diff options
author | Nico Weber <nicolasweber@gmx.de> | 2019-08-05 16:48:12 +0000 |
---|---|---|
committer | Nico Weber <nicolasweber@gmx.de> | 2019-08-05 16:48:12 +0000 |
commit | 2f91f4f955190c500ab3a1ec4b92ad3f3af72724 (patch) | |
tree | 14f3bb241fe04d56481582cad0dcb00f3dc1a01e | |
parent | 9b46f1e9a77b1faa2e9869b9b886f05ac5d39411 (diff) | |
download | compiler-rt-2f91f4f955190c500ab3a1ec4b92ad3f3af72724.tar.gz |
compiler-rt: Rename cc files below test/asan to cpp
See r367803 and similar other changes.
git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@367887 91177308-0d34-0410-b5e6-96231b3b80d8
-rw-r--r-- | CMakeLists.txt | 2 | ||||
-rw-r--r-- | lib/asan/tests/asan_test.cpp | 2 | ||||
-rwxr-xr-x | lib/sanitizer_common/scripts/check_lint.sh | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/abort_on_error.cpp (renamed from test/asan/TestCases/Darwin/abort_on_error.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/asan-symbolize-partial-report-no-external-symbolizer.cpp (renamed from test/asan/TestCases/Darwin/asan-symbolize-partial-report-no-external-symbolizer.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/asan-symbolize-partial-report-with-module-map.cpp (renamed from test/asan/TestCases/Darwin/asan-symbolize-partial-report-with-module-map.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/asan-symbolize-with-module-map.cpp (renamed from test/asan/TestCases/Darwin/asan-symbolize-with-module-map.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/asan_gen_prefixes.cpp (renamed from test/asan/TestCases/Darwin/asan_gen_prefixes.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/atos-symbolizer-dyld-root-path.cpp (renamed from test/asan/TestCases/Darwin/atos-symbolizer-dyld-root-path.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/atos-symbolizer.cpp (renamed from test/asan/TestCases/Darwin/atos-symbolizer.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/dladdr-demangling.cpp (renamed from test/asan/TestCases/Darwin/dladdr-demangling.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/dump_registers.cpp (renamed from test/asan/TestCases/Darwin/dump_registers.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/dyld_insert_libraries_reexec.cpp (renamed from test/asan/TestCases/Darwin/dyld_insert_libraries_reexec.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/dyld_insert_libraries_remove.cpp (renamed from test/asan/TestCases/Darwin/dyld_insert_libraries_remove.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/empty-section.cpp (renamed from test/asan/TestCases/Darwin/empty-section.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/haswell-symbolication.cpp (renamed from test/asan/TestCases/Darwin/haswell-symbolication.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/init_for_dlopen.cpp (renamed from test/asan/TestCases/Darwin/init_for_dlopen.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/interface_symbols_darwin.cpp (renamed from test/asan/TestCases/Darwin/interface_symbols_darwin.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/linked-only.cpp (renamed from test/asan/TestCases/Darwin/linked-only.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/malloc_destroy_zone.cpp (renamed from test/asan/TestCases/Darwin/malloc_destroy_zone.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/malloc_set_zone_name-mprotect.cpp (renamed from test/asan/TestCases/Darwin/malloc_set_zone_name-mprotect.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/malloc_zone-protected.cpp (renamed from test/asan/TestCases/Darwin/malloc_zone-protected.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/mixing-global-constructors.cpp (renamed from test/asan/TestCases/Darwin/mixing-global-constructors.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/odr-lto.cpp (renamed from test/asan/TestCases/Darwin/odr-lto.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/reexec-insert-libraries-env.cpp (renamed from test/asan/TestCases/Darwin/reexec-insert-libraries-env.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/sandbox-symbolizer.cpp (renamed from test/asan/TestCases/Darwin/sandbox-symbolizer.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/scribble.cpp (renamed from test/asan/TestCases/Darwin/scribble.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/suppressions-darwin.cpp (renamed from test/asan/TestCases/Darwin/suppressions-darwin.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/suppressions-function.cpp (renamed from test/asan/TestCases/Darwin/suppressions-function.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/suppressions-sandbox.cpp (renamed from test/asan/TestCases/Darwin/suppressions-sandbox.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/unset-insert-libraries-on-exec.cpp (renamed from test/asan/TestCases/Darwin/unset-insert-libraries-on-exec.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Darwin/uuid.cpp (renamed from test/asan/TestCases/Darwin/uuid.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Helpers/blacklist-extra.cpp (renamed from test/asan/TestCases/Helpers/blacklist-extra.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Helpers/echo-env.cpp (renamed from test/asan/TestCases/Helpers/echo-env.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Helpers/init-order-atexit-extra.cpp (renamed from test/asan/TestCases/Helpers/init-order-atexit-extra.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Helpers/initialization-blacklist-extra.cpp (renamed from test/asan/TestCases/Helpers/initialization-blacklist-extra.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Helpers/initialization-blacklist-extra2.cpp (renamed from test/asan/TestCases/Helpers/initialization-blacklist-extra2.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Helpers/initialization-blacklist.txt | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Helpers/initialization-bug-extra.cpp (renamed from test/asan/TestCases/Helpers/initialization-bug-extra.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Helpers/initialization-bug-extra2.cpp (renamed from test/asan/TestCases/Helpers/initialization-bug-extra2.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Helpers/initialization-constexpr-extra.cpp (renamed from test/asan/TestCases/Helpers/initialization-constexpr-extra.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Helpers/initialization-nobug-extra.cpp (renamed from test/asan/TestCases/Helpers/initialization-nobug-extra.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Helpers/underflow.cpp (renamed from test/asan/TestCases/Helpers/underflow.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/abort_on_error.cpp (renamed from test/asan/TestCases/Linux/abort_on_error.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/activation-options.cpp (renamed from test/asan/TestCases/Linux/activation-options.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/aligned_delete_test.cpp (renamed from test/asan/TestCases/Linux/aligned_delete_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/allocator_oom_test.cpp (renamed from test/asan/TestCases/Linux/allocator_oom_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/asan_default_suppressions.cpp (renamed from test/asan/TestCases/Linux/asan_default_suppressions.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/asan_dlopen_test.cpp (renamed from test/asan/TestCases/Linux/asan_dlopen_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/asan_prelink_test.cpp (renamed from test/asan/TestCases/Linux/asan_prelink_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/asan_preload_test-1.cpp (renamed from test/asan/TestCases/Linux/asan_preload_test-1.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/asan_preload_test-2.cpp (renamed from test/asan/TestCases/Linux/asan_preload_test-2.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/asan_preload_test-3.cpp (renamed from test/asan/TestCases/Linux/asan_preload_test-3.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/asan_rt_confict_test-1.cpp (renamed from test/asan/TestCases/Linux/asan_rt_confict_test-1.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/asan_rt_confict_test-2.cpp (renamed from test/asan/TestCases/Linux/asan_rt_confict_test-2.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/auto_memory_profile_test.cpp (renamed from test/asan/TestCases/Linux/auto_memory_profile_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/bzero.cpp (renamed from test/asan/TestCases/Linux/bzero.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/clang_gcc_abi.cpp (renamed from test/asan/TestCases/Linux/clang_gcc_abi.cc) | 8 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/clone_test.cpp (renamed from test/asan/TestCases/Linux/clone_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/coverage-missing.cpp (renamed from test/asan/TestCases/Linux/coverage-missing.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/cuda_test.cpp (renamed from test/asan/TestCases/Linux/cuda_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/function-sections-are-bad.cpp (renamed from test/asan/TestCases/Linux/function-sections-are-bad.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/global-overflow-bfd.cpp (renamed from test/asan/TestCases/Linux/global-overflow-bfd.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/global-overflow-lld.cpp (renamed from test/asan/TestCases/Linux/global-overflow-lld.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/globals-gc-sections-lld.cpp (renamed from test/asan/TestCases/Linux/globals-gc-sections-lld.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/init-order-dlopen.cpp (renamed from test/asan/TestCases/Linux/init-order-dlopen.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/init_fini_sections.cpp (renamed from test/asan/TestCases/Linux/init_fini_sections.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/initialization-bug-any-order.cpp (renamed from test/asan/TestCases/Linux/initialization-bug-any-order.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/interception_malloc_test.cpp (renamed from test/asan/TestCases/Linux/interception_malloc_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/interception_readdir_r_test.cpp (renamed from test/asan/TestCases/Linux/interception_readdir_r_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/interception_test.cpp (renamed from test/asan/TestCases/Linux/interception_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/interface_symbols_linux.cpp (renamed from test/asan/TestCases/Linux/interface_symbols_linux.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/kernel-area.cpp (renamed from test/asan/TestCases/Linux/kernel-area.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/leak.cpp (renamed from test/asan/TestCases/Linux/leak.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/leak_check_segv.cpp (renamed from test/asan/TestCases/Linux/leak_check_segv.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/local_alias.cpp (renamed from test/asan/TestCases/Linux/local_alias.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/long-object-path.cpp (renamed from test/asan/TestCases/Linux/long-object-path.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/malloc-in-qsort.cpp (renamed from test/asan/TestCases/Linux/malloc-in-qsort.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/malloc_delete_mismatch.cpp (renamed from test/asan/TestCases/Linux/malloc_delete_mismatch.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/memmem_test.cpp (renamed from test/asan/TestCases/Linux/memmem_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/mincore.cpp (renamed from test/asan/TestCases/Linux/mincore.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/new_delete_mismatch.cpp (renamed from test/asan/TestCases/Linux/new_delete_mismatch.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/new_delete_mismatch_global.cpp (renamed from test/asan/TestCases/Linux/new_delete_mismatch_global.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/new_delete_mismatch_stack.cpp (renamed from test/asan/TestCases/Linux/new_delete_mismatch_stack.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/nohugepage_test.cpp (renamed from test/asan/TestCases/Linux/nohugepage_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/odr-violation.cpp (renamed from test/asan/TestCases/Linux/odr-violation.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/odr-vtable.cpp (renamed from test/asan/TestCases/Linux/odr-vtable.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/odr_indicators.cpp (renamed from test/asan/TestCases/Linux/odr_indicators.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/overflow-in-qsort.cpp (renamed from test/asan/TestCases/Linux/overflow-in-qsort.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/preinit_test.cpp (renamed from test/asan/TestCases/Linux/preinit_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/preinstalled_signal.cpp (renamed from test/asan/TestCases/Linux/preinstalled_signal.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/print_memory_profile_test.cpp (renamed from test/asan/TestCases/Linux/print_memory_profile_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/pthread_create_from_constructor.cpp (renamed from test/asan/TestCases/Linux/pthread_create_from_constructor.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/pthread_create_version.cpp (renamed from test/asan/TestCases/Linux/pthread_create_version.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/ptrace.cpp (renamed from test/asan/TestCases/Linux/ptrace.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/quarantine_size_mb.cpp (renamed from test/asan/TestCases/Linux/quarantine_size_mb.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/recoverable-lsan.cpp (renamed from test/asan/TestCases/Linux/recoverable-lsan.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/recvfrom.cpp (renamed from test/asan/TestCases/Linux/recvfrom.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/release_to_os_test.cpp (renamed from test/asan/TestCases/Linux/release_to_os_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/rlimit_mmap_test.cpp (renamed from test/asan/TestCases/Linux/rlimit_mmap_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/sanbox_read_proc_self_maps_test.cpp (renamed from test/asan/TestCases/Linux/sanbox_read_proc_self_maps_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/shmctl.cpp (renamed from test/asan/TestCases/Linux/shmctl.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/signal_during_stop_the_world.cpp (renamed from test/asan/TestCases/Linux/signal_during_stop_the_world.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/sized_delete_test.cpp (renamed from test/asan/TestCases/Linux/sized_delete_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/stack-overflow-recovery-mode.cpp (renamed from test/asan/TestCases/Linux/stack-overflow-recovery-mode.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/stack-overflow-sigbus.cpp (renamed from test/asan/TestCases/Linux/stack-overflow-sigbus.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/stack-trace-dlclose.cpp (renamed from test/asan/TestCases/Linux/stack-trace-dlclose.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/static_tls.cpp (renamed from test/asan/TestCases/Linux/static_tls.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/swapcontext_annotation.cpp (renamed from test/asan/TestCases/Linux/swapcontext_annotation.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/swapcontext_test.cpp (renamed from test/asan/TestCases/Linux/swapcontext_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/syscalls.cpp (renamed from test/asan/TestCases/Linux/syscalls.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/thread_local_quarantine_pthread_join.cpp (renamed from test/asan/TestCases/Linux/thread_local_quarantine_pthread_join.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/thread_local_quarantine_size_kb.cpp (renamed from test/asan/TestCases/Linux/thread_local_quarantine_size_kb.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/uar_signals.cpp (renamed from test/asan/TestCases/Linux/uar_signals.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/unpoison_tls.cpp (renamed from test/asan/TestCases/Linux/unpoison_tls.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/vfork.cpp (renamed from test/asan/TestCases/Linux/vfork.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/asan-symbolize-bad-path.cpp (renamed from test/asan/TestCases/Posix/asan-symbolize-bad-path.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/asan-symbolize-sanity-test.cpp (renamed from test/asan/TestCases/Posix/asan-symbolize-sanity-test.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/asan_symbolize_script/logging_options_in_help.cpp (renamed from test/asan/TestCases/Posix/asan_symbolize_script/logging_options_in_help.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_help_output.cpp (renamed from test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_help_output.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_symbolicate.cpp (renamed from test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_symbolicate.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/asan_symbolize_script/set_log_dest.cpp (renamed from test/asan/TestCases/Posix/asan_symbolize_script/set_log_dest.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/asan_symbolize_script/set_log_level.cpp (renamed from test/asan/TestCases/Posix/asan_symbolize_script/set_log_level.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/asprintf.cpp (renamed from test/asan/TestCases/Posix/asprintf.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/assign_large_valloc_to_global.cpp (renamed from test/asan/TestCases/Posix/assign_large_valloc_to_global.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/bcmp_test.cpp (renamed from test/asan/TestCases/Posix/bcmp_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/closed-fds.cpp (renamed from test/asan/TestCases/Posix/closed-fds.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/concurrent_overflow.cpp (renamed from test/asan/TestCases/Posix/concurrent_overflow.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/coverage-fork.cpp (renamed from test/asan/TestCases/Posix/coverage-fork.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/coverage-module-unloaded.cpp (renamed from test/asan/TestCases/Posix/coverage-module-unloaded.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/coverage-reset.cpp (renamed from test/asan/TestCases/Posix/coverage-reset.cc) | 14 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/coverage.cpp (renamed from test/asan/TestCases/Posix/coverage.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/current_allocated_bytes.cpp (renamed from test/asan/TestCases/Posix/current_allocated_bytes.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/deep_call_stack.cpp (renamed from test/asan/TestCases/Posix/deep_call_stack.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/deep_thread_stack.cpp (renamed from test/asan/TestCases/Posix/deep_thread_stack.