -o %t && not %run %t 2>&1 | FileCheck %s
+// RUN: %clangxx_asan -O2 %s %p/Helpers/underflow.cpp -o %t && not %run %t 2>&1 | FileCheck %s
+// RUN: %clangxx_asan -O3 %s %p/Helpers/underflow.cpp -o %t && not %run %t 2>&1 | FileCheck %s
+
+int XXX[2] = {2, 3};
+extern int YYY[];
+#include <string.h>
+int main(int argc, char **argv) {
+ memset(XXX, 0, 2*sizeof(int));
+ // CHECK: {{READ of size 4 at 0x.* thread T0}}
+ // CHECK: {{ #0 0x.* in main .*global-underflow.cpp:}}[[@LINE+3]]
+ // CHECK: {{0x.* is located 4 bytes to the left of global variable}}
+ // CHECK: {{.*YYY.* of size 12}}
+ int res = YYY[-1];
+ return res;
+}
diff --git a/test/asan/TestCases/handle_noreturn_bug.cc b/test/asan/TestCases/handle_noreturn_bug.cpp
index 8c3c66a42..8c3c66a42 100644
--- a/test/asan/TestCases/handle_noreturn_bug.cc
+++ b/test/asan/TestCases/handle_noreturn_bug.cpp
diff --git a/test/asan/TestCases/heap-overflow-large.cc b/test/asan/TestCases/heap-overflow-large.cpp
index 566b1158a..566b1158a 100644
--- a/test/asan/TestCases/heap-overflow-large.cc
+++ b/test/asan/TestCases/heap-overflow-large.cpp
diff --git a/test/asan/TestCases/heap-overflow.cc b/test/asan/TestCases/heap-overflow.cpp
index 3ddb243b3..a9b62d874 100644
--- a/test/asan/TestCases/heap-overflow.cc
+++ b/test/asan/TestCases/heap-overflow.cpp
@@ -14,7 +14,7 @@ int main(int argc, char **argv) {
memset(x, 0, 10);
int res = x[argc * 10]; // BOOOM
// CHECK: {{READ of size 1 at 0x.* thread T0}}
- // CHECK: {{ #0 0x.* in main .*heap-overflow.cc:}}[[@LINE-2]]
+ // CHECK: {{ #0 0x.* in main .*heap-overflow.cpp:}}[[@LINE-2]]
// CHECK: {{0x.* is located 0 bytes to the right of 10-byte region}}
// CHECK: {{allocated by thread T0 here:}}
diff --git a/test/asan/TestCases/heavy_uar_test.cc b/test/asan/TestCases/heavy_uar_test.cpp
index 29a1d1965..a203174e0 100644
--- a/test/asan/TestCases/heavy_uar_test.cc
+++ b/test/asan/TestCases/heavy_uar_test.cpp
@@ -64,7 +64,7 @@ int main(int argc, char **argv) {
stale_stack[100]++;
// CHECK: ERROR: AddressSanitizer: stack-use-after-return on address
// CHECK: is located in stack of thread T0 at offset {{116|132}} in frame
- // CHECK: in LeakStack{{.*}}heavy_uar_test.cc:
+ // CHECK: in LeakStack{{.*}}heavy_uar_test.cpp:
// CHECK: [{{16|32}}, {{1040|1056}}) 'x'
return 0;
}
diff --git a/test/asan/TestCases/huge_negative_hea_oob.cc b/test/asan/TestCases/huge_negative_hea_oob.cpp
index 96e7e613d..96e7e613d 100644
--- a/test/asan/TestCases/huge_negative_hea_oob.cc
+++ b/test/asan/TestCases/huge_negative_hea_oob.cpp
diff --git a/test/asan/TestCases/ill.cc b/test/asan/TestCases/ill.cpp
index d7b535091..d7b535091 100644
--- a/test/asan/TestCases/ill.cc
+++ b/test/asan/TestCases/ill.cpp
diff --git a/test/asan/TestCases/init-order-atexit.cc b/test/asan/TestCases/init-order-atexit.cpp
index 021b2bd39..57bddd463 100644
--- a/test/asan/TestCases/init-order-atexit.cc
+++ b/test/asan/TestCases/init-order-atexit.cpp
@@ -4,7 +4,7 @@
// (3) destructor of A reads uninitialized global C from another module.
// We do *not* want to report init-order bug in this case.
-// RUN: %clangxx_asan -O0 %s %p/Helpers/init-order-atexit-extra.cc -o %t
+// RUN: %clangxx_asan -O0 %s %p/Helpers/init-order-atexit-extra.cpp -o %t
// RUN: %env_asan_opts=strict_init_order=true not %run %t 2>&1 | FileCheck %s
#include <stdio.h>
diff --git a/test/asan/TestCases/initialization-blacklist.cc b/test/asan/TestCases/initialization-blacklist.cpp
index 3a98fc63e..f0b86e57a 100644
--- a/test/asan/TestCases/initialization-blacklist.cc
+++ b/test/asan/TestCases/initialization-blacklist.cpp
@@ -1,15 +1,15 @@
// Test for blacklist functionality of initialization-order checker.
-// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-blacklist-extra.cc\
-// RUN: %p/Helpers/initialization-blacklist-extra2.cc \
+// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-blacklist-extra.cpp\
+// RUN: %p/Helpers/initialization-blacklist-extra2.cpp \
// RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t
// RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
-// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-blacklist-extra.cc\
-// RUN: %p/Helpers/initialization-blacklist-extra2.cc \
+// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-blacklist-extra.cpp\
+// RUN: %p/Helpers/initialization-blacklist-extra2.cpp \
// RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t
// RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
-// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-blacklist-extra.cc\
-// RUN: %p/Helpers/initialization-blacklist-extra2.cc \
+// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-blacklist-extra.cpp\
+// RUN: %p/Helpers/initialization-blacklist-extra2.cpp \
// RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t
// RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
diff --git a/test/asan/TestCases/initialization-bug.cc b/test/asan/TestCases/initialization-bug.cpp
index 20fdbfe5f..bcf0715c3 100644
--- a/test/asan/TestCases/initialization-bug.cc
+++ b/test/asan/TestCases/initialization-bug.cpp
@@ -1,6 +1,6 @@
// Test to make sure basic initialization order errors are caught.
-// RUN: %clangxx_asan %macos_min_target_10_11 -O0 %s %p/Helpers/initialization-bug-extra2.cc -o %t-INIT-ORDER-EXE
+// RUN: %clangxx_asan %macos_min_target_10_11 -O0 %s %p/Helpers/initialization-bug-extra2.cpp -o %t-INIT-ORDER-EXE
// RUN: %env_asan_opts=check_initialization_order=true not %run %t-INIT-ORDER-EXE 2>&1 | FileCheck %s
// Do not test with optimization -- the error may be optimized away.
diff --git a/test/asan/TestCases/initialization-constexpr.cc b/test/asan/TestCases/initialization-constexpr.cpp
index 53619ea81..d92006529 100644
--- a/test/asan/TestCases/initialization-constexpr.cc
+++ b/test/asan/TestCases/initialization-constexpr.cpp
@@ -4,13 +4,13 @@
// constructor implies that it was initialized during constant initialization,
// not dynamic initialization).
-// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-constexpr-extra.cc --std=c++11 -o %t
+// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-constexpr-extra.cpp --std=c++11 -o %t
// RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
-// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-constexpr-extra.cc --std=c++11 -o %t
+// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-constexpr-extra.cpp --std=c++11 -o %t
// RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
-// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-constexpr-extra.cc --std=c++11 -o %t
+// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-constexpr-extra.cpp --std=c++11 -o %t
// RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
-// RUN: %clangxx_asan -O3 %s %p/Helpers/initialization-constexpr-extra.cc --std=c++11 -o %t
+// RUN: %clangxx_asan -O3 %s %p/Helpers/initialization-constexpr-extra.cpp --std=c++11 -o %t
// RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
class Integer {
diff --git a/test/asan/TestCases/initialization-nobug.cc b/test/asan/TestCases/initialization-nobug.cpp
index 783c7894d..d4dc85514 100644
--- a/test/asan/TestCases/initialization-nobug.cc
+++ b/test/asan/TestCases/initialization-nobug.cpp
@@ -1,13 +1,13 @@
// A collection of various initializers which shouldn't trip up initialization
// order checking. If successful, this will just return 0.
-// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-nobug-extra.cc -o %t
+// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-nobug-extra.cpp -o %t
// RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
-// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-nobug-extra.cc -o %t
+// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-nobug-extra.cpp -o %t
// RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
-// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-nobug-extra.cc -o %t
+// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-nobug-extra.cpp -o %t
// RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
-// RUN: %clangxx_asan -O3 %s %p/Helpers/initialization-nobug-extra.cc -o %t
+// RUN: %clangxx_asan -O3 %s %p/Helpers/initialization-nobug-extra.cpp -o %t
// RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
// Simple access:
diff --git a/test/asan/TestCases/inline.cc b/test/asan/TestCases/inline.cpp
index daeb7b49e..daeb7b49e 100644
--- a/test/asan/TestCases/inline.cc
+++ b/test/asan/TestCases/inline.cpp
diff --git a/test/asan/TestCases/intercept-rethrow-exception.cc b/test/asan/TestCases/intercept-rethrow-exception.cpp
index c3944d6d5..c3944d6d5 100644
--- a/test/asan/TestCases/intercept-rethrow-exception.cc
+++ b/test/asan/TestCases/intercept-rethrow-exception.cpp
diff --git a/test/asan/TestCases/interception_failure_test.cc b/test/asan/TestCases/interception_failure_test.cpp
index 4f6698e3a..4f6698e3a 100644
--- a/test/asan/TestCases/interception_failure_test.cc
+++ b/test/asan/TestCases/interception_failure_test.cpp
diff --git a/test/asan/TestCases/interface_test.cc b/test/asan/TestCases/interface_test.cpp
index 9419f07e9..9419f07e9 100644
--- a/test/asan/TestCases/interface_test.cc
+++ b/test/asan/TestCases/interface_test.cpp
diff --git a/test/asan/TestCases/intra-object-overflow.cc b/test/asan/TestCases/intra-object-overflow.cpp
index b71e951bb..17bf35dfe 100644
--- a/test/asan/TestCases/intra-object-overflow.cc
+++ b/test/asan/TestCases/intra-object-overflow.cpp
@@ -16,7 +16,7 @@ class Foo {
}
void set(int i, int val) { a[i] = val; }
// CHECK: ERROR: AddressSanitizer: intra-object-overflow
-// CHECK: #0 {{.*}}Foo::set{{.*}}intra-object-overflow.cc:[[@LINE-2]]
+// CHECK: #0 {{.*}}Foo::set{{.*}}intra-object-overflow.cpp:[[@LINE-2]]
private:
int pre1, pre2;
int a[11];
@@ -27,7 +27,7 @@ int main(int argc, char **argv) {
int idx = argc == 2 ? atoi(argv[1]) : 0;
Foo *foo = new Foo;
foo->set(idx, 42);
-// CHECK: #1 {{.*}}main{{.*}}intra-object-overflow.cc:[[@LINE-1]]
+// CHECK: #1 {{.*}}main{{.*}}intra-object-overflow.cpp:[[@LINE-1]]
// CHECK: is located 84 bytes inside of 128-byte region
delete foo;
}
diff --git a/test/asan/TestCases/invalid-free.cc b/test/asan/TestCases/invalid-free.cpp
index be45e438b..f550dc14a 100644
--- a/test/asan/TestCases/invalid-free.cc
+++ b/test/asan/TestCases/invalid-free.cpp
@@ -14,9 +14,9 @@ int main(int argc, char **argv) {
int res = x[argc];
free(x + 5); // BOOM
// CHECK: AddressSanitizer: attempting free on address{{.*}}in thread T0
- // CHECK: invalid-free.cc:[[@LINE-2]]
+ // CHECK: invalid-free.cpp:[[@LINE-2]]
// CHECK: is located 5 bytes inside of 10-byte region
// CHECK: allocated by thread T0 here:
- // MALLOC-CTX: invalid-free.cc:[[@LINE-8]]
+ // MALLOC-CTX: invalid-free.cpp:[[@LINE-8]]
return res;
}
diff --git a/test/asan/TestCases/invalid-pointer-pairs-compare-errors.cc b/test/asan/TestCases/invalid-pointer-pairs-compare-errors.cpp
index 0690d40d2..7b1479e2d 100644
--- a/test/asan/TestCases/invalid-pointer-pairs-compare-errors.cc
+++ b/test/asan/TestCases/invalid-pointer-pairs-compare-errors.cpp
@@ -23,82 +23,82 @@ int main() {
char *heap2 = (char *)malloc(42);
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
foo(heap1, heap2);
free(heap1);
free(heap2);
heap1 = (char *)malloc(1024);
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
foo(heap1, heap1 + 1025);
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
foo(heap1 + 1024, heap1 + 1025);
free(heap1);
heap1 = (char *)malloc(4096);
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
foo(heap1, heap1 + 4097);
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
foo(heap1, 0);
// Global variables.
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
foo(&global1[0], &global2[10]);
char *p = &small_global[0];
foo(p, p); // OK
foo(p, p + 7); // OK
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
foo(p, p + 8);
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
foo(p - 1, p);
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
foo(p, p - 1);
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
foo(p - 1, p + 8);
p = &large_global[0];
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
foo(p - 1, p);
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
foo(p, p - 1);
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
foo(p, &global1[0]);
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
foo(p, &small_global[0]);
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
foo(p, 0);
// Stack variables.
char stack1, stack2;
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
foo(&stack1, &stack2);
// Mixtures.
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
foo(heap1, &stack1);
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
foo(heap1, &global1[0]);
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
foo(&stack1, &global1[0]);
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
foo(&stack1, 0);
free(heap1);
diff --git a/test/asan/TestCases/invalid-pointer-pairs-compare-null.cc b/test/asan/TestCases/invalid-pointer-pairs-compare-null.cpp
index 9f7f7b6f4..9f7f7b6f4 100644
--- a/test/asan/TestCases/invalid-pointer-pairs-compare-null.cc
+++ b/test/asan/TestCases/invalid-pointer-pairs-compare-null.cpp
diff --git a/test/asan/TestCases/invalid-pointer-pairs-compare-success.cc b/test/asan/TestCases/invalid-pointer-pairs-compare-success.cpp
index d0d92265f..d0d92265f 100644
--- a/test/asan/TestCases/invalid-pointer-pairs-compare-success.cc
+++ b/test/asan/TestCases/invalid-pointer-pairs-compare-success.cpp
diff --git a/test/asan/TestCases/invalid-pointer-pairs-subtract-errors.cc b/test/asan/TestCases/invalid-pointer-pairs-subtract-errors.cpp
index 20aaebeb4..535833d05 100644
--- a/test/asan/TestCases/invalid-pointer-pairs-subtract-errors.cc
+++ b/test/asan/TestCases/invalid-pointer-pairs-subtract-errors.cpp
@@ -17,29 +17,29 @@ int main() {
char *heap2 = (char *)malloc(42);
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cpp:[[@LINE+1]]
foo(heap1, heap2);
// Global variables.
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cpp:[[@LINE+1]]
foo(&global1[0], &global2[10]);
// Stack variables.
char stack1, stack2;
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cpp:[[@LINE+1]]
foo(&stack1, &stack2);
// Mixtures.