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/dlclose-test.cpp (renamed from test/asan/TestCases/Posix/dlclose-test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/fgets_fputs.cpp (renamed from test/asan/TestCases/Posix/fgets_fputs.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/fread_fwrite.cpp (renamed from test/asan/TestCases/Posix/fread_fwrite.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/free_hook_realloc.cpp (renamed from test/asan/TestCases/Posix/free_hook_realloc.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/freopen.cpp (renamed from test/asan/TestCases/Posix/freopen.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/gc-test.cpp (renamed from test/asan/TestCases/Posix/gc-test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/glob.cpp (renamed from test/asan/TestCases/Posix/glob.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/halt_on_error-torture.cpp (renamed from test/asan/TestCases/Posix/halt_on_error-torture.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/halt_on_error_suppress_equal_pcs.cpp (renamed from test/asan/TestCases/Posix/halt_on_error_suppress_equal_pcs.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/handle_abort_on_error.cpp (renamed from test/asan/TestCases/Posix/handle_abort_on_error.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/init-order-pthread-create.cpp (renamed from test/asan/TestCases/Posix/init-order-pthread-create.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/interception-in-shared-lib-test.cpp (renamed from test/asan/TestCases/Posix/interception-in-shared-lib-test.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/invalid-pointer-pairs-threads.cpp (renamed from test/asan/TestCases/Posix/invalid-pointer-pairs-threads.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/ioctl.cpp (renamed from test/asan/TestCases/Posix/ioctl.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/large_allocator_unpoisons_on_free.cpp (renamed from test/asan/TestCases/Posix/large_allocator_unpoisons_on_free.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/lto-constmerge-odr.cpp (renamed from test/asan/TestCases/Posix/lto-constmerge-odr.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/mmap_limit_mb.cpp (renamed from test/asan/TestCases/Posix/mmap_limit_mb.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/new_array_cookie_test.cpp (renamed from test/asan/TestCases/Posix/new_array_cookie_test.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/new_array_cookie_uaf_test.cpp (renamed from test/asan/TestCases/Posix/new_array_cookie_uaf_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/new_array_cookie_with_new_from_class.cpp (renamed from test/asan/TestCases/Posix/new_array_cookie_with_new_from_class.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/no-fd.cpp (renamed from test/asan/TestCases/Posix/no-fd.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/print_cmdline.cpp (renamed from test/asan/TestCases/Posix/print_cmdline.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/readv.cpp (renamed from test/asan/TestCases/Posix/readv.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/shared-lib-test.cpp (renamed from test/asan/TestCases/Posix/shared-lib-test.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/stack-overflow.cpp (renamed from test/asan/TestCases/Posix/stack-overflow.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/stack-use-after-return.cpp (renamed from test/asan/TestCases/Posix/stack-use-after-return.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/start-deactivated.cpp (renamed from test/asan/TestCases/Posix/start-deactivated.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/strerror_r_test.cpp (renamed from test/asan/TestCases/Posix/strerror_r_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/strndup_oob_test.cpp (renamed from test/asan/TestCases/Posix/strndup_oob_test.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/strndup_oob_test2.cpp (renamed from test/asan/TestCases/Posix/strndup_oob_test2.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/tsd_dtor_leak.cpp (renamed from test/asan/TestCases/Posix/tsd_dtor_leak.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/wait.cpp (renamed from test/asan/TestCases/Posix/wait.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/wait3.cpp (renamed from test/asan/TestCases/Posix/wait3.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/wait4.cpp (renamed from test/asan/TestCases/Posix/wait4.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/waitid.cpp (renamed from test/asan/TestCases/Posix/waitid.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/aligned_mallocs.cpp (renamed from test/asan/TestCases/Windows/aligned_mallocs.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/allocators_sanity.cpp (renamed from test/asan/TestCases/Windows/allocators_sanity.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/beginthreadex.cpp (renamed from test/asan/TestCases/Windows/beginthreadex.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/bind_io_completion_callback.cpp (renamed from test/asan/TestCases/Windows/bind_io_completion_callback.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/bitfield.cpp (renamed from test/asan/TestCases/Windows/bitfield.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/bitfield_uaf.cpp (renamed from test/asan/TestCases/Windows/bitfield_uaf.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/calloc_left_oob.cpp (renamed from test/asan/TestCases/Windows/calloc_left_oob.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/calloc_right_oob.cpp (renamed from test/asan/TestCases/Windows/calloc_right_oob.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/calloc_uaf.cpp (renamed from test/asan/TestCases/Windows/calloc_uaf.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/coverage-basic.cpp (renamed from test/asan/TestCases/Windows/coverage-basic.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/coverage-dll-stdio.cpp (renamed from test/asan/TestCases/Windows/coverage-dll-stdio.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/crash_read_write.cpp (renamed from test/asan/TestCases/Windows/crash_read_write.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/crt_initializers.cpp (renamed from test/asan/TestCases/Windows/crt_initializers.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/delay_dbghelp.cpp (renamed from test/asan/TestCases/Windows/delay_dbghelp.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/demangled_names.cpp (renamed from test/asan/TestCases/Windows/demangled_names.cc) | 8 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_aligned_mallocs.cpp (renamed from test/asan/TestCases/Windows/dll_aligned_mallocs.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_allocators_sanity.cpp (renamed from test/asan/TestCases/Windows/dll_allocators_sanity.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_and_lib.cpp (renamed from test/asan/TestCases/Windows/dll_and_lib.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_cerr.cpp (renamed from test/asan/TestCases/Windows/dll_cerr.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_control_c.cpp (renamed from test/asan/TestCases/Windows/dll_control_c.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_global_dead_strip.c | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_heap_allocation.cpp (renamed from test/asan/TestCases/Windows/dll_heap_allocation.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_host.cpp (renamed from test/asan/TestCases/Windows/dll_host.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_intercept_memchr.cpp (renamed from test/asan/TestCases/Windows/dll_intercept_memchr.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_intercept_memcpy.cpp (renamed from test/asan/TestCases/Windows/dll_intercept_memcpy.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cpp (renamed from test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_intercept_memset.cpp (renamed from test/asan/TestCases/Windows/dll_intercept_memset.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_intercept_strlen.cpp (renamed from test/asan/TestCases/Windows/dll_intercept_strlen.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_large_function.cpp (renamed from test/asan/TestCases/Windows/dll_large_function.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_malloc_left_oob.cpp (renamed from test/asan/TestCases/Windows/dll_malloc_left_oob.cc) | 10 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_malloc_uaf.cpp (renamed from test/asan/TestCases/Windows/dll_malloc_uaf.cc) | 8 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_noreturn.cpp (renamed from test/asan/TestCases/Windows/dll_noreturn.cc) | 10 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_null_deref.cpp (renamed from test/asan/TestCases/Windows/dll_null_deref.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_operator_array_new_left_oob.cpp (renamed from test/asan/TestCases/Windows/dll_operator_array_new_left_oob.cc) | 10 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_operator_array_new_with_dtor_left_oob.cpp (renamed from test/asan/TestCases/Windows/dll_operator_array_new_with_dtor_left_oob.cc) | 10 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_poison_unpoison.cpp (renamed from test/asan/TestCases/Windows/dll_poison_unpoison.cc) | 8 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_report_globals_symbolization_at_startup.cpp (renamed from test/asan/TestCases/Windows/dll_report_globals_symbolization_at_startup.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_seh.cpp (renamed from test/asan/TestCases/Windows/dll_seh.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_stack_use_after_return.cpp (renamed from test/asan/TestCases/Windows/dll_stack_use_after_return.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_thread_stack_array_left_oob.cpp (renamed from test/asan/TestCases/Windows/dll_thread_stack_array_left_oob.cc) | 10 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_unload.cpp (renamed from test/asan/TestCases/Windows/dll_unload.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/double_free.cpp (renamed from test/asan/TestCases/Windows/double_free.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/double_operator_delete.cpp (renamed from test/asan/TestCases/Windows/double_operator_delete.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/free_hook_realloc.cpp (renamed from test/asan/TestCases/Windows/free_hook_realloc.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/fuse-lld-globals.cpp (renamed from test/asan/TestCases/Windows/fuse-lld-globals.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/fuse-lld.cpp (renamed from test/asan/TestCases/Windows/fuse-lld.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/global_const_string.cpp (renamed from test/asan/TestCases/Windows/global_const_string.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/global_const_string_oob.cpp (renamed from test/asan/TestCases/Windows/global_const_string_oob.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/heapalloc.cpp (renamed from test/asan/TestCases/Windows/heapalloc.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/heapalloc_dll_double_free.cpp (renamed from test/asan/TestCases/Windows/heapalloc_dll_double_free.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/heapalloc_dll_unload_realloc_uaf.cpp (renamed from test/asan/TestCases/Windows/heapalloc_dll_unload_realloc_uaf.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/heapalloc_doublefree.cpp (renamed from test/asan/TestCases/Windows/heapalloc_doublefree.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/heapalloc_flags_fallback.cpp (renamed from test/asan/TestCases/Windows/heapalloc_flags_fallback.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/heapalloc_huge.cpp (renamed from test/asan/TestCases/Windows/heapalloc_huge.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/heapalloc_rtl_transfer.cpp (renamed from test/asan/TestCases/Windows/heapalloc_rtl_transfer.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/heapalloc_sanity.cpp (renamed from test/asan/TestCases/Windows/heapalloc_sanity.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/heapalloc_transfer.cpp (renamed from test/asan/TestCases/Windows/heapalloc_transfer.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/heapalloc_uaf.cpp (renamed from test/asan/TestCases/Windows/heapalloc_uaf.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/heapalloc_zero_size.cpp (renamed from test/asan/TestCases/Windows/heapalloc_zero_size.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/heaprealloc.cpp (renamed from test/asan/TestCases/Windows/heaprealloc.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/heaprealloc_alloc_zero.cpp (renamed from test/asan/TestCases/Windows/heaprealloc_alloc_zero.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/heaprealloc_zero_size.cpp (renamed from test/asan/TestCases/Windows/heaprealloc_zero_size.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/hello_world.cpp (renamed from test/asan/TestCases/Windows/hello_world.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/intercept_memcpy.cpp (renamed from test/asan/TestCases/Windows/intercept_memcpy.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/intercept_strdup.cpp (renamed from test/asan/TestCases/Windows/intercept_strdup.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/intercept_strlen.cpp (renamed from test/asan/TestCases/Windows/intercept_strlen.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/interface_symbols_windows.cpp (renamed from test/asan/TestCases/Windows/interface_symbols_windows.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/iostream_sbo.cpp (renamed from test/asan/TestCases/Windows/iostream_sbo.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/longjmp.cpp (renamed from test/asan/TestCases/Windows/longjmp.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/malloc_left_oob.cpp (renamed from test/asan/TestCases/Windows/malloc_left_oob.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/malloc_right_oob.cpp (renamed from test/asan/TestCases/Windows/malloc_right_oob.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/malloc_uaf.cpp (renamed from test/asan/TestCases/Windows/malloc_uaf.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/null_deref.cpp (renamed from test/asan/TestCases/Windows/null_deref.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/null_deref_multiple_dlls.cpp (renamed from test/asan/TestCases/Windows/null_deref_multiple_dlls.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/oom.cpp (renamed from test/asan/TestCases/Windows/oom.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/operator_array_new_left_oob.cpp (renamed from test/asan/TestCases/Windows/operator_array_new_left_oob.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/operator_array_new_right_oob.cpp (renamed from test/asan/TestCases/Windows/operator_array_new_right_oob.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/operator_array_new_uaf.cpp (renamed from test/asan/TestCases/Windows/operator_array_new_uaf.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/operator_array_new_with_dtor_left_oob.cpp (renamed from test/asan/TestCases/Windows/operator_array_new_with_dtor_left_oob.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/operator_delete_wrong_argument.cpp (renamed from test/asan/TestCases/Windows/operator_delete_wrong_argument.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/operator_new_left_oob.cpp (renamed from test/asan/TestCases/Windows/operator_new_left_oob.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/operator_new_right_oob.cpp (renamed from test/asan/TestCases/Windows/operator_new_right_oob.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/operator_new_uaf.cpp (renamed from test/asan/TestCases/Windows/operator_new_uaf.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/queue_user_work_item.cpp (renamed from test/asan/TestCases/Windows/queue_user_work_item.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/queue_user_work_item_report.cpp (renamed from test/asan/TestCases/Windows/queue_user_work_item_report.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/realloc_left_oob.cpp (renamed from test/asan/TestCases/Windows/realloc_left_oob.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/realloc_right_oob.cpp (renamed from test/asan/TestCases/Windows/realloc_right_oob.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/realloc_uaf.cpp (renamed from test/asan/TestCases/Windows/realloc_uaf.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/recalloc_sanity.cpp (renamed from test/asan/TestCases/Windows/recalloc_sanity.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/report_after_syminitialize.cpp (renamed from test/asan/TestCases/Windows/report_after_syminitialize.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/report_globals_reload_dll.cpp (renamed from test/asan/TestCases/Windows/report_globals_reload_dll.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/report_globals_vs_freelibrary.cpp (renamed from test/asan/TestCases/Windows/report_globals_vs_freelibrary.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/rtlallocateheap.cpp (renamed from test/asan/TestCases/Windows/rtlallocateheap.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/rtlallocateheap_dll_unload_double_free.cpp (renamed from test/asan/TestCases/Windows/rtlallocateheap_dll_unload_double_free.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/rtlallocateheap_dll_unload_realloc.cpp (renamed from test/asan/TestCases/Windows/rtlallocateheap_dll_unload_realloc.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/rtlallocateheap_flags_fallback.cpp (renamed from test/asan/TestCases/Windows/rtlallocateheap_flags_fallback.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/rtlallocateheap_zero.cpp (renamed from test/asan/TestCases/Windows/rtlallocateheap_zero.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/seh.cpp (renamed from test/asan/TestCases/Windows/seh.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/shadow_conflict_32.cpp (renamed from test/asan/TestCases/Windows/shadow_conflict_32.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/shadow_mapping_failure.cpp (renamed from test/asan/TestCases/Windows/shadow_mapping_failure.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/stack_array_left_oob.cpp (renamed from test/asan/TestCases/Windows/stack_array_left_oob.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/stack_array_right_oob.cpp (renamed from test/asan/TestCases/Windows/stack_array_right_oob.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/stack_array_sanity.cpp (renamed from test/asan/TestCases/Windows/stack_array_sanity.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/stack_use_after_return.cpp (renamed from test/asan/TestCases/Windows/stack_use_after_return.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/symbols_path.cpp (renamed from test/asan/TestCases/Windows/symbols_path.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/thread_simple.cpp (renamed from test/asan/TestCases/Windows/thread_simple.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/thread_stack_array_left_oob.cpp (renamed from test/asan/TestCases/Windows/thread_stack_array_left_oob.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/thread_stack_array_right_oob.cpp (renamed from test/asan/TestCases/Windows/thread_stack_array_right_oob.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/thread_stack_reuse.cpp (renamed from test/asan/TestCases/Windows/thread_stack_reuse.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/thread_stress.cpp (renamed from test/asan/TestCases/Windows/thread_stress.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/thread_suspended.cpp (renamed from test/asan/TestCases/Windows/thread_suspended.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/tls_init.cpp (renamed from test/asan/TestCases/Windows/tls_init.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/unsymbolized.cpp (renamed from test/asan/TestCases/Windows/unsymbolized.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/use_after_realloc.cpp (renamed from test/asan/TestCases/Windows/use_after_realloc.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/use_after_return_linkage.cpp (renamed from test/asan/TestCases/Windows/use_after_return_linkage.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/user-exception.cpp (renamed from test/asan/TestCases/Windows/user-exception.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/windows_h.cpp (renamed from test/asan/TestCases/Windows/windows_h.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/wrong_downcast_on_heap.cpp (renamed from test/asan/TestCases/Windows/wrong_downcast_on_heap.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/wrong_downcast_on_stack.cpp (renamed from test/asan/TestCases/Windows/wrong_downcast_on_stack.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/alloca_big_alignment.cpp (renamed from test/asan/TestCases/alloca_big_alignment.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/alloca_constant_size.cpp (renamed from test/asan/TestCases/alloca_constant_size.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/alloca_detect_custom_size_.cpp (renamed from test/asan/TestCases/alloca_detect_custom_size_.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/alloca_instruments_all_paddings.cpp (renamed from test/asan/TestCases/alloca_instruments_all_paddings.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/alloca_loop_unpoisoning.cpp (renamed from test/asan/TestCases/alloca_loop_unpoisoning.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/alloca_overflow_partial.cpp (renamed from test/asan/TestCases/alloca_overflow_partial.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/alloca_overflow_right.cpp (renamed from test/asan/TestCases/alloca_overflow_right.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/alloca_safe_access.cpp (renamed from test/asan/TestCases/alloca_safe_access.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/alloca_underflow_left.cpp (renamed from test/asan/TestCases/alloca_underflow_left.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/alloca_vla_interact.cpp (renamed from test/asan/TestCases/alloca_vla_interact.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/asan_and_llvm_coverage_test.cpp (renamed from test/asan/TestCases/asan_and_llvm_coverage_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/asan_options-help.cpp (renamed from test/asan/TestCases/asan_options-help.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/atexit_stats.cpp (renamed from test/asan/TestCases/atexit_stats.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/blacklist.cpp (renamed from test/asan/TestCases/blacklist.cc) | 12 | ||||
-rw-r--r-- | test/asan/TestCases/calloc-overflow.cpp (renamed from test/asan/TestCases/calloc-overflow.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/contiguous_container.cpp (renamed from test/asan/TestCases/contiguous_container.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/contiguous_container_crash.cpp (renamed from test/asan/TestCases/contiguous_container_crash.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/coverage-and-lsan.cpp (renamed from test/asan/TestCases/coverage-and-lsan.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/coverage-disabled.cpp (renamed from test/asan/TestCases/coverage-disabled.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/coverage-trace-pc.cpp (renamed from test/asan/TestCases/coverage-trace-pc.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/debug_double_free.cpp (renamed from test/asan/TestCases/debug_double_free.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/debug_locate.cpp (renamed from test/asan/TestCases/debug_locate.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/debug_mapping.cpp (renamed from test/asan/TestCases/debug_mapping.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/debug_ppc64_mapping.cpp (renamed from test/asan/TestCases/debug_ppc64_mapping.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/debug_report.cpp (renamed from test/asan/TestCases/debug_report.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/debug_stacks.cpp (renamed from test/asan/TestCases/debug_stacks.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/deep_stack_uaf.cpp (renamed from test/asan/TestCases/deep_stack_uaf.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/deep_tail_call.cpp (renamed from test/asan/TestCases/deep_tail_call.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/default_blacklist.cpp (renamed from test/asan/TestCases/default_blacklist.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/default_options.cpp (renamed from test/asan/TestCases/default_options.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/describe_address.cpp (renamed from test/asan/TestCases/describe_address.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/double-free.cpp (renamed from test/asan/TestCases/double-free.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/error_report_callback.cpp (renamed from test/asan/TestCases/error_report_callback.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/exitcode.cpp (renamed from test/asan/TestCases/exitcode.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/force_inline_opt0.cpp (renamed from test/asan/TestCases/force_inline_opt0.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/frexp_interceptor.cpp (renamed from test/asan/TestCases/frexp_interceptor.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/global-demangle.cpp (renamed from test/asan/TestCases/global-demangle.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/global-location.cpp (renamed from test/asan/TestCases/global-location.cc) | 8 | ||||
-rw-r--r-- | test/asan/TestCases/global-overflow.cpp (renamed from test/asan/TestCases/global-overflow.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/global-underflow.cc | 17 | ||||
-rw-r--r-- | test/asan/TestCases/global-underflow.cpp | 17 | ||||
-rw-r--r-- | test/asan/TestCases/handle_noreturn_bug.cpp (renamed from test/asan/TestCases/handle_noreturn_bug.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/heap-overflow-large.cpp (renamed from test/asan/TestCases/heap-overflow-large.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/heap-overflow.cpp (renamed from test/asan/TestCases/heap-overflow.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/heavy_uar_test.cpp (renamed from test/asan/TestCases/heavy_uar_test.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/huge_negative_hea_oob.cpp (renamed from test/asan/TestCases/huge_negative_hea_oob.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/ill.cpp (renamed from test/asan/TestCases/ill.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/init-order-atexit.cpp (renamed from test/asan/TestCases/init-order-atexit.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/initialization-blacklist.cpp (renamed from test/asan/TestCases/initialization-blacklist.cc) | 12 | ||||
-rw-r--r-- | test/asan/TestCases/initialization-bug.cpp (renamed from test/asan/TestCases/initialization-bug.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/initialization-constexpr.cpp (renamed from test/asan/TestCases/initialization-constexpr.cc) | 8 | ||||
-rw-r--r-- | test/asan/TestCases/initialization-nobug.cpp (renamed from test/asan/TestCases/initialization-nobug.cc) | 8 | ||||
-rw-r--r-- | test/asan/TestCases/inline.cpp (renamed from test/asan/TestCases/inline.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/intercept-rethrow-exception.cpp (renamed from test/asan/TestCases/intercept-rethrow-exception.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/interception_failure_test.cpp (renamed from test/asan/TestCases/interception_failure_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/interface_test.cpp (renamed from test/asan/TestCases/interface_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/intra-object-overflow.cpp (renamed from test/asan/TestCases/intra-object-overflow.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/invalid-free.cpp (renamed from test/asan/TestCases/invalid-free.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/invalid-pointer-pairs-compare-errors.cpp (renamed from test/asan/TestCases/invalid-pointer-pairs-compare-errors.cc) | 36 | ||||
-rw-r--r-- | test/asan/TestCases/invalid-pointer-pairs-compare-null.cpp (renamed from test/asan/TestCases/invalid-pointer-pairs-compare-null.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/invalid-pointer-pairs-compare-success.cpp (renamed from test/asan/TestCases/invalid-pointer-pairs-compare-success.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/invalid-pointer-pairs-subtract-errors.cpp (renamed from test/asan/TestCases/invalid-pointer-pairs-subtract-errors.cc) | 12 | ||||
-rw-r--r-- | test/asan/TestCases/invalid-pointer-pairs-subtract-success.cpp (renamed from test/asan/TestCases/invalid-pointer-pairs-subtract-success.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/invalid-pointer-pairs.cpp (renamed from test/asan/TestCases/invalid-pointer-pairs.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/large_func_test.cpp (renamed from test/asan/TestCases/large_func_test.cc) | 8 | ||||
-rw-r--r-- | test/asan/TestCases/log-path_test.cpp (renamed from test/asan/TestCases/log-path_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/longjmp.cpp (renamed from test/asan/TestCases/longjmp.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/lsan_annotations.cpp (renamed from test/asan/TestCases/lsan_annotations.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/malloc-size-too-big.cpp (renamed from test/asan/TestCases/malloc-size-too-big.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/malloc_context_size.cpp (renamed from test/asan/TestCases/malloc_context_size.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/malloc_fill.cpp (renamed from test/asan/TestCases/malloc_fill.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/max_redzone.cpp (renamed from test/asan/TestCases/max_redzone.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/memcmp_strict_test.cpp (renamed from test/asan/TestCases/memcmp_strict_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/memcmp_test.cpp (renamed from test/asan/TestCases/memcmp_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/memset_test.cpp (renamed from test/asan/TestCases/memset_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/null_deref.cpp (renamed from test/asan/TestCases/null_deref.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/on_error_callback.cpp (renamed from test/asan/TestCases/on_error_callback.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/partial_right.cpp (renamed from test/asan/TestCases/partial_right.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/pass-object-byval.cpp (renamed from test/asan/TestCases/pass-object-byval.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/pass-struct-byval-uar.cpp (renamed from test/asan/TestCases/pass-struct-byval-uar.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/pass-struct-byval.cpp (renamed from test/asan/TestCases/pass-struct-byval.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/poison_partial.cpp (renamed from test/asan/TestCases/poison_partial.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/pr33372.cpp (renamed from test/asan/TestCases/pr33372.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/print_summary.cpp (renamed from test/asan/TestCases/print_summary.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/realloc.cpp (renamed from test/asan/TestCases/realloc.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/scariness_score_test.cpp (renamed from test/asan/TestCases/scariness_score_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/small_memcpy_test.cpp (renamed from test/asan/TestCases/small_memcpy_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/speculative_load.cpp (renamed from test/asan/TestCases/speculative_load.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/speculative_load2.cpp (renamed from test/asan/TestCases/speculative_load2.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/stack-buffer-overflow-with-position.cpp (renamed from test/asan/TestCases/stack-buffer-overflow-with-position.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/stack-buffer-overflow.cpp (renamed from test/asan/TestCases/stack-buffer-overflow.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/stack-frame-demangle.cpp (renamed from test/asan/TestCases/stack-frame-demangle.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/stack-oob-frames.cpp (renamed from test/asan/TestCases/stack-oob-frames.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/strcat-overlap.cpp (renamed from test/asan/TestCases/strcat-overlap.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/strcpy-overlap.cpp (renamed from test/asan/TestCases/strcpy-overlap.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/strdup_oob_test.cpp (renamed from test/asan/TestCases/strdup_oob_test.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/strncat-overlap.cpp (renamed from test/asan/TestCases/strncat-overlap.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/strncpy-overflow.cpp (renamed from test/asan/TestCases/strncpy-overflow.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/strncpy-overlap.cpp (renamed from test/asan/TestCases/strncpy-overlap.cc) | 4 | ||||
-rw-r--r-- | test/asan/TestCases/suppressions-exec-relative-location.cpp (renamed from test/asan/TestCases/suppressions-exec-relative-location.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/suppressions-function.cpp (renamed from test/asan/TestCases/suppressions-function.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/suppressions-interceptor.cpp (renamed from test/asan/TestCases/suppressions-interceptor.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/suppressions-library.cpp (renamed from test/asan/TestCases/suppressions-library.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/throw_call_test.cpp (renamed from test/asan/TestCases/throw_call_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/throw_catch.cpp (renamed from test/asan/TestCases/throw_catch.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/throw_invoke_test.cpp (renamed from test/asan/TestCases/throw_invoke_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/time_interceptor.cpp (renamed from test/asan/TestCases/time_interceptor.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/uar_and_exceptions.cpp (renamed from test/asan/TestCases/uar_and_exceptions.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/unaligned_loads_and_stores.cpp (renamed from test/asan/TestCases/unaligned_loads_and_stores.cc) | 20 | ||||
-rw-r--r-- | test/asan/TestCases/use-after-delete.cpp (renamed from test/asan/TestCases/use-after-delete.cc) | 6 | ||||
-rw-r--r-- | test/asan/TestCases/use-after-free-right.cpp (renamed from test/asan/TestCases/use-after-free-right.cc) | 10 | ||||
-rw-r--r-- | test/asan/TestCases/use-after-free.cpp (renamed from test/asan/TestCases/use-after-free.cc) | 10 | ||||
-rw-r--r-- | test/asan/TestCases/use-after-poison.cpp (renamed from test/asan/TestCases/use-after-poison.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/use-after-scope-capture.cpp (renamed from test/asan/TestCases/use-after-scope-capture.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/use-after-scope-conversion.cpp (renamed from test/asan/TestCases/use-after-scope-conversion.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/use-after-scope-dtor-order.cpp (renamed from test/asan/TestCases/use-after-scope-dtor-order.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/use-after-scope-goto.cpp (renamed from test/asan/TestCases/use-after-scope-goto.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/use-after-scope-if.cpp (renamed from test/asan/TestCases/use-after-scope-if.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/use-after-scope-inlined.cpp (renamed from test/asan/TestCases/use-after-scope-inlined.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/use-after-scope-loop-bug.cpp (renamed from test/asan/TestCases/use-after-scope-loop-bug.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/use-after-scope-loop-removed.cpp (renamed from test/asan/TestCases/use-after-scope-loop-removed.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/use-after-scope-loop.cpp (renamed from test/asan/TestCases/use-after-scope-loop.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/use-after-scope-nobug.cpp (renamed from test/asan/TestCases/use-after-scope-nobug.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/use-after-scope-temp.cpp (renamed from test/asan/TestCases/use-after-scope-temp.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/use-after-scope-temp2.cpp (renamed from test/asan/TestCases/use-after-scope-temp2.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/use-after-scope-types.cpp (renamed from test/asan/TestCases/use-after-scope-types.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/use-after-scope.cpp (renamed from test/asan/TestCases/use-after-scope.cc) | 2 | ||||
-rw-r--r-- | test/asan/TestCases/verbose-log-path_test.cpp (renamed from test/asan/TestCases/verbose-log-path_test.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/vla_chrome_testcase.cpp (renamed from test/asan/TestCases/vla_chrome_testcase.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/vla_condition_overflow.cpp (renamed from test/asan/TestCases/vla_condition_overflow.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/vla_loop_overfow.cpp (renamed from test/asan/TestCases/vla_loop_overfow.cc) | 0 | ||||
-rw-r--r-- | test/asan/TestCases/zero_page_pc.cpp (renamed from test/asan/TestCases/zero_page_pc.cc) | 0 | ||||
-rw-r--r-- | test/lit.common.cfg.py | 2 |
422 files changed, 353 insertions, 353 deletions