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cpp:[[@LINE+1]]
foo(heap1, &stack1);
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cpp:[[@LINE+1]]
foo(heap1, &global1[0]);
// CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
- // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cc:[[@LINE+1]]
+ // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cpp:[[@LINE+1]]
foo(&stack1, &global1[0]);
free(heap1);
diff --git a/test/asan/TestCases/invalid-pointer-pairs-subtract-success.cc b/test/asan/TestCases/invalid-pointer-pairs-subtract-success.cpp
index 7ea120ed5..7ea120ed5 100644
--- a/test/asan/TestCases/invalid-pointer-pairs-subtract-success.cc
+++ b/test/asan/TestCases/invalid-pointer-pairs-subtract-success.cpp
diff --git a/test/asan/TestCases/invalid-pointer-pairs.cc b/test/asan/TestCases/invalid-pointer-pairs.cpp
index e1df151d1..8e57bdc0c 100644
--- a/test/asan/TestCases/invalid-pointer-pairs.cc
+++ b/test/asan/TestCases/invalid-pointer-pairs.cpp
@@ -13,10 +13,10 @@ int f(char c, char *p, char *q) {
// [[PTR1:0x[0-9a-f]+]] [[PTR2:0x[0-9a-f]+]]
switch (c) {
case 'g':
- // CMP: #{{[0-9]+ .*}} in f({{char, char\*, char\*|char,char \*,char \*}}) {{.*}}invalid-pointer-pairs.cc:[[@LINE+1]]
+ // CMP: #{{[0-9]+ .*}} in f({{char, char\*, char\*|char,char \*,char \*}}) {{.*}}invalid-pointer-pairs.cpp:[[@LINE+1]]
return p > q;
case 's':
- // SUB: #{{[0-9]+ .*}} in f({{char, char\*, char\*|char,char \*,char \*}}) {{.*}}invalid-pointer-pairs.cc:[[@LINE+1]]
+ // SUB: #{{[0-9]+ .*}} in f({{char, char\*, char\*|char,char \*,char \*}}) {{.*}}invalid-pointer-pairs.cpp:[[@LINE+1]]
return p - q;
case 'k': {
// OK-NOT: ERROR
@@ -26,7 +26,7 @@ int f(char c, char *p, char *q) {
case 'f': {
char *p3 = p + 20;
free(p);
- // FREE: #{{[0-9]+ .*}} in f({{char, char\*, char\*|char,char \*,char \*}}) {{.*}}invalid-pointer-pairs.cc:[[@LINE+2]]
+ // FREE: #{{[0-9]+ .*}} in f({{char, char\*, char\*|char,char \*,char \*}}) {{.*}}invalid-pointer-pairs.cpp:[[@LINE+2]]
// FREE: freed by thread
return p < p3;
}
diff --git a/test/asan/TestCases/large_func_test.cc b/test/asan/TestCases/large_func_test.cpp
index 1f5f7ccd5..776e19393 100644
--- a/test/asan/TestCases/large_func_test.cc
+++ b/test/asan/TestCases/large_func_test.cpp
@@ -24,8 +24,8 @@ static void LargeFunction(int *x, int zero) {
x[zero + 103]++; // we should report this exact line
// atos incorrectly extracts the symbol name for the static functions on
// Darwin.
- // CHECK-Linux: {{#0 0x.* in LargeFunction.*large_func_test.cc:}}[[@LINE-3]]
- // CHECK-Darwin: {{#0 0x.* in .*LargeFunction.*large_func_test.cc}}:[[@LINE-4]]
+ // CHECK-Linux: {{#0 0x.* in LargeFunction.*large_func_test.cpp:}}[[@LINE-3]]
+ // CHECK-Darwin: {{#0 0x.* in .*LargeFunction.*large_func_test.cpp}}:[[@LINE-4]]
x[10]++;
x[11]++;
@@ -42,11 +42,11 @@ static void LargeFunction(int *x, int zero) {
int main(int argc, char **argv) {
int *x = new int[100];
LargeFunction(x, argc - 1);
- // CHECK: {{ #1 0x.* in main .*large_func_test.cc:}}[[@LINE-1]]
+ // CHECK: {{ #1 0x.* in main .*large_func_test.cpp:}}[[@LINE-1]]
// CHECK: {{0x.* is located 12 bytes to the right of 400-byte region}}
// CHECK: {{allocated by thread T0 here:}}
// CHECK-Linux: {{ #0 0x.* in operator new.*}}
// CHECK-Darwin: {{ #0 0x.* in .*_Zna.*}}
- // CHECK: {{ #1 0x.* in main .*large_func_test.cc:}}[[@LINE-7]]
+ // CHECK: {{ #1 0x.* in main .*large_func_test.cpp:}}[[@LINE-7]]
delete[] x;
}
diff --git a/test/asan/TestCases/log-path_test.cc b/test/asan/TestCases/log-path_test.cpp
index fd33a31d6..fd33a31d6 100644
--- a/test/asan/TestCases/log-path_test.cc
+++ b/test/asan/TestCases/log-path_test.cpp
diff --git a/test/asan/TestCases/longjmp.cc b/test/asan/TestCases/longjmp.cpp
index 8e9f2ae19..8e9f2ae19 100644
--- a/test/asan/TestCases/longjmp.cc
+++ b/test/asan/TestCases/longjmp.cpp
diff --git a/test/asan/TestCases/lsan_annotations.cc b/test/asan/TestCases/lsan_annotations.cpp
index f52b0ff66..f52b0ff66 100644
--- a/test/asan/TestCases/lsan_annotations.cc
+++ b/test/asan/TestCases/lsan_annotations.cpp
diff --git a/test/asan/TestCases/malloc-size-too-big.cc b/test/asan/TestCases/malloc-size-too-big.cpp
index f41b7ef75..71d6a3e71 100644
--- a/test/asan/TestCases/malloc-size-too-big.cc
+++ b/test/asan/TestCases/malloc-size-too-big.cpp
@@ -18,7 +18,7 @@ int main() {
void *p = malloc(kMaxAllowedMallocSizePlusOne);
// CHECK: {{ERROR: AddressSanitizer: requested allocation size .* \(.* after adjustments for alignment, red zones etc\.\) exceeds maximum supported size}}
// CHECK: {{#0 0x.* in .*malloc}}
- // CHECK: {{#1 0x.* in main .*malloc-size-too-big.cc:}}[[@LINE-3]]
+ // CHECK: {{#1 0x.* in main .*malloc-size-too-big.cpp:}}[[@LINE-3]]
// CHECK: SUMMARY: AddressSanitizer: allocation-size-too-big
printf("malloc returned: %zu\n", (size_t)p);
diff --git a/test/asan/TestCases/malloc_context_size.cc b/test/asan/TestCases/malloc_context_size.cpp
index c753a3a5d..65ef2781c 100644
--- a/test/asan/TestCases/malloc_context_size.cc
+++ b/test/asan/TestCases/malloc_context_size.cpp
@@ -22,6 +22,6 @@ int main() {
// TWO: previously allocated by thread T{{.*}} here:
// TWO-NEXT: #0 0x{{.*}}
- // TWO-NEXT: #1 0x{{.*}} in main {{.*}}malloc_context_size.cc
+ // TWO-NEXT: #1 0x{{.*}} in main {{.*}}malloc_context_size.cpp
// TWO: SUMMARY: AddressSanitizer: heap-use-after-free
}
diff --git a/test/asan/TestCases/malloc_fill.cc b/test/asan/TestCases/malloc_fill.cpp
index c897bbbc8..c897bbbc8 100644
--- a/test/asan/TestCases/malloc_fill.cc
+++ b/test/asan/TestCases/malloc_fill.cpp
diff --git a/test/asan/TestCases/max_redzone.cc b/test/asan/TestCases/max_redzone.cpp
index 99c886d1e..99c886d1e 100644
--- a/test/asan/TestCases/max_redzone.cc
+++ b/test/asan/TestCases/max_redzone.cpp
diff --git a/test/asan/TestCases/memcmp_strict_test.cc b/test/asan/TestCases/memcmp_strict_test.cpp
index 61ffe8b03..61ffe8b03 100644
--- a/test/asan/TestCases/memcmp_strict_test.cc
+++ b/test/asan/TestCases/memcmp_strict_test.cpp
diff --git a/test/asan/TestCases/memcmp_test.cc b/test/asan/TestCases/memcmp_test.cpp
index e666b6d16..e666b6d16 100644
--- a/test/asan/TestCases/memcmp_test.cc
+++ b/test/asan/TestCases/memcmp_test.cpp
diff --git a/test/asan/TestCases/memset_test.cc b/test/asan/TestCases/memset_test.cpp
index 0530c8483..0530c8483 100644
--- a/test/asan/TestCases/memset_test.cc
+++ b/test/asan/TestCases/memset_test.cpp
diff --git a/test/asan/TestCases/null_deref.cc b/test/asan/TestCases/null_deref.cpp
index 222c526fd..a8947a437 100644
--- a/test/asan/TestCases/null_deref.cc
+++ b/test/asan/TestCases/null_deref.cpp
@@ -15,10 +15,10 @@ void NullDeref(int *ptr) {
ptr[10]++; // BOOM
// atos on Mac cannot extract the symbol name correctly. Also, on FreeBSD 9.2
// the demangling function rejects local names with 'L' in front of them.