diff --git a/CMakeLists.txt b/CMakeLists.txt index f69d6b83e..0b01ab501 100644 --- a/CMakeLists.txt +++ b/CMakeLists.txt @@ -281,7 +281,7 @@ append_list_if(COMPILER_RT_HAS_FNO_LTO_FLAG -fno-lto SANITIZER_COMMON_CFLAGS) # The following is a workaround for powerpc64le. This is the only architecture # that requires -fno-function-sections to work properly. If lacking, the ASan -# Linux test function-sections-are-bad.cc fails with the following error: +# Linux test function-sections-are-bad.cpp fails with the following error: # 'undefined symbol: __sanitizer_unaligned_load32'. if(DEFINED TARGET_powerpc64le_CFLAGS) append_list_if(COMPILER_RT_HAS_FNO_FUNCTION_SECTIONS_FLAG -fno-function-sections TARGET_powerpc64le_CFLAGS) diff --git a/lib/asan/tests/asan_test.cpp b/lib/asan/tests/asan_test.cpp index 1318727c8..47bba08cc 100644 --- a/lib/asan/tests/asan_test.cpp +++ b/lib/asan/tests/asan_test.cpp @@ -531,7 +531,7 @@ TEST(AddressSanitizer, ManyStackObjectsTest) { #endif #if 0 // This test requires online symbolizer. -// Moved to lit_tests/stack-oob-frames.cc. +// Moved to lit_tests/stack-oob-frames.cpp. // Reenable here once we have online symbolizer by default. NOINLINE static void Frame0(int frame, char *a, char *b, char *c) { char d[4] = {0}; diff --git a/lib/sanitizer_common/scripts/check_lint.sh b/lib/sanitizer_common/scripts/check_lint.sh index ad9060566..ed1cf010b 100755 --- a/lib/sanitizer_common/scripts/check_lint.sh +++ b/lib/sanitizer_common/scripts/check_lint.sh @@ -85,7 +85,7 @@ run_lint ${ASAN_RTL_LINT_FILTER} ${ASAN_RTL}/*.cpp \ ${ASAN_RTL}/*.h & run_lint ${ASAN_TEST_LINT_FILTER} ${ASAN_RTL}/tests/*.cpp \ ${ASAN_RTL}/tests/*.h & -run_lint ${ASAN_LIT_TEST_LINT_FILTER} ${LIT_TESTS}/asan/*/*.cc & +run_lint ${ASAN_LIT_TEST_LINT_FILTER} ${LIT_TESTS}/asan/*/*.cpp & # TSan TSAN_RTL=${COMPILER_RT}/lib/tsan @@ -122,7 +122,7 @@ run_lint ${SCUDO_RTL_LINT_FILTER} ${SCUDO_RTL}/*.cpp \ FILES=${COMMON_RTL}/*.inc TMPFILES="" for FILE in $FILES; do - TMPFILE="$(${MKTEMP}).$(basename ${FILE}).cc" + TMPFILE="$(${MKTEMP}).$(basename ${FILE}).cpp" cp -f $FILE $TMPFILE run_lint ${COMMON_RTL_INC_LINT_FILTER} $TMPFILE & TMPFILES="$TMPFILES $TMPFILE" diff --git a/test/asan/TestCases/Darwin/abort_on_error.cc b/test/asan/TestCases/Darwin/abort_on_error.cpp index 0aa123414..7ee473b74 100644 --- a/test/asan/TestCases/Darwin/abort_on_error.cc +++ b/test/asan/TestCases/Darwin/abort_on_error.cpp @@ -1,5 +1,5 @@ // Check that with empty ASAN_OPTIONS, ASan reports on OS X actually crash -// the process (abort_on_error=1). See also Linux/abort_on_error.cc. +// the process (abort_on_error=1). See also Linux/abort_on_error.cpp. // RUN: %clangxx_asan %s -o %t diff --git a/test/asan/TestCases/Darwin/asan-symbolize-partial-report-no-external-symbolizer.cc b/test/asan/TestCases/Darwin/asan-symbolize-partial-report-no-external-symbolizer.cpp index ec4ae0068..cb96ff762 100644 --- a/test/asan/TestCases/Darwin/asan-symbolize-partial-report-no-external-symbolizer.cc +++ b/test/asan/TestCases/Darwin/asan-symbolize-partial-report-no-external-symbolizer.cpp @@ -23,7 +23,7 @@ // CHECK-FS: WRITE of size 4 extern "C" void foo(int* a) { - // CHECK-FS: #0 0x{{.+}} in foo {{.*}}asan-symbolize-partial-report-no-external-symbolizer.cc:[[@LINE+1]] + // CHECK-FS: #0 0x{{.+}} in foo {{.*}}asan-symbolize-partial-report-no-external-symbolizer.cpp:[[@LINE+1]] *a = 5; } @@ -32,7 +32,7 @@ int main() { if (!a) return 0; free(a); - // CHECK-FS: #1 0x{{.+}} in main {{.*}}asan-symbolize-partial-report-no-external-symbolizer.cc:[[@LINE+1]] + // CHECK-FS: #1 0x{{.+}} in main {{.*}}asan-symbolize-partial-report-no-external-symbolizer.cpp:[[@LINE+1]] foo(a); return 0; } diff --git a/test/asan/TestCases/Darwin/asan-symbolize-partial-report-with-module-map.cc b/test/asan/TestCases/Darwin/asan-symbolize-partial-report-with-module-map.cpp index 23ca8e639..c9a9c4521 100644 --- a/test/asan/TestCases/Darwin/asan-symbolize-partial-report-with-module-map.cc +++ b/test/asan/TestCases/Darwin/asan-symbolize-partial-report-with-module-map.cpp @@ -25,7 +25,7 @@ // CHECK-FS: WRITE of size 4 extern "C" void foo(int* a) { - // CHECK-FS: #0 0x{{.+}} in foo {{.*}}asan-symbolize-partial-report-with-module-map.cc:[[@LINE+1]] + // CHECK-FS: #0 0x{{.+}} in foo {{.*}}asan-symbolize-partial-report-with-module-map.cpp:[[@LINE+1]] *a = 5; } @@ -34,7 +34,7 @@ int main() { if (!a) return 0; free(a); - // CHECK-FS: #1 0x{{.+}} in main {{.*}}asan-symbolize-partial-report-with-module-map.cc:[[@LINE+1]] + // CHECK-FS: #1 0x{{.+}} in main {{.*}}asan-symbolize-partial-report-with-module-map.cpp:[[@LINE+1]] foo(a); return 0; } diff --git a/test/asan/TestCases/Darwin/asan-symbolize-with-module-map.cc b/test/asan/TestCases/Darwin/asan-symbolize-with-module-map.cpp index 4557adeb0..56e1e9940 100644 --- a/test/asan/TestCases/Darwin/asan-symbolize-with-module-map.cc +++ b/test/asan/TestCases/Darwin/asan-symbolize-with-module-map.cpp @@ -16,7 +16,7 @@ // CHECK-MM: WRITE of size 4 extern "C" void foo(int* a) { - // CHECK-MM: #0 0x{{.+}} in foo {{.*}}asan-symbolize-with-module-map.cc:[[@LINE+1]] + // CHECK-MM: #0 0x{{.+}} in foo {{.*}}asan-symbolize-with-module-map.cpp:[[@LINE+1]] *a = 5; } @@ -25,7 +25,7 @@ int main() { if (!a) return 0; free(a); - // CHECK-MM: #1 0x{{.+}} in main {{.*}}asan-symbolize-with-module-map.cc:[[@LINE+1]] + // CHECK-MM: #1 0x{{.+}} in main {{.*}}asan-symbolize-with-module-map.cpp:[[@LINE+1]] foo(a); return 0; } diff --git a/test/asan/TestCases/Darwin/asan_gen_prefixes.cc b/test/asan/TestCases/Darwin/asan_gen_prefixes.cpp index fe337433d..fe337433d 100644 --- a/test/asan/TestCases/Darwin/asan_gen_prefixes.cc +++ b/test/asan/TestCases/Darwin/asan_gen_prefixes.cpp diff --git a/test/asan/TestCases/Darwin/atos-symbolizer-dyld-root-path.cc b/test/asan/TestCases/Darwin/atos-symbolizer-dyld-root-path.cpp index fc3d0dd0b..664471b69 100644 --- a/test/asan/TestCases/Darwin/atos-symbolizer-dyld-root-path.cc +++ b/test/asan/TestCases/Darwin/atos-symbolizer-dyld-root-path.cpp @@ -20,11 +20,11 @@ int main(int argc, char **argv) { // CHECK: Using atos at user-specified path: // CHECK: AddressSanitizer: attempting double-free{{.*}}in thread T0 // CHECK: #0 0x{{.*}} in {{.*}}free - // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer-dyld-root-path.cc:[[@LINE-4]] + // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer-dyld-root-path.cpp:[[@LINE-4]] // CHECK: freed by thread T0 here: // CHECK: #0 0x{{.*}} in {{.*}}free - // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer-dyld-root-path.cc:[[@LINE-8]] + // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer-dyld-root-path.cpp:[[@LINE-8]] // CHECK: allocated by thread T0 here: - // CHECK: atos-symbolizer-dyld-root-path.cc:[[@LINE-13]] + // CHECK: atos-symbolizer-dyld-root-path.cpp:[[@LINE-13]] return res; } diff --git a/test/asan/TestCases/Darwin/atos-symbolizer.cc b/test/asan/TestCases/Darwin/atos-symbolizer.cpp index e7d7e7a17..bab4e4f37 100644 --- a/test/asan/TestCases/Darwin/atos-symbolizer.cc +++ b/test/asan/TestCases/Darwin/atos-symbolizer.cpp @@ -17,11 +17,11 @@ int main(int argc, char **argv) { // CHECK: Using atos at user-specified path: // CHECK: AddressSanitizer: attempting double-free{{.*}}in thread T0 // CHECK: #0 0x{{.*}} in {{.*}}free - // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer.cc:[[@LINE-4]] + // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer.cpp:[[@LINE-4]] // CHECK: freed by thread T0 here: // CHECK: #0 0x{{.*}} in {{.*}}free - // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer.cc:[[@LINE-8]] + // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer.cpp:[[@LINE-8]] // CHECK: allocated by thread T0 here: - // CHECK: atos-symbolizer.cc:[[@LINE-13]] + // CHECK: atos-symbolizer.cpp:[[@LINE-13]] return res; } diff --git a/test/asan/TestCases/Darwin/dladdr-demangling.cc b/test/asan/TestCases/Darwin/dladdr-demangling.cpp index fb6f6d79b..fb6f6d79b 100644 --- a/test/asan/TestCases/Darwin/dladdr-demangling.cc +++ b/test/asan/TestCases/Darwin/dladdr-demangling.cpp diff --git a/test/asan/TestCases/Darwin/dump_registers.cc b/test/asan/TestCases/Darwin/dump_registers.cpp index cc2710f06..cc2710f06 100644 --- a/test/asan/TestCases/Darwin/dump_registers.cc +++ b/test/asan/TestCases/Darwin/dump_registers.cpp diff --git a/test/asan/TestCases/Darwin/dyld_insert_libraries_reexec.cc b/test/asan/TestCases/Darwin/dyld_insert_libraries_reexec.cpp index d195258d7..d195258d7 100644 --- a/test/asan/TestCases/Darwin/dyld_insert_libraries_reexec.cc +++ b/test/asan/TestCases/Darwin/dyld_insert_libraries_reexec.cpp diff --git a/test/asan/TestCases/Darwin/dyld_insert_libraries_remove.cc b/test/asan/TestCases/Darwin/dyld_insert_libraries_remove.cpp index 0672e064a..0672e064a 100644 --- a/test/asan/TestCases/Darwin/dyld_insert_libraries_remove.cc +++ b/test/asan/TestCases/Darwin/dyld_insert_libraries_remove.cpp diff --git a/test/asan/TestCases/Darwin/empty-section.cc b/test/asan/TestCases/Darwin/empty-section.cpp index 5b006b545..5b006b545 100644 --- a/test/asan/TestCases/Darwin/empty-section.cc +++ b/test/asan/TestCases/Darwin/empty-section.cpp diff --git a/test/asan/TestCases/Darwin/haswell-symbolication.cc b/test/asan/TestCases/Darwin/haswell-symbolication.cpp index 7856c4d61..f5ed831f2 100644 --- a/test/asan/TestCases/Darwin/haswell-symbolication.cc +++ b/test/asan/TestCases/Darwin/haswell-symbolication.cpp @@ -84,7 +84,7 @@ extern "C" void faulty_func(char *p) { *p = 'x'; // BOOM // CHECK: AddressSanitizer: global-buffer-overflow - // CHECK-LI: #0 0x{{.*}} in faulty_func{{.*}} {{.*}}haswell-symbolication.cc:[[@LINE-2]] + // CHECK-LI: #0 0x{{.*}} in faulty_func{{.*}} {{.*}}haswell-symbolication.cpp:[[@LINE-2]] // CHECK-NOLI: #0 0x{{.*}} in faulty_func{{.*}} {{.*}}haswell-symbolication // CHECK: is located 2 bytes to the right of global variable 'faulty_global' // CHECK-NOT: LLVMSymbolizer: error reading file diff --git a/test/asan/TestCases/Darwin/init_for_dlopen.cc b/test/asan/TestCases/Darwin/init_for_dlopen.cpp index 8a0fbf943..8a0fbf943 100644 --- a/test/asan/TestCases/Darwin/init_for_dlopen.cc +++ b/test/asan/TestCases/Darwin/init_for_dlopen.cpp diff --git a/test/asan/TestCases/Darwin/interface_symbols_darwin.cc b/test/asan/TestCases/Darwin/interface_symbols_darwin.cpp index a8e2bcb3e..a8e2bcb3e 100644 --- a/test/asan/TestCases/Darwin/interface_symbols_darwin.cc +++ b/test/asan/TestCases/Darwin/interface_symbols_darwin.cpp diff --git a/test/asan/TestCases/Darwin/linked-only.cc b/test/asan/TestCases/Darwin/linked-only.cpp index bb19ea853..bb19ea853 100644 --- a/test/asan/TestCases/Darwin/linked-only.cc +++ b/test/asan/TestCases/Darwin/linked-only.cpp diff --git a/test/asan/TestCases/Darwin/malloc_destroy_zone.cc b/test/asan/TestCases/Darwin/malloc_destroy_zone.cpp index 9144bd689..9144bd689 100644 --- a/test/asan/TestCases/Darwin/malloc_destroy_zone.cc +++ b/test/asan/TestCases/Darwin/malloc_destroy_zone.cpp diff --git a/test/asan/TestCases/Darwin/malloc_set_zone_name-mprotect.cc b/test/asan/TestCases/Darwin/malloc_set_zone_name-mprotect.cpp index b9b96ef05..b9b96ef05 100644 --- a/test/asan/TestCases/Darwin/malloc_set_zone_name-mprotect.cc +++ b/test/asan/TestCases/Darwin/malloc_set_zone_name-mprotect.cpp diff --git a/test/asan/TestCases/Darwin/malloc_zone-protected.cc b/test/asan/TestCases/Darwin/malloc_zone-protected.cpp index 362b60e20..362b60e20 100644 --- a/test/asan/TestCases/Darwin/malloc_zone-protected.cc +++ b/test/asan/TestCases/Darwin/malloc_zone-protected.cpp diff --git a/test/asan/TestCases/Darwin/mixing-global-constructors.cc b/test/asan/TestCases/Darwin/mixing-global-constructors.cpp index 0b0f15cc7..0b0f15cc7 100644 --- a/test/asan/TestCases/Darwin/mixing-global-constructors.cc +++ b/test/asan/TestCases/Darwin/mixing-global-constructors.cpp diff --git a/test/asan/TestCases/Darwin/odr-lto.cc b/test/asan/TestCases/Darwin/odr-lto.cpp index e1e454be0..e1e454be0 100644 --- a/test/asan/TestCases/Darwin/odr-lto.cc +++ b/test/asan/TestCases/Darwin/odr-lto.cpp diff --git a/test/asan/TestCases/Darwin/reexec-insert-libraries-env.cc b/test/asan/TestCases/Darwin/reexec-insert-libraries-env.cpp index bee23f25c..bee23f25c 100644 --- a/test/asan/TestCases/Darwin/reexec-insert-libraries-env.cc +++ b/test/asan/TestCases/Darwin/reexec-insert-libraries-env.cpp diff --git a/test/asan/TestCases/Darwin/sandbox-symbolizer.cc b/test/asan/TestCases/Darwin/sandbox-symbolizer.cpp index b36c4faed..b36c4faed 100644 --- a/test/asan/TestCases/Darwin/sandbox-symbolizer.cc +++ b/test/asan/TestCases/Darwin/sandbox-symbolizer.cpp diff --git a/test/asan/TestCases/Darwin/scribble.cc b/test/asan/TestCases/Darwin/scribble.cpp index 8303cf316..8303cf316 100644 --- a/test/asan/TestCases/Darwin/scribble.cc +++ b/test/asan/TestCases/Darwin/scribble.cpp diff --git a/test/asan/TestCases/Darwin/suppressions-darwin.cc b/test/asan/TestCases/Darwin/suppressions-darwin.cpp index 8c207b102..8c207b102 100644 --- a/test/asan/TestCases/Darwin/suppressions-darwin.cc +++ b/test/asan/TestCases/Darwin/suppressions-darwin.cpp diff --git a/test/asan/TestCases/Darwin/suppressions-function.cc b/test/asan/TestCases/Darwin/suppressions-function.cpp index f58796fb8..f58796fb8 100644 --- a/test/asan/TestCases/Darwin/suppressions-function.cc +++ b/test/asan/TestCases/Darwin/suppressions-function.cpp diff --git a/test/asan/TestCases/Darwin/suppressions-sandbox.cc b/test/asan/TestCases/Darwin/suppressions-sandbox.cpp index 966f21346..966f21346 100644 --- a/test/asan/TestCases/Darwin/suppressions-sandbox.cc +++ b/test/asan/TestCases/Darwin/suppressions-sandbox.cpp diff --git a/test/asan/TestCases/Darwin/unset-insert-libraries-on-exec.cc b/test/asan/TestCases/Darwin/unset-insert-libraries-on-exec.cpp index 38fb3aa55..a4fa04744 100644 --- a/test/asan/TestCases/Darwin/unset-insert-libraries-on-exec.cc +++ b/test/asan/TestCases/Darwin/unset-insert-libraries-on-exec.cpp @@ -2,7 +2,7 @@ // executing other programs. // RUN: %clangxx_asan %s -o %t -// RUN: %clangxx %p/../Helpers/echo-env.cc -o %t-echo-env +// RUN: %clangxx %p/../Helpers/echo-env.cpp -o %t-echo-env // RUN: %clangxx -DSHARED_LIB %s \ // RUN: -dynamiclib -o %t-darwin-dummy-shared-lib-so.dylib diff --git a/test/asan/TestCases/Darwin/uuid.cc b/test/asan/TestCases/Darwin/uuid.cpp index 33638587e..ba2d4494d 100644 --- a/test/asan/TestCases/Darwin/uuid.cc +++ b/test/asan/TestCases/Darwin/uuid.cpp @@ -25,7 +25,7 @@ int main(int argc, char *argv[]) { memcpy(mybuf, x, 10); // CHECK: {{.*ERROR: AddressSanitizer: heap-use-after-free on address}} // CHECK: Process module map: - // CHECK: uuid.cc.tmp {{.*}} <[[UUID]]> + // CHECK: uuid.cpp.tmp {{.*}} <[[UUID]]> fprintf(stderr, "Done.\n"); } diff --git a/test/asan/TestCases/Helpers/blacklist-extra.cc b/test/asan/TestCases/Helpers/blacklist-extra.cpp index 627115cdd..627115cdd 100644 --- a/test/asan/TestCases/Helpers/blacklist-extra.cc +++ b/test/asan/TestCases/Helpers/blacklist-extra.cpp diff --git a/test/asan/TestCases/Helpers/echo-env.cc b/test/asan/TestCases/Helpers/echo-env.cpp index 65e91c155..48b46fcd8 100644 --- a/test/asan/TestCases/Helpers/echo-env.cc +++ b/test/asan/TestCases/Helpers/echo-env.cpp @@ -1,5 +1,5 @@ // Helper binary for -// lit_tests/TestCases/Darwin/unset-insert-libraries-on-exec.cc +// lit_tests/TestCases/Darwin/unset-insert-libraries-on-exec.cpp // Prints the environment variable with the given name. #include <stdio.h> #include <stdlib.h> diff --git a/test/asan/TestCases/Helpers/init-order-atexit-extra.cc b/test/asan/TestCases/Helpers/init-order-atexit-extra.cpp index e4189d19d..e4189d19d 100644 --- a/test/asan/TestCases/Helpers/init-order-atexit-extra.cc +++ b/test/asan/TestCases/Helpers/init-order-atexit-extra.cpp diff --git a/test/asan/TestCases/Helpers/initialization-blacklist-extra.cc b/test/asan/TestCases/Helpers/initialization-blacklist-extra.cpp index 09aed2112..09aed2112 100644 --- a/test/asan/TestCases/Helpers/initialization-blacklist-extra.cc +++ b/test/asan/TestCases/Helpers/initialization-blacklist-extra.cpp diff --git a/test/asan/TestCases/Helpers/initialization-blacklist-extra2.cc b/test/asan/TestCases/Helpers/initialization-blacklist-extra2.cpp index 69455a0a6..69455a0a6 100644 --- a/test/asan/TestCases/Helpers/initialization-blacklist-extra2.cc +++ b/test/asan/TestCases/Helpers/initialization-blacklist-extra2.cpp diff --git a/test/asan/TestCases/Helpers/initialization-blacklist.txt b/test/asan/TestCases/Helpers/initialization-blacklist.txt index 832946356..27e49e25f 100644 --- a/test/asan/TestCases/Helpers/initialization-blacklist.txt +++ b/test/asan/TestCases/Helpers/initialization-blacklist.txt @@ -1,3 +1,3 @@ global:*badGlobal*=init type:*badNamespace::BadClass*=init -src:*initialization-blacklist-extra2.cc=init +src:*initialization-blacklist-extra2.cpp=init diff --git a/test/asan/TestCases/Helpers/initialization-bug-extra.cc b/test/asan/TestCases/Helpers/initialization-bug-extra.cpp index 3c4cb411d..3c4cb411d 100644 --- a/test/asan/TestCases/Helpers/initialization-bug-extra.cc +++ b/test/asan/TestCases/Helpers/initialization-bug-extra.cpp diff --git a/test/asan/TestCases/Helpers/initialization-bug-extra2.cc b/test/asan/TestCases/Helpers/initialization-bug-extra2.cpp index a3d8f190e..a3d8f190e 100644 --- a/test/asan/TestCases/Helpers/initialization-bug-extra2.cc +++ b/test/asan/TestCases/Helpers/initialization-bug-extra2.cpp diff --git a/test/asan/TestCases/Helpers/initialization-constexpr-extra.cc b/test/asan/TestCases/Helpers/initialization-constexpr-extra.cpp index b32466a98..b32466a98 100644 --- a/test/asan/TestCases/Helpers/initialization-constexpr-extra.cc +++ b/test/asan/TestCases/Helpers/initialization-constexpr-extra.cpp diff --git a/test/asan/TestCases/Helpers/initialization-nobug-extra.cc b/test/asan/TestCases/Helpers/initialization-nobug-extra.cpp index 886165aff..886165aff 100644 --- a/test/asan/TestCases/Helpers/initialization-nobug-extra.cc +++ b/test/asan/TestCases/Helpers/initialization-nobug-extra.cpp diff --git a/test/asan/TestCases/Helpers/underflow.cc b/test/asan/TestCases/Helpers/underflow.cpp index 26979482f..26979482f 100644 --- a/test/asan/TestCases/Helpers/underflow.cc +++ b/test/asan/TestCases/Helpers/underflow.cpp diff --git a/test/asan/TestCases/Linux/abort_on_error.cc b/test/asan/TestCases/Linux/abort_on_error.cpp index 3fe98995f..a78048388 100644 --- a/test/asan/TestCases/Linux/abort_on_error.cc +++ b/test/asan/TestCases/Linux/abort_on_error.cpp @@ -1,5 +1,5 @@ // Check that with empty ASAN_OPTIONS, ASan reports on Linux don't crash -// the process (abort_on_error=0). See also Darwin/abort_on_error.cc. +// the process (abort_on_error=0). See also Darwin/abort_on_error.cpp. // RUN: %clangxx_asan %s -o %t diff --git a/test/asan/TestCases/Linux/activation-options.cc b/test/asan/TestCases/Linux/activation-options.cpp index 39924c4b1..0074a6699 100644 --- a/test/asan/TestCases/Linux/activation-options.cc +++ b/test/asan/TestCases/Linux/activation-options.cpp @@ -6,9 +6,9 @@ // RUN: %clangxx -O0 %s -c -o %t.o // RUN: %clangxx_asan -O0 %t.o %libdl -o %t -// RUN: rm -f %t.asan.options.activation-options.cc.tmp +// RUN: rm -f %t.asan.options.activation-options.cpp.tmp // RUN: rm -f %t.asan.options.ABCDE -// RUN: echo "help=1" >%t.asan.options.activation-options.cc.tmp +// RUN: echo "help=1" >%t.asan.options.activation-options.cpp.tmp // RUN: %env_asan_opts=start_deactivated=1 \ // RUN: ASAN_ACTIVATION_OPTIONS=include=%t.asan.options.%b %run %t 2>&1 | \ diff --git a/test/asan/TestCases/Linux/aligned_delete_test.cc b/test/asan/TestCases/Linux/aligned_delete_test.cpp index 2325242e0..2325242e0 100644 --- a/test/asan/TestCases/Linux/aligned_delete_test.cc +++ b/test/asan/TestCases/Linux/aligned_delete_test.cpp diff --git a/test/asan/TestCases/Linux/allocator_oom_test.cc b/test/asan/TestCases/Linux/allocator_oom_test.cpp index c450ae5bb..c450ae5bb 100644 --- a/test/asan/TestCases/Linux/allocator_oom_test.cc +++ b/test/asan/TestCases/Linux/allocator_oom_test.cpp diff --git a/test/asan/TestCases/Linux/asan_default_suppressions.cc b/test/asan/TestCases/Linux/asan_default_suppressions.cpp index 5ff59c1df..5ff59c1df 100644 --- a/test/asan/TestCases/Linux/asan_default_suppressions.cc +++ b/test/asan/TestCases/Linux/asan_default_suppressions.cpp diff --git a/test/asan/TestCases/Linux/asan_dlopen_test.cc b/test/asan/TestCases/Linux/asan_dlopen_test.cpp index 5081b7753..5081b7753 100644 --- a/test/asan/TestCases/Linux/asan_dlopen_test.cc +++ b/test/asan/TestCases/Linux/asan_dlopen_test.cpp diff --git a/test/asan/TestCases/Linux/asan_prelink_test.cc b/test/asan/TestCases/Linux/asan_prelink_test.cpp index e00c215e9..e00c215e9 100644 --- a/test/asan/TestCases/Linux/asan_prelink_test.cc +++ b/test/asan/TestCases/Linux/asan_prelink_test.cpp diff --git a/test/asan/TestCases/Linux/asan_preload_test-1.cc b/test/asan/TestCases/Linux/asan_preload_test-1.cpp index e11bd623d..e11bd623d 100644 --- a/test/asan/TestCases/Linux/asan_preload_test-1.cc +++ b/test/asan/TestCases/Linux/asan_preload_test-1.cpp diff --git a/test/asan/TestCases/Linux/asan_preload_test-2.cc b/test/asan/TestCases/Linux/asan_preload_test-2.cpp index 817c560d4..817c560d4 100644 --- a/test/asan/TestCases/Linux/asan_preload_test-2.cc +++ b/test/asan/TestCases/Linux/asan_preload_test-2.cpp diff --git a/test/asan/TestCases/Linux/asan_preload_test-3.cc b/test/asan/TestCases/Linux/asan_preload_test-3.cpp index e998ff647..e998ff647 100644 --- a/test/asan/TestCases/Linux/asan_preload_test-3.cc +++ b/test/asan/TestCases/Linux/asan_preload_test-3.cpp diff --git a/test/asan/TestCases/Linux/asan_rt_confict_test-1.cc b/test/asan/TestCases/Linux/asan_rt_confict_test-1.cpp index 8cf761c90..8cf761c90 100644 --- a/test/asan/TestCases/Linux/asan_rt_confict_test-1.cc +++ b/test/asan/TestCases/Linux/asan_rt_confict_test-1.cpp diff --git a/test/asan/TestCases/Linux/asan_rt_confict_test-2.cc b/test/asan/TestCases/Linux/asan_rt_confict_test-2.cpp index 6328cbb2c..6328cbb2c 100644 --- a/test/asan/TestCases/Linux/asan_rt_confict_test-2.cc +++ b/test/asan/TestCases/Linux/asan_rt_confict_test-2.cpp diff --git a/test/asan/TestCases/Linux/auto_memory_profile_test.cc b/test/asan/TestCases/Linux/auto_memory_profile_test.cpp index 3f8ad4673..3f8ad4673 100644 --- a/test/asan/TestCases/Linux/auto_memory_profile_test.cc +++ b/test/asan/TestCases/Linux/auto_memory_profile_test.cpp diff --git a/test/asan/TestCases/Linux/bzero.cc b/test/asan/TestCases/Linux/bzero.cpp index 430edb744..430edb744 100644 --- a/test/asan/TestCases/Linux/bzero.cc +++ b/test/asan/TestCases/Linux/bzero.cpp diff --git a/test/asan/TestCases/Linux/clang_gcc_abi.cc b/test/asan/TestCases/Linux/clang_gcc_abi.cpp index e0ae3f1f8..0c3fa0aed 100644 --- a/test/asan/TestCases/Linux/clang_gcc_abi.cc +++ b/test/asan/TestCases/Linux/clang_gcc_abi.cpp @@ -11,12 +11,12 @@ __attribute__((noinline)) int boom() { volatile int three = 3; char * volatile s = (char *)malloc(three); -// CHECK: #1 0x{{.*}} in boom {{.*}}clang_gcc_abi.cc:[[@LINE-1]] +// CHECK: #1 0x{{.*}} in boom {{.*}}clang_gcc_abi.cpp:[[@LINE-1]] return s[three]; //BOOM } __attribute__((naked, noinline)) void gcc_abi() { -// CHECK: #2 0x{{.*}} in gcc_abi {{.*}}clang_gcc_abi.cc:[[@LINE+1]] +// CHECK: #2 0x{{.*}} in gcc_abi {{.*}}clang_gcc_abi.cpp:[[@LINE+1]] asm volatile("str fp, [sp, #-8]!\n\t" "str lr, [sp, #4]\n\t" "add fp, sp, #4\n\t" @@ -29,7 +29,7 @@ __attribute__((naked, noinline)) void gcc_abi() { } __attribute__((naked, noinline)) void clang_abi() { -// CHECK: #3 0x{{.*}} in clang_abi {{.*}}clang_gcc_abi.cc:[[@LINE+1]] +// CHECK: #3 0x{{.*}} in clang_abi {{.*}}clang_gcc_abi.cpp:[[@LINE+1]] asm volatile("push {r11, lr}\n\t" "mov r11, sp\n\t" "bl gcc_abi\n\t" @@ -40,5 +40,5 @@ __attribute__((naked, noinline)) void clang_abi() { int main() { clang_abi(); -// CHECK: #4 0x{{.*}} in main {{.*}}clang_gcc_abi.cc:[[@LINE-1]] +// CHECK: #4 0x{{.*}} in main {{.*}}clang_gcc_abi.cpp:[[@LINE-1]] } diff --git a/test/asan/TestCases/Linux/clone_test.cc b/test/asan/TestCases/Linux/clone_test.cpp index 0b86238cc..0b86238cc 100644 --- a/test/asan/TestCases/Linux/clone_test.cc +++ b/test/asan/TestCases/Linux/clone_test.cpp diff --git a/test/asan/TestCases/Linux/coverage-missing.cc b/test/asan/TestCases/Linux/coverage-missing.cpp index 10acef9af..10acef9af 100644 --- a/test/asan/TestCases/Linux/coverage-missing.cc +++ b/test/asan/TestCases/Linux/coverage-missing.cpp diff --git a/test/asan/TestCases/Linux/cuda_test.cc b/test/asan/TestCases/Linux/cuda_test.cpp index e532f2ee7..e532f2ee7 100644 --- a/test/asan/TestCases/Linux/cuda_test.cc +++ b/test/asan/TestCases/Linux/cuda_test.cpp diff --git a/test/asan/TestCases/Linux/function-sections-are-bad.cc b/test/asan/TestCases/Linux/function-sections-are-bad.cpp index 15aaccbc9..15aaccbc9 100644 --- a/test/asan/TestCases/Linux/function-sections-are-bad.cc +++ b/test/asan/TestCases/Linux/function-sections-are-bad.cpp diff --git a/test/asan/TestCases/Linux/global-overflow-bfd.cc b/test/asan/TestCases/Linux/global-overflow-bfd.cpp index 117a761af..117a761af 100644 --- a/test/asan/TestCases/Linux/global-overflow-bfd.cc +++ b/test/asan/TestCases/Linux/global-overflow-bfd.cpp diff --git a/test/asan/TestCases/Linux/global-overflow-lld.cc b/test/asan/TestCases/Linux/global-overflow-lld.cpp index f4d0bc977..f4d0bc977 100644 --- a/test/asan/TestCases/Linux/global-overflow-lld.cc +++ b/test/asan/TestCases/Linux/global-overflow-lld.cpp diff --git a/test/asan/TestCases/Linux/globals-gc-sections-lld.cc b/test/asan/TestCases/Linux/globals-gc-sections-lld.cpp index 0d8bcdd1c..0d8bcdd1c 100644 --- a/test/asan/TestCases/Linux/globals-gc-sections-lld.cc +++ b/test/asan/TestCases/Linux/globals-gc-sections-lld.cpp diff --git a/test/asan/TestCases/Linux/init-order-dlopen.cc b/test/asan/TestCases/Linux/init-order-dlopen.cpp index d469b9808..d469b9808 100644 --- a/test/asan/TestCases/Linux/init-order-dlopen.cc +++ b/test/asan/TestCases/Linux/init-order-dlopen.cpp diff --git a/test/asan/TestCases/Linux/init_fini_sections.cc b/test/asan/TestCases/Linux/init_fini_sections.cpp index 3037b2329..3037b2329 100644 --- a/test/asan/TestCases/Linux/init_fini_sections.cc +++ b/test/asan/TestCases/Linux/init_fini_sections.cpp diff --git a/test/asan/TestCases/Linux/initialization-bug-any-order.cc b/test/asan/TestCases/Linux/initialization-bug-any-order.cpp index 85fefd40e..5936cc6b9 100644 --- a/test/asan/TestCases/Linux/initialization-bug-any-order.cc +++ b/test/asan/TestCases/Linux/initialization-bug-any-order.cpp @@ -3,9 +3,9 @@ // independently on order in which we list source files (if we specify // strict init-order checking). -// RUN: %clangxx_asan -O0 %s %p/../Helpers/initialization-bug-extra.cc -o %t +// RUN: %clangxx_asan -O0 %s %p/../Helpers/initialization-bug-extra.cpp -o %t // RUN: %env_asan_opts=strict_init_order=true not %run %t 2>&1 | FileCheck %s -// RUN: %clangxx_asan -O0 %p/../Helpers/initialization-bug-extra.cc %s -o %t +// RUN: %clangxx_asan -O0 %p/../Helpers/initialization-bug-extra.cpp %s -o %t // RUN: %env_asan_opts=strict_init_order=true not %run %t 2>&1 | FileCheck %s // Do not test with optimization -- the error may be optimized away. @@ -21,7 +21,7 @@ int __attribute__((noinline)) initX() { return y + 1; // CHECK: {{AddressSanitizer: initialization-order-fiasco}} // CHECK: {{READ of size .* at 0x.* thread T0}} - // CHECK: {{#0 0x.* in .*initX.* .*initialization-bug-any-order.cc:}}[[@LINE-3]] + // CHECK: {{#0 0x.* in .*initX.* .*initialization-bug-any-order.cpp:}}[[@LINE-3]] // CHECK: {{0x.* is located 0 bytes inside of global variable .*y.*}} } diff --git a/test/asan/TestCases/Linux/interception_malloc_test.cc b/test/asan/TestCases/Linux/interception_malloc_test.cpp index f6d6d340b..f6d6d340b 100644 --- a/test/asan/TestCases/Linux/interception_malloc_test.cc +++ b/test/asan/TestCases/Linux/interception_malloc_test.cpp diff --git a/test/asan/TestCases/Linux/interception_readdir_r_test.cc b/test/asan/TestCases/Linux/interception_readdir_r_test.cpp index 987dff275..987dff275 100644 --- a/test/asan/TestCases/Linux/interception_readdir_r_test.cc +++ b/test/asan/TestCases/Linux/interception_readdir_r_test.cpp diff --git a/test/asan/TestCases/Linux/interception_test.cc b/test/asan/TestCases/Linux/interception_test.cpp index fb9d01cfe..fb9d01cfe 100644 --- a/test/asan/TestCases/Linux/interception_test.cc +++ b/test/asan/TestCases/Linux/interception_test.cpp diff --git a/test/asan/TestCases/Linux/interface_symbols_linux.cc b/test/asan/TestCases/Linux/interface_symbols_linux.cpp index 8c22976e7..8c22976e7 100644 --- a/test/asan/TestCases/Linux/interface_symbols_linux.cc +++ b/test/asan/TestCases/Linux/interface_symbols_linux.cpp diff --git a/test/asan/TestCases/Linux/kernel-area.cc b/test/asan/TestCases/Linux/kernel-area.cpp index 41b507cdf..41b507cdf 100644 --- a/test/asan/TestCases/Linux/kernel-area.cc +++ b/test/asan/TestCases/Linux/kernel-area.cpp diff --git a/test/asan/TestCases/Linux/leak.cc b/test/asan/TestCases/Linux/leak.cpp index e22cd6eac..e22cd6eac 100644 --- a/test/asan/TestCases/Linux/leak.cc +++ b/test/asan/TestCases/Linux/leak.cpp diff --git a/test/asan/TestCases/Linux/leak_check_segv.cc b/test/asan/TestCases/Linux/leak_check_segv.cpp index 2a2010f7a..2a2010f7a 100644 --- a/test/asan/TestCases/Linux/leak_check_segv.cc +++ b/test/asan/TestCases/Linux/leak_check_segv.cpp diff --git a/test/asan/TestCases/Linux/local_alias.cc b/test/asan/TestCases/Linux/local_alias.cpp index a8b3d75e3..a8b3d75e3 100644 --- a/test/asan/TestCases/Linux/local_alias.cc +++ b/test/asan/TestCases/Linux/local_alias.cpp diff --git a/test/asan/TestCases/Linux/long-object-path.cc b/test/asan/TestCases/Linux/long-object-path.cpp index 592b0abb0..592b0abb0 100644 --- a/test/asan/TestCases/Linux/long-object-path.cc +++ b/test/asan/TestCases/Linux/long-object-path.cpp diff --git a/test/asan/TestCases/Linux/malloc-in-qsort.cc b/test/asan/TestCases/Linux/malloc-in-qsort.cpp index ea2392442..ea2392442 100644 --- a/test/asan/TestCases/Linux/malloc-in-qsort.cc +++ b/test/asan/TestCases/Linux/malloc-in-qsort.cpp diff --git a/test/asan/TestCases/Linux/malloc_delete_mismatch.cc b/test/asan/TestCases/Linux/malloc_delete_mismatch.cpp index 50d920e43..50d920e43 100644 --- a/test/asan/TestCases/Linux/malloc_delete_mismatch.cc +++ b/test/asan/TestCases/Linux/malloc_delete_mismatch.cpp diff --git a/test/asan/TestCases/Linux/memmem_test.cc b/test/asan/TestCases/Linux/memmem_test.cpp index a838cb56a..a838cb56a 100644 --- a/test/asan/TestCases/Linux/memmem_test.cc +++ b/test/asan/TestCases/Linux/memmem_test.cpp diff --git a/test/asan/TestCases/Linux/mincore.cc b/test/asan/TestCases/Linux/mincore.cpp index 30f450830..30f450830 100644 --- a/test/asan/TestCases/Linux/mincore.cc +++ b/test/asan/TestCases/Linux/mincore.cpp diff --git a/test/asan/TestCases/Linux/new_delete_mismatch.cc b/test/asan/TestCases/Linux/new_delete_mismatch.cpp index 05f74bda7..05f74bda7 100644 --- a/test/asan/TestCases/Linux/new_delete_mismatch.cc +++ b/test/asan/TestCases/Linux/new_delete_mismatch.cpp diff --git a/test/asan/TestCases/Linux/new_delete_mismatch_global.cc b/test/asan/TestCases/Linux/new_delete_mismatch_global.cpp index 3f1a78715..3f1a78715 100644 --- a/test/asan/TestCases/Linux/new_delete_mismatch_global.cc +++ b/test/asan/TestCases/Linux/new_delete_mismatch_global.cpp diff --git a/test/asan/TestCases/Linux/new_delete_mismatch_stack.cc b/test/asan/TestCases/Linux/new_delete_mismatch_stack.cpp index bbf07cc21..bbf07cc21 100644 --- a/test/asan/TestCases/Linux/new_delete_mismatch_stack.cc +++ b/test/asan/TestCases/Linux/new_delete_mismatch_stack.cpp diff --git a/test/asan/TestCases/Linux/nohugepage_test.cc b/test/asan/TestCases/Linux/nohugepage_test.cpp index 0fd7c558d..0fd7c558d 100644 --- a/test/asan/TestCases/Linux/nohugepage_test.cc +++ b/test/asan/TestCases/Linux/nohugepage_test.cpp diff --git a/test/asan/TestCases/Linux/odr-violation.cc b/test/asan/TestCases/Linux/odr-violation.cpp index a1941fcc8..9cdafca91 100644 --- a/test/asan/TestCases/Linux/odr-violation.cc +++ b/test/asan/TestCases/Linux/odr-violation.cpp @@ -51,7 +51,7 @@ namespace foo { char G[SZ]; } #include <stdio.h> namespace foo { char G[100]; } // CHECK: ERROR: AddressSanitizer: odr-violation -// CHECK: size=100 'foo::G' {{.*}}odr-violation.cc:[[@LINE-2]]:22 +// CHECK: size=100 'foo::G' {{.*}}odr-violation.cpp:[[@LINE-2]]:22 // CHECK: size={{4|100}} 'foo::G' int main(int argc, char **argv) { printf("PASS: %p\n", &foo::G); @@ -60,6 +60,6 @@ int main(int argc, char **argv) { // CHECK: These globals were registered at these points: // CHECK: ODR-EXE -// CHECK: odr-violation.cc.dynamic -// CHECK: SUMMARY: AddressSanitizer: odr-violation: global 'foo::G' at {{.*}}odr-violation.cc +// CHECK: odr-violation.cpp.dynamic +// CHECK: SUMMARY: AddressSanitizer: odr-violation: global 'foo::G' at {{.*}}odr-violation.cpp // DISABLED: PASS diff --git a/test/asan/TestCases/Linux/odr-vtable.cc b/test/asan/TestCases/Linux/odr-vtable.cpp index fdbab4bb1..fdbab4bb1 100644 --- a/test/asan/TestCases/Linux/odr-vtable.cc +++ b/test/asan/TestCases/Linux/odr-vtable.cpp diff --git a/test/asan/TestCases/Linux/odr_indicators.cc b/test/asan/TestCases/Linux/odr_indicators.cpp index 36176b552..36176b552 100644 --- a/test/asan/TestCases/Linux/odr_indicators.cc +++ b/test/asan/TestCases/Linux/odr_indicators.cpp diff --git a/test/asan/TestCases/Linux/overflow-in-qsort.cc b/test/asan/TestCases/Linux/overflow-in-qsort.cpp index 6990518e4..6990518e4 100644 --- a/test/asan/TestCases/Linux/overflow-in-qsort.cc +++ b/test/asan/TestCases/Linux/overflow-in-qsort.cpp diff --git a/test/asan/TestCases/Linux/preinit_test.cc b/test/asan/TestCases/Linux/preinit_test.cpp index f8c2b6bf5..f8c2b6bf5 100644 --- a/test/asan/TestCases/Linux/preinit_test.cc +++ b/test/asan/TestCases/Linux/preinit_test.cpp diff --git a/test/asan/TestCases/Linux/preinstalled_signal.cc b/test/asan/TestCases/Linux/preinstalled_signal.cpp index 2b50944c6..2b50944c6 100644 --- a/test/asan/TestCases/Linux/preinstalled_signal.cc +++ b/test/asan/TestCases/Linux/preinstalled_signal.cpp diff --git a/test/asan/TestCases/Linux/print_memory_profile_test.cc b/test/asan/TestCases/Linux/print_memory_profile_test.cpp index e7896be40..e7896be40 100644 --- a/test/asan/TestCases/Linux/print_memory_profile_test.cc +++ b/test/asan/TestCases/Linux/print_memory_profile_test.cpp diff --git a/test/asan/TestCases/Linux/pthread_create_from_constructor.cc b/test/asan/TestCases/Linux/pthread_create_from_constructor.cpp index 8f9b0b4fe..8f9b0b4fe 100644 --- a/test/asan/TestCases/Linux/pthread_create_from_constructor.cc +++ b/test/asan/TestCases/Linux/pthread_create_from_constructor.cpp diff --git a/test/asan/TestCases/Linux/pthread_create_version.cc b/test/asan/TestCases/Linux/pthread_create_version.cpp index efdb8ca97..efdb8ca97 100644 --- a/test/asan/TestCases/Linux/pthread_create_version.cc +++ b/test/asan/TestCases/Linux/pthread_create_version.cpp diff --git a/test/asan/TestCases/Linux/ptrace.cc b/test/asan/TestCases/Linux/ptrace.cpp index bd3d2d27e..255bfe6b7 100644 --- a/test/asan/TestCases/Linux/ptrace.cc +++ b/test/asan/TestCases/Linux/ptrace.cpp @@ -99,7 +99,7 @@ int main(void) { #endif res = ptrace((enum __ptrace_request)__PTRACE_REQUEST, pid, __PTRACE_ARGS); // CHECK: AddressSanitizer: stack-buffer-overflow - // CHECK: {{.*ptrace.cc:}}[[@LINE-2]] + // CHECK: {{.*ptrace.cpp:}}[[@LINE-2]] assert(!res); PRINT_REG_PC(regs); diff --git a/test/asan/TestCases/Linux/quarantine_size_mb.cc b/test/asan/TestCases/Linux/quarantine_size_mb.cpp index f7bccbfbe..f7bccbfbe 100644 --- a/test/asan/TestCases/Linux/quarantine_size_mb.cc +++ b/test/asan/TestCases/Linux/quarantine_size_mb.cpp diff --git a/test/asan/TestCases/Linux/recoverable-lsan.cc b/test/asan/TestCases/Linux/recoverable-lsan.cpp index 935645327..935645327 100644 --- a/test/asan/TestCases/Linux/recoverable-lsan.cc +++ b/test/asan/TestCases/Linux/recoverable-lsan.cpp diff --git a/test/asan/TestCases/Linux/recvfrom.cc b/test/asan/TestCases/Linux/recvfrom.cpp index 9c6eec35c..46aa202c2 100644 --- a/test/asan/TestCases/Linux/recvfrom.cc +++ b/test/asan/TestCases/Linux/recvfrom.cpp @@ -41,7 +41,7 @@ static void *client_thread_udp(void *data) { succeeded = sendto(sockfd, buf, kBufSize, 0, (struct sockaddr *)&serveraddr, sizeof(serveraddr)); // CHECK-SENDTO: {{READ of size 10 at 0x.* thread T1}} - // CHECK-SENDTO: {{ #1 0x.* in client_thread_udp.*recvfrom.cc:}}[[@LINE-3]] + // CHECK-SENDTO: {{ #1 0x.* in client_thread_udp.*recvfrom.cpp:}}[[@LINE-3]] CHECK_ERROR(succeeded < 0, "in sending message"); return NULL; } @@ -72,9 +72,9 @@ int main() { recvfrom(sockfd, buf, kBufSize, 0, NULL, NULL); // BOOM // CHECK-RECVFROM: {{WRITE of size 10 at 0x.* thread T0}} - // CHECK-RECVFROM: {{ #1 0x.* in main.*recvfrom.cc:}}[[@LINE-2]] + // CHECK-RECVFROM: {{ #1 0x.* in main.*recvfrom.cpp:}}[[@LINE-2]] // CHECK-RECVFROM: {{Address 0x.* is located in stack of thread T0 at offset}} - // CHECK-RECVFROM-NEXT: in{{.*}}main{{.*}}recvfrom.cc + // CHECK-RECVFROM-NEXT: in{{.*}}main{{.