- // CHECK: {{ #0 0x.* in .*NullDeref.*null_deref.cc}}
+ // CHECK: {{ #0 0x.* in .*NullDeref.*null_deref.cpp}}
}
int main() {
NullDeref((int*)0);
- // CHECK: {{ #1 0x.* in main.*null_deref.cc}}
+ // CHECK: {{ #1 0x.* in main.*null_deref.cpp}}
// CHECK: AddressSanitizer can not provide additional info.
}
diff --git a/test/asan/TestCases/on_error_callback.cc b/test/asan/TestCases/on_error_callback.cpp
index f37d1eb7f..f37d1eb7f 100644
--- a/test/asan/TestCases/on_error_callback.cc
+++ b/test/asan/TestCases/on_error_callback.cpp
diff --git a/test/asan/TestCases/partial_right.cc b/test/asan/TestCases/partial_right.cpp
index b60c1a597..b60c1a597 100644
--- a/test/asan/TestCases/partial_right.cc
+++ b/test/asan/TestCases/partial_right.cpp
diff --git a/test/asan/TestCases/pass-object-byval.cc b/test/asan/TestCases/pass-object-byval.cpp
index f9191c53d..f9191c53d 100644
--- a/test/asan/TestCases/pass-object-byval.cc
+++ b/test/asan/TestCases/pass-object-byval.cpp
diff --git a/test/asan/TestCases/pass-struct-byval-uar.cc b/test/asan/TestCases/pass-struct-byval-uar.cpp
index aa6fa579e..aa6fa579e 100644
--- a/test/asan/TestCases/pass-struct-byval-uar.cc
+++ b/test/asan/TestCases/pass-struct-byval-uar.cpp
diff --git a/test/asan/TestCases/pass-struct-byval.cc b/test/asan/TestCases/pass-struct-byval.cpp
index ba49eccf4..ba49eccf4 100644
--- a/test/asan/TestCases/pass-struct-byval.cc
+++ b/test/asan/TestCases/pass-struct-byval.cpp
diff --git a/test/asan/TestCases/poison_partial.cc b/test/asan/TestCases/poison_partial.cpp
index 3a1b41999..3a1b41999 100644
--- a/test/asan/TestCases/poison_partial.cc
+++ b/test/asan/TestCases/poison_partial.cpp
diff --git a/test/asan/TestCases/pr33372.cc b/test/asan/TestCases/pr33372.cpp
index a4b606e02..a4b606e02 100644
--- a/test/asan/TestCases/pr33372.cc
+++ b/test/asan/TestCases/pr33372.cpp
diff --git a/test/asan/TestCases/print_summary.cc b/test/asan/TestCases/print_summary.cpp
index 3983ebc68..f3f769705 100644
--- a/test/asan/TestCases/print_summary.cc
+++ b/test/asan/TestCases/print_summary.cpp
@@ -8,7 +8,7 @@ int main() {
delete[] x;
return x[0];
// SOURCE: ERROR: AddressSanitizer: heap-use-after-free
- // SOURCE: SUMMARY: AddressSanitizer: heap-use-after-free {{.*}}print_summary.cc:[[@LINE-2]]{{.*}} main
+ // SOURCE: SUMMARY: AddressSanitizer: heap-use-after-free {{.*}}print_summary.cpp:[[@LINE-2]]{{.*}} main
// MODULE: ERROR: AddressSanitizer: heap-use-after-free
// MODULE: SUMMARY: AddressSanitizer: heap-use-after-free ({{.*}}+0x{{.*}})
// MISSING: ERROR: AddressSanitizer: heap-use-after-free
diff --git a/test/asan/TestCases/realloc.cc b/test/asan/TestCases/realloc.cpp
index fcf383b1a..fcf383b1a 100644
--- a/test/asan/TestCases/realloc.cc
+++ b/test/asan/TestCases/realloc.cpp
diff --git a/test/asan/TestCases/scariness_score_test.cc b/test/asan/TestCases/scariness_score_test.cpp
index fb174eb52..fb174eb52 100644
--- a/test/asan/TestCases/scariness_score_test.cc
+++ b/test/asan/TestCases/scariness_score_test.cpp
diff --git a/test/asan/TestCases/small_memcpy_test.cc b/test/asan/TestCases/small_memcpy_test.cpp
index ef0ac35b8..ef0ac35b8 100644
--- a/test/asan/TestCases/small_memcpy_test.cc
+++ b/test/asan/TestCases/small_memcpy_test.cpp
diff --git a/test/asan/TestCases/speculative_load.cc b/test/asan/TestCases/speculative_load.cpp
index fdf70eb39..fdf70eb39 100644
--- a/test/asan/TestCases/speculative_load.cc
+++ b/test/asan/TestCases/speculative_load.cpp
diff --git a/test/asan/TestCases/speculative_load2.cc b/test/asan/TestCases/speculative_load2.cpp
index 51051eb2b..51051eb2b 100644
--- a/test/asan/TestCases/speculative_load2.cc
+++ b/test/asan/TestCases/speculative_load2.cpp
diff --git a/test/asan/TestCases/stack-buffer-overflow-with-position.cc b/test/asan/TestCases/stack-buffer-overflow-with-position.cpp
index 0077663d6..0077663d6 100644
--- a/test/asan/TestCases/stack-buffer-overflow-with-position.cc
+++ b/test/asan/TestCases/stack-buffer-overflow-with-position.cpp
diff --git a/test/asan/TestCases/stack-buffer-overflow.cc b/test/asan/TestCases/stack-buffer-overflow.cpp
index bd0c4772c..07cf39433 100644
--- a/test/asan/TestCases/stack-buffer-overflow.cc
+++ b/test/asan/TestCases/stack-buffer-overflow.cpp
@@ -9,8 +9,8 @@ int main(int argc, char **argv) {
memset(x, 0, 10);
int res = x[argc * 10]; // BOOOM
// CHECK: {{READ of size 1 at 0x.* thread T0}}
- // CHECK: {{ #0 0x.* in main .*stack-buffer-overflow.cc:}}[[@LINE-2]]
+ // CHECK: {{ #0 0x.* in main .*stack-buffer-overflow.cpp:}}[[@LINE-2]]
// CHECK: {{Address 0x.* is located in stack of thread T0 at offset}}
- // CHECK-NEXT: in{{.*}}main{{.*}}stack-buffer-overflow.cc
+ // CHECK-NEXT: in{{.*}}main{{.*}}stack-buffer-overflow.cpp
return res;
}
diff --git a/test/asan/TestCases/stack-frame-demangle.cc b/test/asan/TestCases/stack-frame-demangle.cpp
index 11a8b38e6..11a8b38e6 100644
--- a/test/asan/TestCases/stack-frame-demangle.cc
+++ b/test/asan/TestCases/stack-frame-demangle.cpp
diff --git a/test/asan/TestCases/stack-oob-frames.cc b/test/asan/TestCases/stack-oob-frames.cpp
index 3b5d511b2..3b5d511b2 100644
--- a/test/asan/TestCases/stack-oob-frames.cc
+++ b/test/asan/TestCases/stack-oob-frames.cpp
diff --git a/test/asan/TestCases/strcat-overlap.cc b/test/asan/TestCases/strcat-overlap.cpp
index 5539b130f..d3dd2a7c0 100644
--- a/test/asan/TestCases/strcat-overlap.cc
+++ b/test/asan/TestCases/strcat-overlap.cpp
@@ -43,8 +43,8 @@ __attribute__((noinline)) void bad_function() {
// CHECK: strcat-param-overlap: memory ranges
// CHECK: [{{0x.*,[ ]*0x.*}}) and [{{0x.*,[ ]*0x.*}}) overlap
// CHECK: {{#0 0x.* in .*strcat}}
- // CHECK: {{#1 0x.* in bad_function.*strcat-overlap.cc:}}[[@LINE+2]]
- // CHECK: {{#2 0x.* in main .*strcat-overlap.cc:}}[[@LINE+5]]
+ // CHECK: {{#1 0x.* in bad_function.*strcat-overlap.cpp:}}[[@LINE+2]]
+ // CHECK: {{#2 0x.* in main .*strcat-overlap.cpp:}}[[@LINE+5]]
strcat(buffer, buffer + 1); // BOOM
}
diff --git a/test/asan/TestCases/strcpy-overlap.cc b/test/asan/TestCases/strcpy-overlap.cpp
index 53b77e13d..36f1ec4da 100644
--- a/test/asan/TestCases/strcpy-overlap.cc
+++ b/test/asan/TestCases/strcpy-overlap.cpp
@@ -37,8 +37,8 @@ __attribute__((noinline)) void bad_function() {
// CHECK: strcpy-param-overlap: memory ranges
// CHECK: [{{0x.*,[ ]*0x.*}}) and [{{0x.*,[ ]*0x.*}}) overlap
// CHECK: {{#0 0x.* in .*strcpy}}
- // CHECK: {{#1 0x.* in bad_function.*strcpy-overlap.cc:}}[[@LINE+2]]
- // CHECK: {{#2 0x.* in main .*strcpy-overlap.cc:}}[[@LINE+5]]
+ // CHECK: {{#1 0x.* in bad_function.*strcpy-overlap.cpp:}}[[@LINE+2]]
+ // CHECK: {{#2 0x.* in main .*strcpy-overlap.cpp:}}[[@LINE+5]]
strcpy(buffer, buffer + 1); // BOOM
}
diff --git a/test/asan/TestCases/strdup_oob_test.cc b/test/asan/TestCases/strdup_oob_test.cpp
index e251dfcb4..14791e46d 100644
--- a/test/asan/TestCases/strdup_oob_test.cc
+++ b/test/asan/TestCases/strdup_oob_test.cpp
@@ -21,11 +21,11 @@ int main(int argc, char **argv) {
char *copy = strdup(kString);
int x = copy[4 + argc]; // BOOM
// CHECK: AddressSanitizer: heap-buffer-overflow
- // CHECK: #0 {{.*}}main {{.*}}strdup_oob_test.cc:[[@LINE-2]]
+ // CHECK: #0 {{.*}}main {{.*}}strdup_oob_test.cpp:[[@LINE-2]]
// CHECK-LABEL: allocated by thread T{{.*}} here:
// CHECK: #{{[01]}} {{.*}}strdup
- // CHECK: #{{.*}}main {{.*}}strdup_oob_test.cc:[[@LINE-6]]
+ // CHECK: #{{.*}}main {{.*}}strdup_oob_test.cpp:[[@LINE-6]]
// CHECK-LABEL: SUMMARY
- // CHECK: strdup_oob_test.cc:[[@LINE-7]]
+ // CHECK: strdup_oob_test.cpp:[[@LINE-7]]
return x;
}
diff --git a/test/asan/TestCases/strncat-overlap.cc b/test/asan/TestCases/strncat-overlap.cpp
index 959b783d2..9e6ad5914 100644
--- a/test/asan/TestCases/strncat-overlap.cc
+++ b/test/asan/TestCases/strncat-overlap.cpp
@@ -37,8 +37,8 @@ __attribute__((noinline)) void bad_function() {
// CHECK: strncat-param-overlap: memory ranges
// CHECK: [{{0x.*,[ ]*0x.*}}) and [{{0x.*,[ ]*0x.*}}) overlap
// CHECK: {{#0 0x.* in .*strncat}}
- // CHECK: {{#1 0x.* in bad_function.*strncat-overlap.cc:}}[[@LINE+2]]
- // CHECK: {{#2 0x.* in main .*strncat-overlap.cc:}}[[@LINE+5]]
+ // CHECK: {{#1 0x.* in bad_function.*strncat-overlap.cpp:}}[[@LINE+2]]
+ // CHECK: {{#2 0x.* in main .*strncat-overlap.cpp:}}[[@LINE+5]]
strncat(buffer, buffer + 1, 3); // BOOM
}
diff --git a/test/asan/TestCases/strncpy-overflow.cc b/test/asan/TestCases/strncpy-overflow.cpp
index 7da9a8ff8..3047b7f8a 100644
--- a/test/asan/TestCases/strncpy-overflow.cc
+++ b/test/asan/TestCases/strncpy-overflow.cpp
@@ -16,14 +16,14 @@ int main(int argc, char **argv) {
// CHECK: {{WRITE of size 10 at 0x.* thread T0}}
// CHECK-Linux: {{ #0 0x.* in .*strncpy}}
// CHECK-Darwin: {{ #0 0x.* in wrap_strncpy}}
- // CHECK: {{ #1 0x.* in main .*strncpy-overflow.cc:}}[[@LINE-4]]
+ // CHECK: {{ #1 0x.* in main .*strncpy-overflow.cpp:}}[[@LINE-4]]
// CHECK: {{0x.* is located 0 bytes to the right of 9-byte region}}
// CHECK: {{allocated by thread T0 here:}}
// CHECK-Linux: {{ #0 0x.* in .*malloc}}
- // CHECK-Linux: {{ #1 0x.* in main .*strncpy-overflow.cc:}}[[@LINE-10]]
+ // CHECK-Linux: {{ #1 0x.* in main .*strncpy-overflow.cpp:}}[[@LINE-10]]
// CHECK-Darwin: {{ #0 0x.* in wrap_malloc.*}}
- // CHECK-Darwin: {{ #1 0x.* in main .*strncpy-overflow.cc:}}[[@LINE-13]]
+ // CHECK-Darwin: {{ #1 0x.* in main .*strncpy-overflow.cpp:}}[[@LINE-13]]
return short_buffer[8];
}
diff --git a/test/asan/TestCases/strncpy-overlap.cc b/test/asan/TestCases/strncpy-overlap.cpp
index d7052cb49..f855b6af3 100644
--- a/test/asan/TestCases/strncpy-overlap.cc
+++ b/test/asan/TestCases/strncpy-overlap.cpp
@@ -37,8 +37,8 @@ __attribute__((noinline)) void bad_function() {
// CHECK: strncpy-param-overlap: memory ranges
// CHECK: [{{0x.*,[ ]*0x.*}}) and [{{0x.*,[ ]*0x.*}}) overlap
// CHECK: {{#0 0x.* in .*strncpy}}
- // CHECK: {{#1 0x.* in bad_function.*strncpy-overlap.cc:}}[[@LINE+2]]
- // CHECK: {{#2 0x.* in main .*strncpy-overlap.cc:}}[[@LINE+5]]
+ // CHECK: {{#1 0x.* in bad_function.*strncpy-overlap.cpp:}}[[@LINE+2]]
+ // CHECK: {{#2 0x.* in main .*strncpy-overlap.cpp:}}[[@LINE+5]]
strncpy(buffer, buffer + 1, 5); // BOOM
}
diff --git a/test/asan/TestCases/suppressions-exec-relative-location.cc b/test/asan/TestCases/suppressions-exec-relative-location.cpp
index 3f6d23925..3f6d23925 100644
--- a/test/asan/TestCases/suppressions-exec-relative-location.cc
+++ b/test/asan/TestCases/suppressions-exec-relative-location.cpp
diff --git a/test/asan/TestCases/suppressions-function.cc b/test/asan/TestCases/suppressions-function.cpp
index 510a9bc5b..510a9bc5b 100644
--- a/test/asan/TestCases/suppressions-function.cc
+++ b/test/asan/TestCases/suppressions-function.cpp
diff --git a/test/asan/TestCases/suppressions-interceptor.cc b/test/asan/TestCases/suppressions-interceptor.cpp
index e44ccb8e6..e44ccb8e6 100644
--- a/test/asan/TestCases/suppressions-interceptor.cc
+++ b/test/asan/TestCases/suppressions-interceptor.cpp
diff --git a/test/asan/TestCases/suppressions-library.cc b/test/asan/TestCases/suppressions-library.cpp
index 181ed7582..181ed7582 100644
--- a/test/asan/TestCases/suppressions-library.cc
+++ b/test/asan/TestCases/suppressions-library.cpp
diff --git a/test/asan/TestCases/throw_call_test.cc b/test/asan/TestCases/throw_call_test.cpp
index 20a7c0b76..20a7c0b76 100644
--- a/test/asan/TestCases/throw_call_test.cc
+++ b/test/asan/TestCases/throw_call_test.cpp
diff --git a/test/asan/TestCases/throw_catch.cc b/test/asan/TestCases/throw_catch.cpp
index d7f00ea9e..d7f00ea9e 100644
--- a/test/asan/TestCases/throw_catch.cc
+++ b/test/asan/TestCases/throw_catch.cpp