*}}recvfrom.cpp succeeded = pthread_join(client_thread, NULL); CHECK_ERROR(succeeded, "joining thread"); return 0; diff --git a/test/asan/TestCases/Linux/release_to_os_test.cc b/test/asan/TestCases/Linux/release_to_os_test.cpp index 3e28ffde4..3e28ffde4 100644 --- a/test/asan/TestCases/Linux/release_to_os_test.cc +++ b/test/asan/TestCases/Linux/release_to_os_test.cpp diff --git a/test/asan/TestCases/Linux/rlimit_mmap_test.cc b/test/asan/TestCases/Linux/rlimit_mmap_test.cpp index 7f37727b2..7f37727b2 100644 --- a/test/asan/TestCases/Linux/rlimit_mmap_test.cc +++ b/test/asan/TestCases/Linux/rlimit_mmap_test.cpp diff --git a/test/asan/TestCases/Linux/sanbox_read_proc_self_maps_test.cc b/test/asan/TestCases/Linux/sanbox_read_proc_self_maps_test.cpp index d9099edff..d9099edff 100644 --- a/test/asan/TestCases/Linux/sanbox_read_proc_self_maps_test.cc +++ b/test/asan/TestCases/Linux/sanbox_read_proc_self_maps_test.cpp diff --git a/test/asan/TestCases/Linux/shmctl.cc b/test/asan/TestCases/Linux/shmctl.cpp index e1752bc89..e1752bc89 100644 --- a/test/asan/TestCases/Linux/shmctl.cc +++ b/test/asan/TestCases/Linux/shmctl.cpp diff --git a/test/asan/TestCases/Linux/signal_during_stop_the_world.cc b/test/asan/TestCases/Linux/signal_during_stop_the_world.cpp index b1a41fe20..b1a41fe20 100644 --- a/test/asan/TestCases/Linux/signal_during_stop_the_world.cc +++ b/test/asan/TestCases/Linux/signal_during_stop_the_world.cpp diff --git a/test/asan/TestCases/Linux/sized_delete_test.cc b/test/asan/TestCases/Linux/sized_delete_test.cpp index 5d8c7010e..5d8c7010e 100644 --- a/test/asan/TestCases/Linux/sized_delete_test.cc +++ b/test/asan/TestCases/Linux/sized_delete_test.cpp diff --git a/test/asan/TestCases/Linux/stack-overflow-recovery-mode.cc b/test/asan/TestCases/Linux/stack-overflow-recovery-mode.cpp index e99665953..e99665953 100644 --- a/test/asan/TestCases/Linux/stack-overflow-recovery-mode.cc +++ b/test/asan/TestCases/Linux/stack-overflow-recovery-mode.cpp diff --git a/test/asan/TestCases/Linux/stack-overflow-sigbus.cc b/test/asan/TestCases/Linux/stack-overflow-sigbus.cpp index 8c9599c9f..8c9599c9f 100644 --- a/test/asan/TestCases/Linux/stack-overflow-sigbus.cc +++ b/test/asan/TestCases/Linux/stack-overflow-sigbus.cpp diff --git a/test/asan/TestCases/Linux/stack-trace-dlclose.cc b/test/asan/TestCases/Linux/stack-trace-dlclose.cpp index 899e0dfc6..899e0dfc6 100644 --- a/test/asan/TestCases/Linux/stack-trace-dlclose.cc +++ b/test/asan/TestCases/Linux/stack-trace-dlclose.cpp diff --git a/test/asan/TestCases/Linux/static_tls.cc b/test/asan/TestCases/Linux/static_tls.cpp index 5e569ddab..5e569ddab 100644 --- a/test/asan/TestCases/Linux/static_tls.cc +++ b/test/asan/TestCases/Linux/static_tls.cpp diff --git a/test/asan/TestCases/Linux/swapcontext_annotation.cc b/test/asan/TestCases/Linux/swapcontext_annotation.cpp index 5eae27a32..5eae27a32 100644 --- a/test/asan/TestCases/Linux/swapcontext_annotation.cc +++ b/test/asan/TestCases/Linux/swapcontext_annotation.cpp diff --git a/test/asan/TestCases/Linux/swapcontext_test.cc b/test/asan/TestCases/Linux/swapcontext_test.cpp index 2660ffe3b..2660ffe3b 100644 --- a/test/asan/TestCases/Linux/swapcontext_test.cc +++ b/test/asan/TestCases/Linux/swapcontext_test.cpp diff --git a/test/asan/TestCases/Linux/syscalls.cc b/test/asan/TestCases/Linux/syscalls.cpp index ec14bca76..ec14bca76 100644 --- a/test/asan/TestCases/Linux/syscalls.cc +++ b/test/asan/TestCases/Linux/syscalls.cpp diff --git a/test/asan/TestCases/Linux/thread_local_quarantine_pthread_join.cc b/test/asan/TestCases/Linux/thread_local_quarantine_pthread_join.cpp index 8a5bb25ee..8a5bb25ee 100644 --- a/test/asan/TestCases/Linux/thread_local_quarantine_pthread_join.cc +++ b/test/asan/TestCases/Linux/thread_local_quarantine_pthread_join.cpp diff --git a/test/asan/TestCases/Linux/thread_local_quarantine_size_kb.cc b/test/asan/TestCases/Linux/thread_local_quarantine_size_kb.cpp index 46af1a0e0..46af1a0e0 100644 --- a/test/asan/TestCases/Linux/thread_local_quarantine_size_kb.cc +++ b/test/asan/TestCases/Linux/thread_local_quarantine_size_kb.cpp diff --git a/test/asan/TestCases/Linux/uar_signals.cc b/test/asan/TestCases/Linux/uar_signals.cpp index f96a2fecb..f96a2fecb 100644 --- a/test/asan/TestCases/Linux/uar_signals.cc +++ b/test/asan/TestCases/Linux/uar_signals.cpp diff --git a/test/asan/TestCases/Linux/unpoison_tls.cc b/test/asan/TestCases/Linux/unpoison_tls.cpp index e22345342..e22345342 100644 --- a/test/asan/TestCases/Linux/unpoison_tls.cc +++ b/test/asan/TestCases/Linux/unpoison_tls.cpp diff --git a/test/asan/TestCases/Linux/vfork.cc b/test/asan/TestCases/Linux/vfork.cpp index 31a32dc56..31a32dc56 100644 --- a/test/asan/TestCases/Linux/vfork.cc +++ b/test/asan/TestCases/Linux/vfork.cpp diff --git a/test/asan/TestCases/Posix/asan-symbolize-bad-path.cc b/test/asan/TestCases/Posix/asan-symbolize-bad-path.cpp index 3f93122e9..3f93122e9 100644 --- a/test/asan/TestCases/Posix/asan-symbolize-bad-path.cc +++ b/test/asan/TestCases/Posix/asan-symbolize-bad-path.cpp diff --git a/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cc b/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cpp index 11d5928a8..6e24a08ad 100644 --- a/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cc +++ b/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cpp @@ -38,11 +38,11 @@ int main(int argc, char *argv[]) { inc2(array, -1); // BOOM // CHECK: ERROR: AddressSanitizer: heap-buffer-overflow // CHECK: READ of size 4 at 0x{{.*}} - // CHECK: #0 {{.*}} in inc2 {{.*}}asan-symbolize-sanity-test.cc:[[@LINE+21]] - // CHECK: #1 {{.*}} in main {{.*}}asan-symbolize-sanity-test.cc:[[@LINE-4]] + // CHECK: #0 {{.*}} in inc2 {{.*}}asan-symbolize-sanity-test.cpp:[[@LINE+21]] + // CHECK: #1 {{.*}} in main {{.*}}asan-symbolize-sanity-test.cpp:[[@LINE-4]] // CHECK: allocated by thread T{{.*}} here: // CHECK: #{{.*}} in {{(wrap_|__interceptor_)?}}malloc - // CHECK: #{{.*}} in main {{.*}}asan-symbolize-sanity-test.cc:[[@LINE-9]] + // CHECK: #{{.*}} in main {{.*}}asan-symbolize-sanity-test.cpp:[[@LINE-9]] return 0; } #else // SHARED_LIBS diff --git a/test/asan/TestCases/Posix/asan_symbolize_script/logging_options_in_help.cc b/test/asan/TestCases/Posix/asan_symbolize_script/logging_options_in_help.cpp index b3df1cb35..b3df1cb35 100644 --- a/test/asan/TestCases/Posix/asan_symbolize_script/logging_options_in_help.cc +++ b/test/asan/TestCases/Posix/asan_symbolize_script/logging_options_in_help.cpp diff --git a/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_help_output.cc b/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_help_output.cpp index 71f32e0d6..71f32e0d6 100644 --- a/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_help_output.cc +++ b/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_help_output.cpp diff --git a/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_symbolicate.cc b/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_symbolicate.cpp index 3f3ad9bfd..3f3ad9bfd 100644 --- a/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_symbolicate.cc +++ b/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_symbolicate.cpp diff --git a/test/asan/TestCases/Posix/asan_symbolize_script/set_log_dest.cc b/test/asan/TestCases/Posix/asan_symbolize_script/set_log_dest.cpp index f2c309808..f2c309808 100644 --- a/test/asan/TestCases/Posix/asan_symbolize_script/set_log_dest.cc +++ b/test/asan/TestCases/Posix/asan_symbolize_script/set_log_dest.cpp diff --git a/test/asan/TestCases/Posix/asan_symbolize_script/set_log_level.cc b/test/asan/TestCases/Posix/asan_symbolize_script/set_log_level.cpp index b30fd6ec3..b30fd6ec3 100644 --- a/test/asan/TestCases/Posix/asan_symbolize_script/set_log_level.cc +++ b/test/asan/TestCases/Posix/asan_symbolize_script/set_log_level.cpp diff --git a/test/asan/TestCases/Posix/asprintf.cc b/test/asan/TestCases/Posix/asprintf.cpp index 6946e5013..6946e5013 100644 --- a/test/asan/TestCases/Posix/asprintf.cc +++ b/test/asan/TestCases/Posix/asprintf.cpp diff --git a/test/asan/TestCases/Posix/assign_large_valloc_to_global.cc b/test/asan/TestCases/Posix/assign_large_valloc_to_global.cpp index 8031d04aa..8031d04aa 100644 --- a/test/asan/TestCases/Posix/assign_large_valloc_to_global.cc +++ b/test/asan/TestCases/Posix/assign_large_valloc_to_global.cpp diff --git a/test/asan/TestCases/Posix/bcmp_test.cc b/test/asan/TestCases/Posix/bcmp_test.cpp index 44aa9cd24..44aa9cd24 100644 --- a/test/asan/TestCases/Posix/bcmp_test.cc +++ b/test/asan/TestCases/Posix/bcmp_test.cpp diff --git a/test/asan/TestCases/Posix/closed-fds.cc b/test/asan/TestCases/Posix/closed-fds.cpp index b2604bba5..c18653bc2 100644 --- a/test/asan/TestCases/Posix/closed-fds.cc +++ b/test/asan/TestCases/Posix/closed-fds.cpp @@ -30,6 +30,6 @@ int main(int argc, char **argv) { // CHECK-FILE: {{.*ERROR: AddressSanitizer: heap-use-after-free on address}} // CHECK-FILE: {{0x.* at pc 0x.* bp 0x.* sp 0x.*}} // CHECK-FILE: {{WRITE of size 1 at 0x.* thread T0}} - // CHECK-FILE: {{ #0 0x.* in main .*closed-fds.cc:}}[[@LINE-4]] + // CHECK-FILE: {{ #0 0x.* in main .*closed-fds.cpp:}}[[@LINE-4]] return 0; } diff --git a/test/asan/TestCases/Posix/concurrent_overflow.cc b/test/asan/TestCases/Posix/concurrent_overflow.cpp index 345b54685..345b54685 100644 --- a/test/asan/TestCases/Posix/concurrent_overflow.cc +++ b/test/asan/TestCases/Posix/concurrent_overflow.cpp diff --git a/test/asan/TestCases/Posix/coverage-fork.cc b/test/asan/TestCases/Posix/coverage-fork.cpp index 22d2e3584..22d2e3584 100644 --- a/test/asan/TestCases/Posix/coverage-fork.cc +++ b/test/asan/TestCases/Posix/coverage-fork.cpp diff --git a/test/asan/TestCases/Posix/coverage-module-unloaded.cc b/test/asan/TestCases/Posix/coverage-module-unloaded.cpp index 322a1bad1..322a1bad1 100644 --- a/test/asan/TestCases/Posix/coverage-module-unloaded.cc +++ b/test/asan/TestCases/Posix/coverage-module-unloaded.cpp diff --git a/test/asan/TestCases/Posix/coverage-reset.cc b/test/asan/TestCases/Posix/coverage-reset.cpp index 152be2ab3..b3b7a575a 100644 --- a/test/asan/TestCases/Posix/coverage-reset.cc +++ b/test/asan/TestCases/Posix/coverage-reset.cpp @@ -29,8 +29,8 @@ int main(int argc, char **argv) { bar2(); __sanitizer_cov_dump(); // CHECK: RESET -// CHECK-DAG: SanitizerCoverage: ./coverage-reset.cc{{.*}}.sancov: 2 PCs written -// CHECK-DAG: SanitizerCoverage: ./libcoverage-reset.cc{{.*}}.sancov: 2 PCs written +// CHECK-DAG: SanitizerCoverage: ./coverage-reset.cpp{{.*}}.sancov: 2 PCs written +// CHECK-DAG: SanitizerCoverage: ./libcoverage-reset.cpp{{.*}}.sancov: 2 PCs written fprintf(stderr, "RESET\n"); __sanitizer_cov_reset(); @@ -38,8 +38,8 @@ int main(int argc, char **argv) { bar1(); __sanitizer_cov_dump(); // CHECK: RESET -// CHECK-DAG: SanitizerCoverage: ./coverage-reset.cc{{.*}}.sancov: 1 PCs written -// CHECK-DAG: SanitizerCoverage: ./libcoverage-reset.cc{{.*}}.sancov: 1 PCs written +// CHECK-DAG: SanitizerCoverage: ./coverage-reset.cpp{{.*}}.sancov: 1 PCs written +// CHECK-DAG: SanitizerCoverage: ./libcoverage-reset.cpp{{.*}}.sancov: 1 PCs written fprintf(stderr, "RESET\n"); __sanitizer_cov_reset(); @@ -47,7 +47,7 @@ int main(int argc, char **argv) { foo2(); __sanitizer_cov_dump(); // CHECK: RESET -// CHECK: SanitizerCoverage: ./coverage-reset.cc{{.*}}.sancov: 2 PCs written +// CHECK: SanitizerCoverage: ./coverage-reset.cpp{{.*}}.sancov: 2 PCs written fprintf(stderr, "RESET\n"); __sanitizer_cov_reset(); @@ -55,13 +55,13 @@ int main(int argc, char **argv) { bar2(); __sanitizer_cov_dump(); // CHECK: RESET -// CHECK: SanitizerCoverage: ./libcoverage-reset.cc{{.*}}.sancov: 2 PCs written +// CHECK: SanitizerCoverage: ./libcoverage-reset.cpp{{.*}}.sancov: 2 PCs written fprintf(stderr, "RESET\n"); __sanitizer_cov_reset(); // CHECK: RESET bar2(); -// CHECK: SanitizerCoverage: ./libcoverage-reset.cc{{.*}}.sancov: 1 PCs written +// CHECK: SanitizerCoverage: ./libcoverage-reset.cpp{{.*}}.sancov: 1 PCs written } #endif diff --git a/test/asan/TestCases/Posix/coverage.cc b/test/asan/TestCases/Posix/coverage.cpp index 9dbd72eab..9dbd72eab 100644 --- a/test/asan/TestCases/Posix/coverage.cc +++ b/test/asan/TestCases/Posix/coverage.cpp diff --git a/test/asan/TestCases/Posix/current_allocated_bytes.cc b/test/asan/TestCases/Posix/current_allocated_bytes.cpp index c49e433b1..c49e433b1 100644 --- a/test/asan/TestCases/Posix/current_allocated_bytes.cc +++ b/test/asan/TestCases/Posix/current_allocated_bytes.cpp diff --git a/test/asan/TestCases/Posix/deep_call_stack.cc b/test/asan/TestCases/Posix/deep_call_stack.cpp index e6e82a475..e6e82a475 100644 --- a/test/asan/TestCases/Posix/deep_call_stack.cc +++ b/test/asan/TestCases/Posix/deep_call_stack.cpp diff --git a/test/asan/TestCases/Posix/deep_thread_stack.cc b/test/asan/TestCases/Posix/deep_thread_stack.cpp index 535da79ff..535da79ff 100644 --- a/test/asan/TestCases/Posix/deep_thread_stack.cc +++ b/test/asan/TestCases/Posix/deep_thread_stack.cpp diff --git a/test/asan/TestCases/Posix/dlclose-test.cc b/test/asan/TestCases/Posix/dlclose-test.cpp index 160c1c940..160c1c940 100644 --- a/test/asan/TestCases/Posix/dlclose-test.cc +++ b/test/asan/TestCases/Posix/dlclose-test.cpp diff --git a/test/asan/TestCases/Posix/fgets_fputs.cc b/test/asan/TestCases/Posix/fgets_fputs.cpp index 34c952f2e..34c952f2e 100644 --- a/test/asan/TestCases/Posix/fgets_fputs.cc +++ b/test/asan/TestCases/Posix/fgets_fputs.cpp diff --git a/test/asan/TestCases/Posix/fread_fwrite.cc b/test/asan/TestCases/Posix/fread_fwrite.cpp index c06292604..c06292604 100644 --- a/test/asan/TestCases/Posix/fread_fwrite.cc +++ b/test/asan/TestCases/Posix/fread_fwrite.cpp diff --git a/test/asan/TestCases/Posix/free_hook_realloc.cc b/test/asan/TestCases/Posix/free_hook_realloc.cpp index cbc5d6fed..cbc5d6fed 100644 --- a/test/asan/TestCases/Posix/free_hook_realloc.cc +++ b/test/asan/TestCases/Posix/free_hook_realloc.cpp diff --git a/test/asan/TestCases/Posix/freopen.cc b/test/asan/TestCases/Posix/freopen.cpp index c137abb8f..c137abb8f 100644 --- a/test/asan/TestCases/Posix/freopen.cc +++ b/test/asan/TestCases/Posix/freopen.cpp diff --git a/test/asan/TestCases/Posix/gc-test.cc b/test/asan/TestCases/Posix/gc-test.cpp index 56d8c398f..56d8c398f 100644 --- a/test/asan/TestCases/Posix/gc-test.cc +++ b/test/asan/TestCases/Posix/gc-test.cpp diff --git a/test/asan/TestCases/Posix/glob.cc b/test/asan/TestCases/Posix/glob.cpp index 16b4ace8e..16b4ace8e 100644 --- a/test/asan/TestCases/Posix/glob.cc +++ b/test/asan/TestCases/Posix/glob.cpp diff --git a/test/asan/TestCases/Posix/halt_on_error-torture.cc b/test/asan/TestCases/Posix/halt_on_error-torture.cpp index 559f9434e..559f9434e 100644 --- a/test/asan/TestCases/Posix/halt_on_error-torture.cc +++ b/test/asan/TestCases/Posix/halt_on_error-torture.cpp diff --git a/test/asan/TestCases/Posix/halt_on_error_suppress_equal_pcs.cc b/test/asan/TestCases/Posix/halt_on_error_suppress_equal_pcs.cpp index 6b926180c..6b926180c 100644 --- a/test/asan/TestCases/Posix/halt_on_error_suppress_equal_pcs.cc +++ b/test/asan/TestCases/Posix/halt_on_error_suppress_equal_pcs.cpp diff --git a/test/asan/TestCases/Posix/handle_abort_on_error.cc b/test/asan/TestCases/Posix/handle_abort_on_error.cpp index 1be060e06..1be060e06 100644 --- a/test/asan/TestCases/Posix/handle_abort_on_error.cc +++ b/test/asan/TestCases/Posix/handle_abort_on_error.cpp diff --git a/test/asan/TestCases/Posix/init-order-pthread-create.cc b/test/asan/TestCases/Posix/init-order-pthread-create.cpp index 19c000fec..19c000fec 100644 --- a/test/asan/TestCases/Posix/init-order-pthread-create.cc +++ b/test/asan/TestCases/Posix/init-order-pthread-create.cpp diff --git a/test/asan/TestCases/Posix/interception-in-shared-lib-test.cc b/test/asan/TestCases/Posix/interception-in-shared-lib-test.cpp index b31b035f9..455390a8d 100644 --- a/test/asan/TestCases/Posix/interception-in-shared-lib-test.cc +++ b/test/asan/TestCases/Posix/interception-in-shared-lib-test.cpp @@ -23,7 +23,7 @@ int main(int argc, char *argv[]) { my_memset(buf, 11); // CHECK: {{.*ERROR: AddressSanitizer: stack-buffer-overflow}} // CHECK: {{WRITE of size 11 at 0x.* thread T0}} - // CHECK: {{0x.* in my_memset .*interception-in-shared-lib-test.cc:}}[[@LINE-10]] + // CHECK: {{0x.* in my_memset .*interception-in-shared-lib-test.cpp:}}[[@LINE-10]] return 0; } #endif diff --git a/test/asan/TestCases/Posix/invalid-pointer-pairs-threads.cc b/test/asan/TestCases/Posix/invalid-pointer-pairs-threads.cpp index ee8a1c70c..d32dae9c0 100644 --- a/test/asan/TestCases/Posix/invalid-pointer-pairs-threads.cc +++ b/test/asan/TestCases/Posix/invalid-pointer-pairs-threads.cpp @@ -44,7 +44,7 @@ int main(int argc, char **argv) { char *parent_pointer = &local; // B: ERROR: AddressSanitizer: invalid-pointer-pair - // B: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-threads.cc:[[@LINE+1]] + // B: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-threads.cpp:[[@LINE+1]] unsigned r = parent_pointer - pointers[0]; } diff --git a/test/asan/TestCases/Posix/ioctl.cc b/test/asan/TestCases/Posix/ioctl.cpp index 7269dfddb..c871f94e1 100644 --- a/test/asan/TestCases/Posix/ioctl.cc +++ b/test/asan/TestCases/Posix/ioctl.cpp @@ -21,7 +21,7 @@ int main(int argc, char **argv) { int res = ioctl(fd, FIONBIO, &nonblock + 1); // CHECK: AddressSanitizer: stack-buffer-overflow // CHECK: READ of size 4 at - // CHECK: {{#.* in main .*ioctl.cc:}}[[@LINE-3]] + // CHECK: {{#.* in main .*ioctl.cpp:}}[[@LINE-3]] assert(res == 0); close(fd); return 0; diff --git a/test/asan/TestCases/Posix/large_allocator_unpoisons_on_free.cc b/test/asan/TestCases/Posix/large_allocator_unpoisons_on_free.cpp index b39fa74a3..b39fa74a3 100644 --- a/test/asan/TestCases/Posix/large_allocator_unpoisons_on_free.cc +++ b/test/asan/TestCases/Posix/large_allocator_unpoisons_on_free.cpp diff --git a/test/asan/TestCases/Posix/lto-constmerge-odr.cc b/test/asan/TestCases/Posix/lto-constmerge-odr.cpp index 9dc1397f6..9dc1397f6 100644 --- a/test/asan/TestCases/Posix/lto-constmerge-odr.cc +++ b/test/asan/TestCases/Posix/lto-constmerge-odr.cpp diff --git a/test/asan/TestCases/Posix/mmap_limit_mb.cc b/test/asan/TestCases/Posix/mmap_limit_mb.cpp index cb613f535..cb613f535 100644 --- a/test/asan/TestCases/Posix/mmap_limit_mb.cc +++ b/test/asan/TestCases/Posix/mmap_limit_mb.cpp diff --git a/test/asan/TestCases/Posix/new_array_cookie_test.cc b/test/asan/TestCases/Posix/new_array_cookie_test.cpp index 40a9b7874..edbdb4016 100644 --- a/test/asan/TestCases/Posix/new_array_cookie_test.cc +++ b/test/asan/TestCases/Posix/new_array_cookie_test.cpp @@ -20,7 +20,7 @@ int main(int argc, char **argv) { C *buffer = new C[argc]; buffer[-2].x = 10; // CHECK: AddressSanitizer: heap-buffer-overflow -// CHECK: in main {{.*}}new_array_cookie_test.cc:[[@LINE-2]] +// CHECK: in main {{.*}}new_array_cookie_test.cpp:[[@LINE-2]] // CHECK: is located 0 bytes inside of 12-byte region // NO_COOKIE: ZZZZZZZZ delete [] buffer; diff --git a/test/asan/TestCases/Posix/new_array_cookie_uaf_test.cc b/test/asan/TestCases/Posix/new_array_cookie_uaf_test.cpp index 335a56757..335a56757 100644 --- a/test/asan/TestCases/Posix/new_array_cookie_uaf_test.cc +++ b/test/asan/TestCases/Posix/new_array_cookie_uaf_test.cpp diff --git a/test/asan/TestCases/Posix/new_array_cookie_with_new_from_class.cc b/test/asan/TestCases/Posix/new_array_cookie_with_new_from_class.cpp index e7f774674..e7f774674 100644 --- a/test/asan/TestCases/Posix/new_array_cookie_with_new_from_class.cc +++ b/test/asan/TestCases/Posix/new_array_cookie_with_new_from_class.cpp diff --git a/test/asan/TestCases/Posix/no-fd.cc b/test/asan/TestCases/Posix/no-fd.cpp index 086b01412..086b01412 100644 --- a/test/asan/TestCases/Posix/no-fd.cc +++ b/test/asan/TestCases/Posix/no-fd.cpp diff --git a/test/asan/TestCases/Posix/print_cmdline.cc b/test/asan/TestCases/Posix/print_cmdline.cpp index 8c83bd97e..8c83bd97e 100644 --- a/test/asan/TestCases/Posix/print_cmdline.cc +++ b/test/asan/TestCases/Posix/print_cmdline.cpp diff --git a/test/asan/TestCases/Posix/readv.cc b/test/asan/TestCases/Posix/readv.cpp index 27436a1ad..27436a1ad 100644 --- a/test/asan/TestCases/Posix/readv.cc +++ b/test/asan/TestCases/Posix/readv.cpp diff --git a/test/asan/TestCases/Posix/shared-lib-test.cc b/test/asan/TestCases/Posix/shared-lib-test.cpp index 6de6d9fdf..6f0a9f74a 100644 --- a/test/asan/TestCases/Posix/shared-lib-test.cc +++ b/test/asan/TestCases/Posix/shared-lib-test.cpp @@ -34,7 +34,7 @@ int main(int argc, char *argv[]) { // CHECK: {{.*ERROR: AddressSanitizer: global-buffer-overflow}} // CHECK: {{READ of size 4 at 0x.* thread T0}} // CHECK: {{ #0 0x.*}} - // CHECK: {{ #1 0x.* in main .*shared-lib-test.cc:}}[[@LINE-4]] + // CHECK: {{ #1 0x.