diff --git a/test/asan/TestCases/throw_invoke_test.cc b/test/asan/TestCases/throw_invoke_test.cpp
index bbfa1c7b9..bbfa1c7b9 100644
--- a/test/asan/TestCases/throw_invoke_test.cc
+++ b/test/asan/TestCases/throw_invoke_test.cpp
diff --git a/test/asan/TestCases/time_interceptor.cc b/test/asan/TestCases/time_interceptor.cpp
index f78af1056..f78af1056 100644
--- a/test/asan/TestCases/time_interceptor.cc
+++ b/test/asan/TestCases/time_interceptor.cpp
diff --git a/test/asan/TestCases/uar_and_exceptions.cc b/test/asan/TestCases/uar_and_exceptions.cpp
index 2357ae803..2357ae803 100644
--- a/test/asan/TestCases/uar_and_exceptions.cc
+++ b/test/asan/TestCases/uar_and_exceptions.cpp
diff --git a/test/asan/TestCases/unaligned_loads_and_stores.cc b/test/asan/TestCases/unaligned_loads_and_stores.cpp
index f1b1d0d45..fa8d7becf 100644
--- a/test/asan/TestCases/unaligned_loads_and_stores.cc
+++ b/test/asan/TestCases/unaligned_loads_and_stores.cpp
@@ -23,29 +23,29 @@ int main(int argc, char **argv) {
switch (argv[1][0]) {
case 'A': res = __sanitizer_unaligned_load16(x + 15); break;
// CHECK-A ERROR: AddressSanitizer: heap-buffer-overflow on address
-// CHECK-A: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-2]]
+// CHECK-A: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-2]]
// CHECK-A: is located 0 bytes to the right of 16-byte region
case 'B': res = __sanitizer_unaligned_load32(x + 14); break;
-// CHECK-B: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]]
+// CHECK-B: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]]
case 'C': res = __sanitizer_unaligned_load32(x + 13); break;
-// CHECK-C: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]]
+// CHECK-C: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]]
case 'D': res = __sanitizer_unaligned_load64(x + 15); break;
-// CHECK-D: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]]
+// CHECK-D: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]]
case 'E': res = __sanitizer_unaligned_load64(x + 9); break;
-// CHECK-E: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]]
+// CHECK-E: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]]
case 'K': __sanitizer_unaligned_store16(x + 15, 0); break;
// CHECK-K ERROR: AddressSanitizer: heap-buffer-overflow on address
-// CHECK-K: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-2]]
+// CHECK-K: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-2]]
// CHECK-K: is located 0 bytes to the right of 16-byte region
case 'L': __sanitizer_unaligned_store32(x + 15, 0); break;
-// CHECK-L: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]]
+// CHECK-L: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]]
case 'M': __sanitizer_unaligned_store32(x + 13, 0); break;
-// CHECK-M: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]]
+// CHECK-M: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]]
case 'N': __sanitizer_unaligned_store64(x + 10, 0); break;
-// CHECK-N: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]]
+// CHECK-N: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]]
case 'O': __sanitizer_unaligned_store64(x + 14, 0); break;
-// CHECK-O: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]]
+// CHECK-O: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]]
}
delete x;
return res;
diff --git a/test/asan/TestCases/use-after-delete.cc b/test/asan/TestCases/use-after-delete.cpp
index 44404cd18..c72e0f791 100644
--- a/test/asan/TestCases/use-after-delete.cc
+++ b/test/asan/TestCases/use-after-delete.cpp
@@ -12,17 +12,17 @@ int main() {
// CHECK: {{.*ERROR: AddressSanitizer: heap-use-after-free on address}}
// CHECK: {{0x.* at pc 0x.* bp 0x.* sp 0x.*}}
// CHECK: {{READ of size 1 at 0x.* thread T0}}
- // CHECK: {{ #0 0x.* in main .*use-after-delete.cc:}}[[@LINE-4]]
+ // CHECK: {{ #0 0x.* in main .*use-after-delete.cpp:}}[[@LINE-4]]
// CHECK: {{0x.* is located 5 bytes inside of 10-byte region .0x.*,0x.*}}
// CHECK: {{freed by thread T0 here:}}
// CHECK-Linux: {{ #0 0x.* in operator delete\[\]}}
- // CHECK-Linux: {{ #1 0x.* in main .*use-after-delete.cc:}}[[@LINE-10]]
+ // CHECK-Linux: {{ #1 0x.* in main .*use-after-delete.cpp:}}[[@LINE-10]]
// CHECK: {{previously allocated by thread T0 here:}}
// CHECK-Linux: {{ #0 0x.* in operator new\[\]}}
- // CHECK-Linux: {{ #1 0x.* in main .*use-after-delete.cc:}}[[@LINE-16]]
+ // CHECK-Linux: {{ #1 0x.* in main .*use-after-delete.cpp:}}[[@LINE-16]]
// CHECK: Shadow byte legend (one shadow byte represents {{[0-9]+}} application bytes):
// CHECK: Global redzone:
diff --git a/test/asan/TestCases/use-after-free-right.cc b/test/asan/TestCases/use-after-free-right.cpp
index d72370e72..c4ae2810c 100644
--- a/test/asan/TestCases/use-after-free-right.cc
+++ b/test/asan/TestCases/use-after-free-right.cpp
@@ -15,21 +15,21 @@ int main() {
// CHECK: {{.*ERROR: AddressSanitizer: heap-use-after-free on address}}
// CHECK: {{0x.* at pc 0x.* bp 0x.* sp 0x.*}}
// CHECK: {{WRITE of size 1 at 0x.* thread T0}}
- // CHECK: {{ #0 0x.* in main .*use-after-free-right.cc:}}[[@LINE-4]]
+ // CHECK: {{ #0 0x.* in main .*use-after-free-right.cpp:}}[[@LINE-4]]
// CHECK: {{0x.* is located 0 bytes inside of 1-byte region .0x.*,0x.*}}
// CHECK: {{freed by thread T0 here:}}
// CHECK-Linux: {{ #0 0x.* in .*free}}
- // CHECK-Linux: {{ #1 0x.* in main .*use-after-free-right.cc:}}[[@LINE-10]]
+ // CHECK-Linux: {{ #1 0x.* in main .*use-after-free-right.cpp:}}[[@LINE-10]]
// CHECK-Darwin: {{ #0 0x.* in wrap_free}}
- // CHECK-Darwin: {{ #1 0x.* in main .*use-after-free-right.cc:}}[[@LINE-13]]
+ // CHECK-Darwin: {{ #1 0x.* in main .*use-after-free-right.cpp:}}[[@LINE-13]]
// CHECK: {{previously allocated by thread T0 here:}}
// CHECK-Linux: {{ #0 0x.* in .*malloc}}
- // CHECK-Linux: {{ #1 0x.* in main .*use-after-free-right.cc:}}[[@LINE-19]]
+ // CHECK-Linux: {{ #1 0x.* in main .*use-after-free-right.cpp:}}[[@LINE-19]]
// CHECK-Darwin: {{ #0 0x.* in wrap_malloc.*}}
- // CHECK-Darwin: {{ #1 0x.* in main .*use-after-free-right.cc:}}[[@LINE-22]]
+ // CHECK-Darwin: {{ #1 0x.* in main .*use-after-free-right.cpp:}}[[@LINE-22]]
}
diff --git a/test/asan/TestCases/use-after-free.cc b/test/asan/TestCases/use-after-free.cpp
index a24c7d497..54cd32dda 100644
--- a/test/asan/TestCases/use-after-free.cc
+++ b/test/asan/TestCases/use-after-free.cpp
@@ -12,23 +12,23 @@ int main() {
// CHECK: {{.*ERROR: AddressSanitizer: heap-use-after-free on address}}
// CHECK: {{0x.* at pc 0x.* bp 0x.* sp 0x.*}}
// CHECK: {{READ of size 1 at 0x.* thread T0}}
- // CHECK: {{ #0 0x.* in main .*use-after-free.cc:}}[[@LINE-4]]
+ // CHECK: {{ #0 0x.* in main .*use-after-free.cpp:}}[[@LINE-4]]
// CHECK: {{0x.* is located 5 bytes inside of 10-byte region .0x.*,0x.*}}
// CHECK: {{freed by thread T0 here:}}
// CHECK-Linux: {{ #0 0x.* in .*free}}
- // CHECK-Linux: {{ #1 0x.* in main .*use-after-free.cc:}}[[@LINE-10]]
+ // CHECK-Linux: {{ #1 0x.* in main .*use-after-free.cpp:}}[[@LINE-10]]
// CHECK-Darwin: {{ #0 0x.* in wrap_free}}
- // CHECK-Darwin: {{ #1 0x.* in main .*use-after-free.cc:}}[[@LINE-13]]
+ // CHECK-Darwin: {{ #1 0x.* in main .*use-after-free.cpp:}}[[@LINE-13]]
// CHECK: {{previously allocated by thread T0 here:}}
// CHECK-Linux: {{ #0 0x.* in .*malloc}}
- // CHECK-Linux: {{ #1 0x.* in main .*use-after-free.cc:}}[[@LINE-19]]
+ // CHECK-Linux: {{ #1 0x.* in main .*use-after-free.cpp:}}[[@LINE-19]]
// CHECK-Darwin: {{ #0 0x.* in wrap_malloc.*}}
- // CHECK-Darwin: {{ #1 0x.* in main .*use-after-free.cc:}}[[@LINE-22]]
+ // CHECK-Darwin: {{ #1 0x.* in main .*use-after-free.cpp:}}[[@LINE-22]]
// CHECK: Shadow byte legend (one shadow byte represents {{[0-9]+}} application bytes):
// CHECK: Global redzone:
// CHECK: ASan internal:
diff --git a/test/asan/TestCases/use-after-poison.cc b/test/asan/TestCases/use-after-poison.cpp
index 9df042b60..b32bb8cd2 100644
--- a/test/asan/TestCases/use-after-poison.cc
+++ b/test/asan/TestCases/use-after-poison.cpp
@@ -14,7 +14,7 @@ int main(int argc, char **argv) {
__asan_poison_memory_region(x, 16);
int res = x[argc * 10]; // BOOOM
// CHECK: ERROR: AddressSanitizer: use-after-poison
- // CHECK: main{{.*}}use-after-poison.cc:[[@LINE-2]]
+ // CHECK: main{{.*}}use-after-poison.cpp:[[@LINE-2]]
delete [] x;
return res;
}
diff --git a/test/asan/TestCases/use-after-scope-capture.cc b/test/asan/TestCases/use-after-scope-capture.cpp
index 113ce3536..5e93dbb48 100644
--- a/test/asan/TestCases/use-after-scope-capture.cc
+++ b/test/asan/TestCases/use-after-scope-capture.cpp
@@ -10,7 +10,7 @@ int main() {
f = [&x]() {
return x; // BOOM
// CHECK: ERROR: AddressSanitizer: stack-use-after-scope
- // CHECK: #0 0x{{.*}} in {{.*}}use-after-scope-capture.cc:[[@LINE-2]]
+ // CHECK: #0 0x{{.*}} in {{.*}}use-after-scope-capture.cpp:[[@LINE-2]]
};
}
return f(); // BOOM
diff --git a/test/asan/TestCases/use-after-scope-conversion.cc b/test/asan/TestCases/use-after-scope-conversion.cpp
index 99b845d07..99b845d07 100644
--- a/test/asan/TestCases/use-after-scope-conversion.cc
+++ b/test/asan/TestCases/use-after-scope-conversion.cpp
diff --git a/test/asan/TestCases/use-after-scope-dtor-order.cc b/test/asan/TestCases/use-after-scope-dtor-order.cpp
index 8cdfa6a1c..8d4f772c0 100644
--- a/test/asan/TestCases/use-after-scope-dtor-order.cc
+++ b/test/asan/TestCases/use-after-scope-dtor-order.cpp
@@ -8,7 +8,7 @@ struct IntHolder {
~IntHolder() {
printf("Value: %d\n", *val_); // BOOM
// CHECK: ERROR: AddressSanitizer: stack-use-after-scope
- // CHECK: #0 0x{{.*}} in IntHolder::~IntHolder{{.*}}.cc:[[@LINE-2]]
+ // CHECK: #0 0x{{.*}} in IntHolder::~IntHolder{{.*}}.cpp:[[@LINE-2]]
}
void set(int *val) { val_ = val; }
int *get() { return val_; }
diff --git a/test/asan/TestCases/use-after-scope-goto.cc b/test/asan/TestCases/use-after-scope-goto.cpp
index 351cbe995..351cbe995 100644
--- a/test/asan/TestCases/use-after-scope-goto.cc
+++ b/test/asan/TestCases/use-after-scope-goto.cpp
diff --git a/test/asan/TestCases/use-after-scope-if.cc b/test/asan/TestCases/use-after-scope-if.cpp
index 8180077a0..579008385 100644
--- a/test/asan/TestCases/use-after-scope-if.cc
+++ b/test/asan/TestCases/use-after-scope-if.cpp
@@ -11,5 +11,5 @@ int main() {
}
return *p; // BOOM
// CHECK: ERROR: AddressSanitizer: stack-use-after-scope
- // CHECK: #0 0x{{.*}} in main {{.*}}.cc:[[@LINE-2]]
+ // CHECK: #0 0x{{.*}} in main {{.*}}.cpp:[[@LINE-2]]
}
diff --git a/test/asan/TestCases/use-after-scope-inlined.cc b/test/asan/TestCases/use-after-scope-inlined.cpp
index bed9814c8..ce72fa236 100644
--- a/test/asan/TestCases/use-after-scope-inlined.cc
+++ b/test/asan/TestCases/use-after-scope-inlined.cpp
@@ -20,7 +20,7 @@ int main(int argc, char *argv[]) {
// CHECK: ERROR: AddressSanitizer: stack-use-after-scope
// CHECK: READ of size 4 at 0x{{.*}} thread T0
// CHECK: #0 0x{{.*}} in main
- // CHECK: {{.*}}use-after-scope-inlined.cc:[[@LINE-4]]
+ // CHECK: {{.*}}use-after-scope-inlined.cpp:[[@LINE-4]]
// CHECK: Address 0x{{.*}} is located in stack of thread T0 at offset [[OFFSET:[^ ]*]] in frame
// CHECK: {{.*}} in main
// CHECK: This frame has
diff --git a/test/asan/TestCases/use-after-scope-loop-bug.cc b/test/asan/TestCases/use-after-scope-loop-bug.cpp
index d4b12eca9..b5b02d7f1 100644
--- a/test/asan/TestCases/use-after-scope-loop-bug.cc
+++ b/test/asan/TestCases/use-after-scope-loop-bug.cpp
@@ -11,7 +11,7 @@ int main() {
}
return *p; // BOOM
// CHECK: ERROR: AddressSanitizer: stack-use-after-scope
- // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope-loop-bug.cc:[[@LINE-2]]
+ // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope-loop-bug.cpp:[[@LINE-2]]