* in main .*shared-lib-test.cpp:}}[[@LINE-4]] return 0; } #else // SHARED_LIB diff --git a/test/asan/TestCases/Posix/stack-overflow.cc b/test/asan/TestCases/Posix/stack-overflow.cpp index d6b062ed3..d6b062ed3 100644 --- a/test/asan/TestCases/Posix/stack-overflow.cc +++ b/test/asan/TestCases/Posix/stack-overflow.cpp diff --git a/test/asan/TestCases/Posix/stack-use-after-return.cc b/test/asan/TestCases/Posix/stack-use-after-return.cpp index 02588d708..bb7f84309 100644 --- a/test/asan/TestCases/Posix/stack-use-after-return.cc +++ b/test/asan/TestCases/Posix/stack-use-after-return.cpp @@ -56,11 +56,11 @@ void Func2(char *x) { fprintf(stderr, "2: %p\n", x); *x = 1; // CHECK: WRITE of size 1 {{.*}} thread T0 - // CHECK: #0{{.*}}Func2{{.*}}stack-use-after-return.cc:[[@LINE-2]] + // CHECK: #0{{.*}}Func2{{.*}}stack-use-after-return.cpp:[[@LINE-2]] // CHECK: is located in stack of thread T0 at offset // CHECK: 'local'{{.*}} <== Memory access at offset {{16|32}} is inside this variable // THREAD: WRITE of size 1 {{.*}} thread T{{[1-9]}} - // THREAD: #0{{.*}}Func2{{.*}}stack-use-after-return.cc:[[@LINE-6]] + // THREAD: #0{{.*}}Func2{{.*}}stack-use-after-return.cpp:[[@LINE-6]] // THREAD: is located in stack of thread T{{[1-9]}} at offset // THREAD: 'local'{{.*}} <== Memory access at offset {{16|32}} is inside this variable // CHECK-20: T0: FakeStack created:{{.*}} stack_size_log: 20 diff --git a/test/asan/TestCases/Posix/start-deactivated.cc b/test/asan/TestCases/Posix/start-deactivated.cpp index 9c674ac57..9c674ac57 100644 --- a/test/asan/TestCases/Posix/start-deactivated.cc +++ b/test/asan/TestCases/Posix/start-deactivated.cpp diff --git a/test/asan/TestCases/Posix/strerror_r_test.cc b/test/asan/TestCases/Posix/strerror_r_test.cpp index e6df44177..e6df44177 100644 --- a/test/asan/TestCases/Posix/strerror_r_test.cc +++ b/test/asan/TestCases/Posix/strerror_r_test.cpp diff --git a/test/asan/TestCases/Posix/strndup_oob_test.cc b/test/asan/TestCases/Posix/strndup_oob_test.cpp index 22bbf7c7e..46c9dceec 100644 --- a/test/asan/TestCases/Posix/strndup_oob_test.cc +++ b/test/asan/TestCases/Posix/strndup_oob_test.cpp @@ -17,11 +17,11 @@ int main(int argc, char **argv) { char *copy = strndup(kString, 2); int x = copy[2 + argc]; // BOOM // CHECK: AddressSanitizer: heap-buffer-overflow - // CHECK: #0 {{.*}}main {{.*}}strndup_oob_test.cc:[[@LINE-2]] + // CHECK: #0 {{.*}}main {{.*}}strndup_oob_test.cpp:[[@LINE-2]] // CHECK-LABEL: allocated by thread T{{.*}} here: // CHECK: #{{[01]}} {{.*}}strndup - // CHECK: #{{.*}}main {{.*}}strndup_oob_test.cc:[[@LINE-6]] + // CHECK: #{{.*}}main {{.*}}strndup_oob_test.cpp:[[@LINE-6]] // CHECK-LABEL: SUMMARY - // CHECK: strndup_oob_test.cc:[[@LINE-7]] + // CHECK: strndup_oob_test.cpp:[[@LINE-7]] return x; } diff --git a/test/asan/TestCases/Posix/strndup_oob_test2.cc b/test/asan/TestCases/Posix/strndup_oob_test2.cpp index 8cc822d7c..774e70720 100644 --- a/test/asan/TestCases/Posix/strndup_oob_test2.cc +++ b/test/asan/TestCases/Posix/strndup_oob_test2.cpp @@ -17,6 +17,6 @@ int main(int argc, char **argv) { char *copy = strndup(kChars, 3);
copy = strndup(kChars, 10);
// CHECK: AddressSanitizer: global-buffer-overflow
- // CHECK: {{.*}}main {{.*}}.cc:[[@LINE-2]]
+ // CHECK: {{.*}}main {{.*}}.cpp:[[@LINE-2]]
return *copy;
}
diff --git a/test/asan/TestCases/Posix/tsd_dtor_leak.cc b/test/asan/TestCases/Posix/tsd_dtor_leak.cpp index 860f3459e..860f3459e 100644 --- a/test/asan/TestCases/Posix/tsd_dtor_leak.cc +++ b/test/asan/TestCases/Posix/tsd_dtor_leak.cpp diff --git a/test/asan/TestCases/Posix/wait.cc b/test/asan/TestCases/Posix/wait.cpp index 85e819369..7ca1c57a2 100644 --- a/test/asan/TestCases/Posix/wait.cc +++ b/test/asan/TestCases/Posix/wait.cpp @@ -24,7 +24,7 @@ int main(int argc, char **argv) { // CHECK: stack-buffer-overflow // CHECK: {{WRITE of size .* at 0x.* thread T0}} // CHECK: {{in .*wait}} - // CHECK: {{in main .*wait.cc:}} + // CHECK: {{in main .*wait.cpp:}} // CHECK: is located in stack of thread T0 at offset // CHECK: {{in main}} return res == -1 ? 1 : 0; diff --git a/test/asan/TestCases/Posix/wait3.cc b/test/asan/TestCases/Posix/wait3.cpp index 081a73e16..7fb4d6512 100644 --- a/test/asan/TestCases/Posix/wait3.cc +++ b/test/asan/TestCases/Posix/wait3.cpp @@ -26,7 +26,7 @@ int main(int argc, char **argv) { // CHECK: stack-buffer-overflow // CHECK: {{WRITE of size .* at 0x.* thread T0}} // CHECK: {{in .*wait}} - // CHECK: {{in main .*wait3.cc:}} + // CHECK: {{in main .*wait3.cpp:}} // CHECK: is located in stack of thread T0 at offset // CHECK: {{in main}} return res == -1 ? 1 : 0; diff --git a/test/asan/TestCases/Posix/wait4.cc b/test/asan/TestCases/Posix/wait4.cpp index aee5570b8..1e574d99f 100644 --- a/test/asan/TestCases/Posix/wait4.cc +++ b/test/asan/TestCases/Posix/wait4.cpp @@ -34,7 +34,7 @@ int main(int argc, char **argv) { // CHECK: stack-buffer-overflow // CHECK: {{WRITE of size .* at 0x.* thread T0}} // CHECK: {{in .*wait}} - // CHECK: {{in main .*wait4.cc:}} + // CHECK: {{in main .*wait4.cpp:}} // CHECK: is located in stack of thread T0 at offset // CHECK: {{in main}} return res == -1 ? 1 : 0; diff --git a/test/asan/TestCases/Posix/waitid.cc b/test/asan/TestCases/Posix/waitid.cpp index 20fb0c694..5e635c777 100644 --- a/test/asan/TestCases/Posix/waitid.cc +++ b/test/asan/TestCases/Posix/waitid.cpp @@ -20,7 +20,7 @@ int main(int argc, char **argv) { // CHECK: stack-buffer-overflow // CHECK: {{WRITE of size .* at 0x.* thread T0}} // CHECK: {{in .*waitid}} - // CHECK: {{in main .*waitid.cc:}} + // CHECK: {{in main .*waitid.cpp:}} // CHECK: is located in stack of thread T0 at offset // CHECK: {{in main}} return res != -1; diff --git a/test/asan/TestCases/Windows/aligned_mallocs.cc b/test/asan/TestCases/Windows/aligned_mallocs.cpp index 48bb22101..48bb22101 100644 --- a/test/asan/TestCases/Windows/aligned_mallocs.cc +++ b/test/asan/TestCases/Windows/aligned_mallocs.cpp diff --git a/test/asan/TestCases/Windows/allocators_sanity.cc b/test/asan/TestCases/Windows/allocators_sanity.cpp index 2738b4e7b..2738b4e7b 100644 --- a/test/asan/TestCases/Windows/allocators_sanity.cc +++ b/test/asan/TestCases/Windows/allocators_sanity.cpp diff --git a/test/asan/TestCases/Windows/beginthreadex.cc b/test/asan/TestCases/Windows/beginthreadex.cpp index 05d72a539..05d72a539 100644 --- a/test/asan/TestCases/Windows/beginthreadex.cc +++ b/test/asan/TestCases/Windows/beginthreadex.cpp diff --git a/test/asan/TestCases/Windows/bind_io_completion_callback.cc b/test/asan/TestCases/Windows/bind_io_completion_callback.cpp index ef7e45867..ef7e45867 100644 --- a/test/asan/TestCases/Windows/bind_io_completion_callback.cc +++ b/test/asan/TestCases/Windows/bind_io_completion_callback.cpp diff --git a/test/asan/TestCases/Windows/bitfield.cc b/test/asan/TestCases/Windows/bitfield.cpp index 174c92dbe..174c92dbe 100644 --- a/test/asan/TestCases/Windows/bitfield.cc +++ b/test/asan/TestCases/Windows/bitfield.cpp diff --git a/test/asan/TestCases/Windows/bitfield_uaf.cc b/test/asan/TestCases/Windows/bitfield_uaf.cpp index 6462d31bf..9095b805e 100644 --- a/test/asan/TestCases/Windows/bitfield_uaf.cc +++ b/test/asan/TestCases/Windows/bitfield_uaf.cpp @@ -14,7 +14,7 @@ void make_access(S *s) { s->bf2 = 2; // CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]] // CHECK: READ of size {{[124]}} at [[ADDR]] -// CHECK: {{#0 .* make_access.*bitfield_uaf.cc}}:[[@LINE-3]] +// CHECK: {{#0 .* make_access.*bitfield_uaf.cpp}}:[[@LINE-3]] // CHECK: {{#1 .* main}} } @@ -24,10 +24,10 @@ int main(void) { // CHECK: [[ADDR]] is located 0 bytes inside of 4-byte region // CHECK-LABEL: freed by thread T0 here: // CHECK: {{#0 .* free }} -// CHECK: {{#1 .* main .*bitfield_uaf.cc}}:[[@LINE-4]] +// CHECK: {{#1 .* main .*bitfield_uaf.cpp}}:[[@LINE-4]] // CHECK-LABEL: previously allocated by thread T0 here: // CHECK: {{#0 .* malloc }} -// CHECK: {{#1 .* main .*bitfield_uaf.cc}}:[[@LINE-8]] +// CHECK: {{#1 .* main .*bitfield_uaf.cpp}}:[[@LINE-8]] make_access(s); return 0; } diff --git a/test/asan/TestCases/Windows/calloc_left_oob.cc b/test/asan/TestCases/Windows/calloc_left_oob.cpp index d48d59f3a..309f4d36f 100644 --- a/test/asan/TestCases/Windows/calloc_left_oob.cc +++ b/test/asan/TestCases/Windows/calloc_left_oob.cpp @@ -8,10 +8,10 @@ int main() { buffer[-1] = 42; // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 4 at [[ADDR]] thread T0 -// CHECK-NEXT: {{#0 .* main .*calloc_left_oob.cc}}:[[@LINE-3]] +// CHECK-NEXT: {{#0 .* main .*calloc_left_oob.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located 4 bytes to the left of 168-byte region // CHECK: allocated by thread T0 here: // CHECK-NEXT: {{#0 .* calloc }} -// CHECK-NEXT: {{#1 .* main .*calloc_left_oob.cc}}:[[@LINE-8]] +// CHECK-NEXT: {{#1 .* main .*calloc_left_oob.cpp}}:[[@LINE-8]] free(buffer); } diff --git a/test/asan/TestCases/Windows/calloc_right_oob.cc b/test/asan/TestCases/Windows/calloc_right_oob.cpp index 4d114fd83..723da5535 100644 --- a/test/asan/TestCases/Windows/calloc_right_oob.cc +++ b/test/asan/TestCases/Windows/calloc_right_oob.cpp @@ -8,10 +8,10 @@ int main() { buffer[42] = 42; // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 4 at [[ADDR]] thread T0 -// CHECK-NEXT: {{#0 .* main .*calloc_right_oob.cc}}:[[@LINE-3]] +// CHECK-NEXT: {{#0 .* main .*calloc_right_oob.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located 0 bytes to the right of 168-byte region // CHECK: allocated by thread T0 here: // CHECK-NEXT: {{#0 .* calloc }} -// CHECK-NEXT: {{#1 .* main .*calloc_right_oob.cc}}:[[@LINE-8]] +// CHECK-NEXT: {{#1 .* main .*calloc_right_oob.cpp}}:[[@LINE-8]] free(buffer); } diff --git a/test/asan/TestCases/Windows/calloc_uaf.cc b/test/asan/TestCases/Windows/calloc_uaf.cpp index bd14bb079..54577f014 100644 --- a/test/asan/TestCases/Windows/calloc_uaf.cc +++ b/test/asan/TestCases/Windows/calloc_uaf.cpp @@ -9,12 +9,12 @@ int main() { buffer[0] = 42; // CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 4 at [[ADDR]] thread T0 -// CHECK-NEXT: {{#0 .* main .*calloc_uaf.cc}}:[[@LINE-3]] +// CHECK-NEXT: {{#0 .* main .*calloc_uaf.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located 0 bytes inside of 168-byte region // CHECK: freed by thread T0 here: // CHECK-NEXT: {{#0 .* free }} -// CHECK-NEXT: {{#1 .* main .*calloc_uaf.cc}}:[[@LINE-8]] +// CHECK-NEXT: {{#1 .* main .*calloc_uaf.cpp}}:[[@LINE-8]] // CHECK: previously allocated by thread T0 here: // CHECK-NEXT: {{#0 .* calloc }} -// CHECK-NEXT: {{#1 .* main .*calloc_uaf.cc}}:[[@LINE-12]] +// CHECK-NEXT: {{#1 .* main .*calloc_uaf.cpp}}:[[@LINE-12]] } diff --git a/test/asan/TestCases/Windows/coverage-basic.cc b/test/asan/TestCases/Windows/coverage-basic.cpp index 1469e1c30..1469e1c30 100644 --- a/test/asan/TestCases/Windows/coverage-basic.cc +++ b/test/asan/TestCases/Windows/coverage-basic.cpp diff --git a/test/asan/TestCases/Windows/coverage-dll-stdio.cc b/test/asan/TestCases/Windows/coverage-dll-stdio.cpp index 5cba9a76c..f2bfaad28 100644 --- a/test/asan/TestCases/Windows/coverage-dll-stdio.cc +++ b/test/asan/TestCases/Windows/coverage-dll-stdio.cpp @@ -2,7 +2,7 @@ // __local_stdio_printf_options function isn't instrumented for coverage. // RUN: rm -rf %t && mkdir %t && cd %t -// RUN: %clang_cl_asan -fsanitize-coverage=func,trace-pc-guard -Od %p/dll_host.cc -Fet.exe +// RUN: %clang_cl_asan -fsanitize-coverage=func,trace-pc-guard -Od %p/dll_host.cpp -Fet.exe // RUN: %clang_cl_asan -fsanitize-coverage=func,trace-pc-guard -LD -Od %s -Fet.dll // RUN: %run ./t.exe t.dll 2>&1 | FileCheck %s diff --git a/test/asan/TestCases/Windows/crash_read_write.cc b/test/asan/TestCases/Windows/crash_read_write.cpp index 74200cca1..74200cca1 100644 --- a/test/asan/TestCases/Windows/crash_read_write.cc +++ b/test/asan/TestCases/Windows/crash_read_write.cpp diff --git a/test/asan/TestCases/Windows/crt_initializers.cc b/test/asan/TestCases/Windows/crt_initializers.cpp index f33c16362..f33c16362 100644 --- a/test/asan/TestCases/Windows/crt_initializers.cc +++ b/test/asan/TestCases/Windows/crt_initializers.cpp diff --git a/test/asan/TestCases/Windows/delay_dbghelp.cc b/test/asan/TestCases/Windows/delay_dbghelp.cpp index 81cd2d389..81cd2d389 100644 --- a/test/asan/TestCases/Windows/delay_dbghelp.cc +++ b/test/asan/TestCases/Windows/delay_dbghelp.cpp diff --git a/test/asan/TestCases/Windows/demangled_names.cc b/test/asan/TestCases/Windows/demangled_names.cpp index 6d3019ef0..1e655b43d 100644 --- a/test/asan/TestCases/Windows/demangled_names.cc +++ b/test/asan/TestCases/Windows/demangled_names.cpp @@ -43,8 +43,8 @@ int main() { free(buffer); A<char*> a(buffer); // CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]] -// CHECK: foo::bar<42>{{.*}}demangled_names.cc -// CHECK: foo::spam{{.*}}demangled_names.cc -// CHECK: baz<char *,1>{{.*}}demangled_names.cc -// CHECK: A<char *>::~A<char *>{{.*}}demangled_names.cc +// CHECK: foo::bar<42>{{.*}}demangled_names.cpp +// CHECK: foo::spam{{.*}}demangled_names.cpp +// CHECK: baz<char *,1>{{.*}}demangled_names.cpp +// CHECK: A<char *>::~A<char *>{{.*}}demangled_names.cpp } diff --git a/test/asan/TestCases/Windows/dll_aligned_mallocs.cc b/test/asan/TestCases/Windows/dll_aligned_mallocs.cpp index 8ef428462..a6a1a3bb9 100644 --- a/test/asan/TestCases/Windows/dll_aligned_mallocs.cc +++ b/test/asan/TestCases/Windows/dll_aligned_mallocs.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll // RUN: %run %t %t.dll | FileCheck %s diff --git a/test/asan/TestCases/Windows/dll_allocators_sanity.cc b/test/asan/TestCases/Windows/dll_allocators_sanity.cpp index 35b47c433..9e0543cb6 100644 --- a/test/asan/TestCases/Windows/dll_allocators_sanity.cc +++ b/test/asan/TestCases/Windows/dll_allocators_sanity.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll // RUN: %run %t %t.dll | FileCheck %s diff --git a/test/asan/TestCases/Windows/dll_and_lib.cc b/test/asan/TestCases/Windows/dll_and_lib.cpp index bddaa32df..bddaa32df 100644 --- a/test/asan/TestCases/Windows/dll_and_lib.cc +++ b/test/asan/TestCases/Windows/dll_and_lib.cpp diff --git a/test/asan/TestCases/Windows/dll_cerr.cc b/test/asan/TestCases/Windows/dll_cerr.cpp index 792c05f70..1e0967888 100644 --- a/test/asan/TestCases/Windows/dll_cerr.cc +++ b/test/asan/TestCases/Windows/dll_cerr.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll // RUN: %run %t %t.dll 2>&1 | FileCheck %s diff --git a/test/asan/TestCases/Windows/dll_control_c.cc b/test/asan/TestCases/Windows/dll_control_c.cpp index 40d010d07..e30276325 100644 --- a/test/asan/TestCases/Windows/dll_control_c.cc +++ b/test/asan/TestCases/Windows/dll_control_c.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // RUN: %clang_cl_asan -LD -O2 %s -Fe%t.dll // RUNX: %run %t %t.dll 2>&1 | FileCheck %s diff --git a/test/asan/TestCases/Windows/dll_global_dead_strip.c b/test/asan/TestCases/Windows/dll_global_dead_strip.c index 845095d1d..e5716be4e 100644 --- a/test/asan/TestCases/Windows/dll_global_dead_strip.c +++ b/test/asan/TestCases/Windows/dll_global_dead_strip.c @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // // RUN: %clang_cl_asan /Gw -LD -Od %s -Fe%t.dll // RUN: %env_asan_opts=report_globals=2 %run %t %t.dll 2>&1 | FileCheck %s --check-prefix=NOSTRIP diff --git a/test/asan/TestCases/Windows/dll_heap_allocation.cc b/test/asan/TestCases/Windows/dll_heap_allocation.cpp index b4df9d4f2..b4df9d4f2 100644 --- a/test/asan/TestCases/Windows/dll_heap_allocation.cc +++ b/test/asan/TestCases/Windows/dll_heap_allocation.cpp diff --git a/test/asan/TestCases/Windows/dll_host.cc b/test/asan/TestCases/Windows/dll_host.cpp index 30678e3eb..30678e3eb 100644 --- a/test/asan/TestCases/Windows/dll_host.cc +++ b/test/asan/TestCases/Windows/dll_host.cpp diff --git a/test/asan/TestCases/Windows/dll_intercept_memchr.cc b/test/asan/TestCases/Windows/dll_intercept_memchr.cpp index 7891a2afe..093134fac 100644 --- a/test/asan/TestCases/Windows/dll_intercept_memchr.cc +++ b/test/asan/TestCases/Windows/dll_intercept_memchr.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll // RUN: not %run %t %t.dll 2>&1 | FileCheck %s @@ -19,9 +19,9 @@ int test_function() { // CHECK: READ of size 7 at [[ADDR]] thread T0 // CHECK-NEXT: __asan_wrap_memchr // CHECK-NEXT: memchr -// CHECK-NEXT: test_function {{.*}}dll_intercept_memchr.cc:[[@LINE-5]] +// CHECK-NEXT: test_function {{.*}}dll_intercept_memchr.cpp:[[@LINE-5]] // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame -// CHECK-NEXT: test_function {{.*}}dll_intercept_memchr.cc +// CHECK-NEXT: test_function {{.*}}dll_intercept_memchr.cpp // CHECK: 'buff'{{.*}} <== Memory access at offset {{.*}} overflows this variable return 0; } diff --git a/test/asan/TestCases/Windows/dll_intercept_memcpy.cc b/test/asan/TestCases/Windows/dll_intercept_memcpy.cpp index 2c284e761..7b4fbb63b 100644 --- a/test/asan/TestCases/Windows/dll_intercept_memcpy.cc +++ b/test/asan/TestCases/Windows/dll_intercept_memcpy.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // RUN: %clang_cl_asan -Wno-fortify-source -LD -Od %s -Fe%t.dll // RUN: not %run %t %t.dll 2>&1 | FileCheck %s @@ -24,9 +24,9 @@ int test_function() { // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 6 at [[ADDR]] thread T0 // CHECK-NEXT: __asan_{{.*}}memcpy -// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy.cc:[[@LINE-4]] +// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy.cpp:[[@LINE-4]] // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame -// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy.cc +// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy.cpp // CHECK: 'buff2'{{.*}} <== Memory access at offset {{.*}} overflows this variable return 0; } diff --git a/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc b/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cpp index 49fde377f..f2b8cdb5f 100644 --- a/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc +++ b/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll // RUN: not %run %t %t.dll 2>&1 | FileCheck %s @@ -26,9 +26,9 @@ int test_function() { // CHECK: WRITE of size 6 at [[ADDR]] thread T0 // CHECK-NEXT: __asan_{{.*}}mem{{.*}} // CHECK-NEXT: call_memcpy -// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy_indirect.cc:[[@LINE-5]] +// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy_indirect.cpp:[[@LINE-5]] // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame -// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy_indirect.cc +// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy_indirect.cpp // CHECK: 'buff2'{{.*}} <== Memory access at offset {{.*}} overflows this variable return 0; } diff --git a/test/asan/TestCases/Windows/dll_intercept_memset.cc b/test/asan/TestCases/Windows/dll_intercept_memset.cpp index ccf2e2183..789a19935 100644 --- a/test/asan/TestCases/Windows/dll_intercept_memset.cc +++ b/test/asan/TestCases/Windows/dll_intercept_memset.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // RUN: %clang_cl_asan -Wno-fortify-source -LD -Od %s -Fe%t.dll // RUN: not %run %t %t.dll 2>&1 | FileCheck %s @@ -24,9 +24,9 @@ int test_function() { // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 6 at [[ADDR]] thread T0 // CHECK-NEXT: __asan_memset -// CHECK-NEXT: test_function {{.