// CHECK: Address 0x{{.*}} is located in stack of thread T{{.*}} at offset [[OFFSET:[^ ]+]] in frame
// {{\[}}[[OFFSET]], {{[0-9]+}}) 'x'
}
diff --git a/test/asan/TestCases/use-after-scope-loop-removed.cc b/test/asan/TestCases/use-after-scope-loop-removed.cpp
index 730bf3a3e..0e8944e93 100644
--- a/test/asan/TestCases/use-after-scope-loop-removed.cc
+++ b/test/asan/TestCases/use-after-scope-loop-removed.cpp
@@ -12,7 +12,7 @@ int main() {
}
return *p; // BOOM
// CHECK: ERROR: AddressSanitizer: stack-use-after-scope
- // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope-loop-removed.cc:[[@LINE-2]]
+ // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope-loop-removed.cpp:[[@LINE-2]]
// CHECK: Address 0x{{.*}} is located in stack of thread T{{.*}} at offset [[OFFSET:[^ ]+]] in frame
// {{\[}}[[OFFSET]], {{[0-9]+}}) 'x'
}
diff --git a/test/asan/TestCases/use-after-scope-loop.cc b/test/asan/TestCases/use-after-scope-loop.cpp
index d99761bc7..dcd6435ae 100644
--- a/test/asan/TestCases/use-after-scope-loop.cc
+++ b/test/asan/TestCases/use-after-scope-loop.cpp
@@ -10,5 +10,5 @@ int main() {
}
return **p; // BOOM
// CHECK: ERROR: AddressSanitizer: stack-use-after-scope
- // CHECK: #0 0x{{.*}} in main {{.*}}.cc:[[@LINE-2]]
+ // CHECK: #0 0x{{.*}} in main {{.*}}.cpp:[[@LINE-2]]
}
diff --git a/test/asan/TestCases/use-after-scope-nobug.cc b/test/asan/TestCases/use-after-scope-nobug.cpp
index cf471dc34..cf471dc34 100644
--- a/test/asan/TestCases/use-after-scope-nobug.cc
+++ b/test/asan/TestCases/use-after-scope-nobug.cpp
diff --git a/test/asan/TestCases/use-after-scope-temp.cc b/test/asan/TestCases/use-after-scope-temp.cpp
index 4dcef59a2..b97f312b4 100644
--- a/test/asan/TestCases/use-after-scope-temp.cc
+++ b/test/asan/TestCases/use-after-scope-temp.cpp
@@ -16,6 +16,6 @@ int main(int argc, char *argv[]) {
save({argc});
int x = saved->val; // BOOM
// CHECK: ERROR: AddressSanitizer: stack-use-after-scope
- // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope-temp.cc:[[@LINE-2]]
+ // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope-temp.cpp:[[@LINE-2]]
return x;
}
diff --git a/test/asan/TestCases/use-after-scope-temp2.cc b/test/asan/TestCases/use-after-scope-temp2.cpp
index 1ecd3cbe2..99e4f2505 100644
--- a/test/asan/TestCases/use-after-scope-temp2.cc
+++ b/test/asan/TestCases/use-after-scope-temp2.cpp
@@ -15,6 +15,6 @@ int main(int argc, char *argv[]) {
saved = &IntHolder().Self();
int x = saved->val; // BOOM
// CHECK: ERROR: AddressSanitizer: stack-use-after-scope
- // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope-temp2.cc:[[@LINE-2]]
+ // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope-temp2.cpp:[[@LINE-2]]
return x;
}
diff --git a/test/asan/TestCases/use-after-scope-types.cc b/test/asan/TestCases/use-after-scope-types.cpp
index ec6742bbb..5afd3b1ef 100644
--- a/test/asan/TestCases/use-after-scope-types.cc
+++ b/test/asan/TestCases/use-after-scope-types.cpp
@@ -41,7 +41,7 @@ template <class T> __attribute__((noinline)) void test() {
ptr.Access();
// CHECK: ERROR: AddressSanitizer: stack-use-after-scope
- // CHECK: #{{[0-9]+}} 0x{{.*}} in {{(void )?test.*\((void)?\) .*}}use-after-scope-types.cc
+ // CHECK: #{{[0-9]+}} 0x{{.*}} in {{(void )?test.*\((void)?\) .*}}use-after-scope-types.cpp
// CHECK: Address 0x{{.*}} is located in stack of thread T{{.*}} at offset [[OFFSET:[^ ]+]] in frame
// {{\[}}[[OFFSET]], {{[0-9]+}}) 'x'
}
diff --git a/test/asan/TestCases/use-after-scope.cc b/test/asan/TestCases/use-after-scope.cpp
index 4c5998abe..fdc937bb6 100644
--- a/test/asan/TestCases/use-after-scope.cc
+++ b/test/asan/TestCases/use-after-scope.cpp
@@ -14,7 +14,7 @@ int main() {
}
*p = 5; // BOOM
// CHECK: ERROR: AddressSanitizer: stack-use-after-scope
- // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope.cc:[[@LINE-2]]
+ // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope.cpp:[[@LINE-2]]
// CHECK: Address 0x{{.*}} is located in stack of thread T{{.*}} at offset [[OFFSET:[^ ]+]] in frame
// {{\[}}[[OFFSET]], {{[0-9]+}}) 'x'
return 0;
diff --git a/test/asan/TestCases/verbose-log-path_test.cc b/test/asan/TestCases/verbose-log-path_test.cpp
index 5407d15d6..5407d15d6 100644
--- a/test/asan/TestCases/verbose-log-path_test.cc
+++ b/test/asan/TestCases/verbose-log-path_test.cpp
diff --git a/test/asan/TestCases/vla_chrome_testcase.cc b/test/asan/TestCases/vla_chrome_testcase.cpp
index a87718006..a87718006 100644
--- a/test/asan/TestCases/vla_chrome_testcase.cc
+++ b/test/asan/TestCases/vla_chrome_testcase.cpp
diff --git a/test/asan/TestCases/vla_condition_overflow.cc b/test/asan/TestCases/vla_condition_overflow.cpp
index cf42d794e..cf42d794e 100644
--- a/test/asan/TestCases/vla_condition_overflow.cc
+++ b/test/asan/TestCases/vla_condition_overflow.cpp
diff --git a/test/asan/TestCases/vla_loop_overfow.cc b/test/asan/TestCases/vla_loop_overfow.cpp
index b6a5864c0..b6a5864c0 100644
--- a/test/asan/TestCases/vla_loop_overfow.cc
+++ b/test/asan/TestCases/vla_loop_overfow.cpp
diff --git a/test/asan/TestCases/zero_page_pc.cc b/test/asan/TestCases/zero_page_pc.cpp
index ba35df880..ba35df880 100644
--- a/test/asan/TestCases/zero_page_pc.cc
+++ b/test/asan/TestCases/zero_page_pc.cpp
diff --git a/test/lit.common.cfg.py b/test/lit.common.cfg.py
index af0721ad1..2a8d93166 100644
--- a/test/lit.common.cfg.py
+++ b/test/lit.common.cfg.py
@@ -254,7 +254,7 @@ if config.host_os == 'Darwin':
config.available_features.add('osx-autointerception')
config.available_features.add('osx-ld64-live_support')
else:
- # The ASAN initialization-bug.cc test should XFAIL on OS X systems
+ # The ASAN initialization-bug.cpp test should XFAIL on OS X systems
# older than El Capitan. By marking the test as being unsupported with
# this "feature", we can pass the test on newer OS X versions and other
# platforms.