*}}dll_intercept_memset.cc:[[@LINE-4]] +// CHECK-NEXT: test_function {{.*}}dll_intercept_memset.cpp:[[@LINE-4]] // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame -// CHECK-NEXT: test_function {{.*}}dll_intercept_memset.cc +// CHECK-NEXT: test_function {{.*}}dll_intercept_memset.cpp // CHECK: 'buff'{{.*}} <== Memory access at offset {{.*}} overflows this variable return 0; } diff --git a/test/asan/TestCases/Windows/dll_intercept_strlen.cc b/test/asan/TestCases/Windows/dll_intercept_strlen.cpp index 2e10c504a..e15dec137 100644 --- a/test/asan/TestCases/Windows/dll_intercept_strlen.cc +++ b/test/asan/TestCases/Windows/dll_intercept_strlen.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll // RUN: not %run %t %t.dll 2>&1 | FileCheck %s @@ -20,9 +20,9 @@ int test_function() { // FIXME: Should be READ of size 1, see issue 155. // CHECK: READ of size {{[0-9]+}} at [[ADDR]] thread T0 // CHECK-NEXT: {{#0 .*}}strlen -// CHECK-NEXT: {{#1 .* test_function .*}}dll_intercept_strlen.cc:[[@LINE-5]] +// CHECK-NEXT: {{#1 .* test_function .*}}dll_intercept_strlen.cpp:[[@LINE-5]] // // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame -// CHECK-NEXT: test_function {{.*}}dll_intercept_strlen.cc: +// CHECK-NEXT: test_function {{.*}}dll_intercept_strlen.cpp: return len > 42; } diff --git a/test/asan/TestCases/Windows/dll_large_function.cc b/test/asan/TestCases/Windows/dll_large_function.cpp index 039d01f84..039d01f84 100644 --- a/test/asan/TestCases/Windows/dll_large_function.cc +++ b/test/asan/TestCases/Windows/dll_large_function.cpp diff --git a/test/asan/TestCases/Windows/dll_malloc_left_oob.cc b/test/asan/TestCases/Windows/dll_malloc_left_oob.cpp index 4ed50e9c6..bab857714 100644 --- a/test/asan/TestCases/Windows/dll_malloc_left_oob.cc +++ b/test/asan/TestCases/Windows/dll_malloc_left_oob.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll // RUN: not %run %t %t.dll 2>&1 | FileCheck %s @@ -9,14 +9,14 @@ int test_function() { buffer[-1] = 42; // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK-NEXT: test_function {{.*}}dll_malloc_left_oob.cc:[[@LINE-3]] -// CHECK-NEXT: main {{.*}}dll_host.cc +// CHECK-NEXT: test_function {{.*}}dll_malloc_left_oob.cpp:[[@LINE-3]] +// CHECK-NEXT: main {{.*}}dll_host.cpp // // CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region // CHECK-LABEL: allocated by thread T0 here: // CHECK-NEXT: malloc -// CHECK-NEXT: test_function {{.*}}dll_malloc_left_oob.cc:[[@LINE-10]] -// CHECK-NEXT: main {{.*}}dll_host.cc +// CHECK-NEXT: test_function {{.*}}dll_malloc_left_oob.cpp:[[@LINE-10]] +// CHECK-NEXT: main {{.*}}dll_host.cpp // CHECK-LABEL: SUMMARY free(buffer); return 0; diff --git a/test/asan/TestCases/Windows/dll_malloc_uaf.cc b/test/asan/TestCases/Windows/dll_malloc_uaf.cpp index adaded1df..290541f6d 100644 --- a/test/asan/TestCases/Windows/dll_malloc_uaf.cc +++ b/test/asan/TestCases/Windows/dll_malloc_uaf.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll // RUN: not %run %t %t.dll 2>&1 | FileCheck %s @@ -11,18 +11,18 @@ int test_function() { buffer[0] = 42; // CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 4 at [[ADDR]] thread T0 -// CHECK-NEXT: test_function {{.*}}dll_malloc_uaf.cc:[[@LINE-3]] +// CHECK-NEXT: test_function {{.*}}dll_malloc_uaf.cpp:[[@LINE-3]] // CHECK-NEXT: main {{.*}}dll_host // // CHECK: [[ADDR]] is located 0 bytes inside of 42-byte region // CHECK-LABEL: freed by thread T0 here: // CHECK-NEXT: free -// CHECK-NEXT: test_function {{.*}}dll_malloc_uaf.cc:[[@LINE-10]] +// CHECK-NEXT: test_function {{.*}}dll_malloc_uaf.cpp:[[@LINE-10]] // CHECK-NEXT: main {{.*}}dll_host // // CHECK-LABEL: previously allocated by thread T0 here: // CHECK-NEXT: malloc -// CHECK-NEXT: test_function {{.*}}dll_malloc_uaf.cc:[[@LINE-16]] +// CHECK-NEXT: test_function {{.*}}dll_malloc_uaf.cpp:[[@LINE-16]] // CHECK-NEXT: main {{.*}}dll_host return 0; } diff --git a/test/asan/TestCases/Windows/dll_noreturn.cc b/test/asan/TestCases/Windows/dll_noreturn.cpp index dfe51aadb..8b8e4d149 100644 --- a/test/asan/TestCases/Windows/dll_noreturn.cc +++ b/test/asan/TestCases/Windows/dll_noreturn.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll // RUN: not %run %t %t.dll 2>&1 | FileCheck %s @@ -11,12 +11,12 @@ void noreturn_f() { _exit(1); // CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK-NEXT: noreturn_f{{.*}}dll_noreturn.cc:[[@LINE-4]] -// CHECK-NEXT: test_function{{.*}}dll_noreturn.cc -// CHECK-NEXT: main{{.*}}dll_host.cc +// CHECK-NEXT: noreturn_f{{.*}}dll_noreturn.cpp:[[@LINE-4]] +// CHECK-NEXT: test_function{{.*}}dll_noreturn.cpp +// CHECK-NEXT: main{{.*}}dll_host.cpp // // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:.*]] in frame -// CHECK-NEXT: noreturn_f{{.*}}dll_noreturn.cc +// CHECK-NEXT: noreturn_f{{.*}}dll_noreturn.cpp // CHECK: 'buffer'{{.*}} <== Memory access at offset [[OFFSET]] underflows this variable // CHECK-LABEL: SUMMARY } diff --git a/test/asan/TestCases/Windows/dll_null_deref.cc b/test/asan/TestCases/Windows/dll_null_deref.cpp index 5b3d97705..0c826a0f3 100644 --- a/test/asan/TestCases/Windows/dll_null_deref.cc +++ b/test/asan/TestCases/Windows/dll_null_deref.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll // RUN: not %run %t %t.dll 2>&1 | FileCheck %s @@ -12,7 +12,7 @@ static void NullDeref(int *ptr) { extern "C" __declspec(dllexport) int test_function() { NullDeref((int*)0); - // CHECK: {{ #1 0x.* in test_function .*\dll_null_deref.cc:}}[[@LINE-1]] + // CHECK: {{ #1 0x.* in test_function .*\dll_null_deref.cpp:}}[[@LINE-1]] // CHECK: AddressSanitizer can not provide additional info. return 0; } diff --git a/test/asan/TestCases/Windows/dll_operator_array_new_left_oob.cc b/test/asan/TestCases/Windows/dll_operator_array_new_left_oob.cpp index 3983a2651..95064d7ae 100644 --- a/test/asan/TestCases/Windows/dll_operator_array_new_left_oob.cc +++ b/test/asan/TestCases/Windows/dll_operator_array_new_left_oob.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll // RUN: not %run %t %t.dll 2>&1 | FileCheck %s @@ -8,8 +8,8 @@ int test_function() { buffer[-1] = 42; // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_left_oob.cc:[[@LINE-3]] -// CHECK-NEXT: main {{.*}}dll_host.cc +// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_left_oob.cpp:[[@LINE-3]] +// CHECK-NEXT: main {{.*}}dll_host.cpp // // CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region // CHECK-LABEL: allocated by thread T0 here: @@ -17,8 +17,8 @@ int test_function() { // operator new/delete in DLLs when using -MT CRT. // FIXME: The 'operator new' frame should have []. // CHECK: operator new -// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_left_oob.cc:[[@LINE-13]] -// CHECK-NEXT: main {{.*}}dll_host.cc +// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_left_oob.cpp:[[@LINE-13]] +// CHECK-NEXT: main {{.*}}dll_host.cpp // CHECK-LABEL: SUMMARY delete [] buffer; return 0; diff --git a/test/asan/TestCases/Windows/dll_operator_array_new_with_dtor_left_oob.cc b/test/asan/TestCases/Windows/dll_operator_array_new_with_dtor_left_oob.cpp index 4b0e45d85..a08524f7b 100644 --- a/test/asan/TestCases/Windows/dll_operator_array_new_with_dtor_left_oob.cc +++ b/test/asan/TestCases/Windows/dll_operator_array_new_with_dtor_left_oob.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll // RUN: not %run %t %t.dll 2>&1 | FileCheck %s @@ -13,8 +13,8 @@ int test_function() { buffer[-(1 + sizeof(void*) / 4)].x = 42; // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 4 at [[ADDR]] thread T0 -// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_with_dtor_left_oob.cc:[[@LINE-3]] -// CHECK-NEXT: main {{.*}}dll_host.cc +// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_with_dtor_left_oob.cpp:[[@LINE-3]] +// CHECK-NEXT: main {{.*}}dll_host.cpp // // FIXME: Currently it says "4 bytes ... left of 172-byte region", // should be "8 bytes ... left of 168-byte region", see @@ -25,8 +25,8 @@ int test_function() { // FIXME: The operator new frame should have []. // CHECK-LABEL: allocated by thread T0 here: // CHECK: operator new -// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_with_dtor_left_oob.cc:[[@LINE-16]] -// CHECK-NEXT: main {{.*}}dll_host.cc +// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_with_dtor_left_oob.cpp:[[@LINE-16]] +// CHECK-NEXT: main {{.*}}dll_host.cpp // CHECK-LABEL: SUMMARY delete [] buffer; return 0; diff --git a/test/asan/TestCases/Windows/dll_poison_unpoison.cc b/test/asan/TestCases/Windows/dll_poison_unpoison.cpp index bbc2730e1..6a23da764 100644 --- a/test/asan/TestCases/Windows/dll_poison_unpoison.cc +++ b/test/asan/TestCases/Windows/dll_poison_unpoison.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll // RUN: not %run %t %t.dll 2>&1 | FileCheck %s @@ -24,12 +24,12 @@ int test_function() { should_crash(&buffer[96]); // CHECK: AddressSanitizer: use-after-poison on address [[ADDR:0x[0-9a-f]+]] // CHECK-NEXT: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK-NEXT: should_crash{{.*}}\dll_poison_unpoison.cc -// CHECK-NEXT: test_function{{.*}}\dll_poison_unpoison.cc:[[@LINE-4]] +// CHECK-NEXT: should_crash{{.*}}\dll_poison_unpoison.cpp +// CHECK-NEXT: test_function{{.*}}\dll_poison_unpoison.cpp:[[@LINE-4]] // CHECK-NEXT: main // // CHECK: [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:.*]] in frame -// CHECK-NEXT: test_function{{.*}}\dll_poison_unpoison.cc +// CHECK-NEXT: test_function{{.*}}\dll_poison_unpoison.cpp // CHECK: 'buffer'{{.*}} <== Memory access at offset [[OFFSET]] is inside this variable return 0; } diff --git a/test/asan/TestCases/Windows/dll_report_globals_symbolization_at_startup.cc b/test/asan/TestCases/Windows/dll_report_globals_symbolization_at_startup.cpp index 0a8e3d8cd..0a8e3d8cd 100644 --- a/test/asan/TestCases/Windows/dll_report_globals_symbolization_at_startup.cc +++ b/test/asan/TestCases/Windows/dll_report_globals_symbolization_at_startup.cpp diff --git a/test/asan/TestCases/Windows/dll_seh.cc b/test/asan/TestCases/Windows/dll_seh.cpp index 033892e74..3651463c5 100644 --- a/test/asan/TestCases/Windows/dll_seh.cc +++ b/test/asan/TestCases/Windows/dll_seh.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // // Check both -GS and -GS- builds: // RUN: %clang_cl_asan -GS -LD -Od %s -Fe%t.dll diff --git a/test/asan/TestCases/Windows/dll_stack_use_after_return.cc b/test/asan/TestCases/Windows/dll_stack_use_after_return.cpp index 44313195b..3f36fccb0 100644 --- a/test/asan/TestCases/Windows/dll_stack_use_after_return.cc +++ b/test/asan/TestCases/Windows/dll_stack_use_after_return.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll // RUN: %env_asan_opts=detect_stack_use_after_return=1 not %run %t %t.dll 2>&1 | FileCheck %s @@ -17,11 +17,11 @@ int test_function() { *x = 42; // CHECK: AddressSanitizer: stack-use-after-return // CHECK: WRITE of size 1 at [[ADDR:.*]] thread T0 -// CHECK-NEXT: test_function{{.*}}dll_stack_use_after_return.cc:[[@LINE-3]] +// CHECK-NEXT: test_function{{.*}}dll_stack_use_after_return.cpp:[[@LINE-3]] // CHECK-NEXT: main // // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:.*]] in frame -// CHECK-NEXT: #0 {{.*}} foo{{.*}}dll_stack_use_after_return.cc +// CHECK-NEXT: #0 {{.*}} foo{{.*}}dll_stack_use_after_return.cpp // CHECK: 'stack_buffer'{{.*}} <== Memory access at offset [[OFFSET]] is inside this variable return 0; } diff --git a/test/asan/TestCases/Windows/dll_thread_stack_array_left_oob.cc b/test/asan/TestCases/Windows/dll_thread_stack_array_left_oob.cpp index 8959846b1..c25da9008 100644 --- a/test/asan/TestCases/Windows/dll_thread_stack_array_left_oob.cc +++ b/test/asan/TestCases/Windows/dll_thread_stack_array_left_oob.cpp @@ -1,4 +1,4 @@ -// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t +// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll // RUN: not %run %t %t.dll 2>&1 | FileCheck %s @@ -11,10 +11,10 @@ DWORD WINAPI thread_proc(void *context) { stack_buffer[subscript] = 42; // CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T1 -// CHECK-NEXT: thread_proc{{.*}}dll_thread_stack_array_left_oob.cc:[[@LINE-3]] +// CHECK-NEXT: thread_proc{{.*}}dll_thread_stack_array_left_oob.cpp:[[@LINE-3]] // // CHECK: Address [[ADDR]] is located in stack of thread T1 at offset [[OFFSET:.*]] in frame -// CHECK-NEXT: thread_proc{{.*}}dll_thread_stack_array_left_oob.cc +// CHECK-NEXT: thread_proc{{.*}}dll_thread_stack_array_left_oob.cpp // // CHECK: 'stack_buffer'{{.*}} <== Memory access at offset [[OFFSET]] underflows this variable @@ -25,8 +25,8 @@ extern "C" __declspec(dllexport) int test_function() { HANDLE thr = CreateThread(NULL, 0, thread_proc, NULL, 0, NULL); // CHECK-LABEL: Thread T1 created by T0 here: -// CHECK: test_function{{.*}}dll_thread_stack_array_left_oob.cc:[[@LINE-2]] -// CHECK-NEXT: main{{.*}}dll_host.cc +// CHECK: test_function{{.*}}dll_thread_stack_array_left_oob.cpp:[[@LINE-2]] +// CHECK-NEXT: main{{.*}}dll_host.cpp // CHECK-LABEL: SUMMARY if (thr == 0) return 1; diff --git a/test/asan/TestCases/Windows/dll_unload.cc b/test/asan/TestCases/Windows/dll_unload.cpp index 055567a0f..055567a0f 100644 --- a/test/asan/TestCases/Windows/dll_unload.cc +++ b/test/asan/TestCases/Windows/dll_unload.cpp diff --git a/test/asan/TestCases/Windows/double_free.cc b/test/asan/TestCases/Windows/double_free.cpp index 7a1dd3b5b..68437462a 100644 --- a/test/asan/TestCases/Windows/double_free.cc +++ b/test/asan/TestCases/Windows/double_free.cpp @@ -9,13 +9,13 @@ int main() { free(x); // CHECK: AddressSanitizer: attempting double-free on [[ADDR:0x[0-9a-f]+]] // CHECK-NEXT: {{#0 .* free }} -// CHECK-NEXT: {{#1 .* main .*double_free.cc}}:[[@LINE-3]] +// CHECK-NEXT: {{#1 .* main .*double_free.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located 0 bytes inside of 168-byte region // CHECK-LABEL: freed by thread T0 here: // CHECK-NEXT: {{#0 .* free }} -// CHECK-NEXT: {{#1 .* main .*double_free.cc}}:[[@LINE-8]] +// CHECK-NEXT: {{#1 .* main .*double_free.cpp}}:[[@LINE-8]] // CHECK-LABEL: previously allocated by thread T0 here: // CHECK-NEXT: {{#0 .* malloc }} -// CHECK-NEXT: {{#1 .* main .*double_free.cc}}:[[@LINE-12]] +// CHECK-NEXT: {{#1 .* main .*double_free.cpp}}:[[@LINE-12]] return 0; } diff --git a/test/asan/TestCases/Windows/double_operator_delete.cc b/test/asan/TestCases/Windows/double_operator_delete.cpp index 99a8fc472..168e531a8 100644 --- a/test/asan/TestCases/Windows/double_operator_delete.cc +++ b/test/asan/TestCases/Windows/double_operator_delete.cpp @@ -10,16 +10,16 @@ int main() { // CHECK: AddressSanitizer: attempting double-free on [[ADDR:0x[0-9a-f]+]] // FIXME: The 'operator delete' frame should have []. // CHECK-NEXT: {{#0 .* operator delete}} -// CHECK-NEXT: {{#1 .* main .*double_operator_delete.cc}}:[[@LINE-4]] +// CHECK-NEXT: {{#1 .* main .*double_operator_delete.cpp}}:[[@LINE-4]] // CHECK: [[ADDR]] is located 0 bytes inside of 168-byte region // CHECK-LABEL: freed by thread T0 here: // FIXME: The 'operator delete' frame should have []. // CHECK-NEXT: {{#0 .* operator delete}} -// CHECK-NEXT: {{#1 .* main .*double_operator_delete.cc}}:[[@LINE-10]] +// CHECK-NEXT: {{#1 .* main .*double_operator_delete.cpp}}:[[@LINE-10]] // CHECK-LABEL: previously allocated by thread T0 here: // FIXME: The 'operator new' frame should have []. // CHECK-NEXT: {{#0 .* operator new}} -// CHECK-NEXT: {{#1 .* main .*double_operator_delete.cc}}:[[@LINE-15]] +// CHECK-NEXT: {{#1 .* main .*double_operator_delete.cpp}}:[[@LINE-15]] return 0; } diff --git a/test/asan/TestCases/Windows/free_hook_realloc.cc b/test/asan/TestCases/Windows/free_hook_realloc.cpp index 11e8c9975..11e8c9975 100644 --- a/test/asan/TestCases/Windows/free_hook_realloc.cc +++ b/test/asan/TestCases/Windows/free_hook_realloc.cpp diff --git a/test/asan/TestCases/Windows/fuse-lld-globals.cc b/test/asan/TestCases/Windows/fuse-lld-globals.cpp index 4148d562f..cb068431e 100644 --- a/test/asan/TestCases/Windows/fuse-lld-globals.cc +++ b/test/asan/TestCases/Windows/fuse-lld-globals.cpp @@ -10,7 +10,7 @@ int main(int argc, char **argv) { memset(ZZZ, 0, 10); int res = YYY[argc * 10]; // BOOOM // CHECK: {{READ of size 1 at 0x.* thread T0}} - // CHECK: {{ #0 0x.* in main .*fuse-lld-globals.cc:}}[[@LINE-2]] + // CHECK: {{ #0 0x.* in main .*fuse-lld-globals.cpp:}}[[@LINE-2]] // CHECK: {{0x.* is located 0 bytes to the right of global variable}} // CHECK: {{.*YYY.* of size 10}} res += XXX[argc] + ZZZ[argc]; diff --git a/test/asan/TestCases/Windows/fuse-lld.cc b/test/asan/TestCases/Windows/fuse-lld.cpp index 2aee0385d..5fa5945df 100644 --- a/test/asan/TestCases/Windows/fuse-lld.cc +++ b/test/asan/TestCases/Windows/fuse-lld.cpp @@ -13,7 +13,7 @@ int main() { return x[5]; // CHECK: heap-use-after-free // CHECK: free - // CHECK: main{{.*}}fuse-lld.cc:[[@LINE-4]]:3 + // CHECK: main{{.*}}fuse-lld.cpp:[[@LINE-4]]:3 // CHECK: malloc - // CHECK: main{{.*}}fuse-lld.cc:[[@LINE-7]]:20 + // CHECK: main{{.*}}fuse-lld.cpp:[[@LINE-7]]:20 } diff --git a/test/asan/TestCases/Windows/global_const_string.cc b/test/asan/TestCases/Windows/global_const_string.cpp index 546419dad..546419dad 100644 --- a/test/asan/TestCases/Windows/global_const_string.cc +++ b/test/asan/TestCases/Windows/global_const_string.cpp diff --git a/test/asan/TestCases/Windows/global_const_string_oob.cc b/test/asan/TestCases/Windows/global_const_string_oob.cpp index f31190f7d..241d14f42 100644 --- a/test/asan/TestCases/Windows/global_const_string_oob.cc +++ b/test/asan/TestCases/Windows/global_const_string_oob.cpp @@ -12,8 +12,8 @@ int main(void) { // CHECK-NOT: Boo // CHECK: AddressSanitizer: global-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: READ of size 1 at [[ADDR]] thread T0 -// CHECK-NEXT: {{#0 .* main .*global_const_string_oob.cc:}}[[@LINE-5]] -// CHECK: [[ADDR]] is located 5 bytes to the right of global variable [[STR:.*]] defined in {{'.*global_const_string_oob.cc:7:.*' .*}} of size 11 +// CHECK-NEXT: {{#0 .* main .*global_const_string_oob.cpp:}}[[@LINE-5]] +// CHECK: [[ADDR]] is located 5 bytes to the right of global variable [[STR:.*]] defined in {{'.*global_const_string_oob.cpp:7:.*' .*}} of size 11 // CHECK: [[STR]] is ascii string 'foobarspam' return 0; } diff --git a/test/asan/TestCases/Windows/heapalloc.cc b/test/asan/TestCases/Windows/heapalloc.cpp index cb07b8fb0..cb07b8fb0 100644 --- a/test/asan/TestCases/Windows/heapalloc.cc +++ b/test/asan/TestCases/Windows/heapalloc.cpp diff --git a/test/asan/TestCases/Windows/heapalloc_dll_double_free.cc b/test/asan/TestCases/Windows/heapalloc_dll_double_free.cpp index 496289ae1..496289ae1 100644 --- a/test/asan/TestCases/Windows/heapalloc_dll_double_free.cc +++ b/test/asan/TestCases/Windows/heapalloc_dll_double_free.cpp diff --git a/test/asan/TestCases/Windows/heapalloc_dll_unload_realloc_uaf.cc b/test/asan/TestCases/Windows/heapalloc_dll_unload_realloc_uaf.cpp index 79b30f4a9..79b30f4a9 100644 --- a/test/asan/TestCases/Windows/heapalloc_dll_unload_realloc_uaf.cc +++ b/test/asan/TestCases/Windows/heapalloc_dll_unload_realloc_uaf.cpp diff --git a/test/asan/TestCases/Windows/heapalloc_doublefree.cc b/test/asan/TestCases/Windows/heapalloc_doublefree.cpp index 3394a9233..3394a9233 100644 --- a/test/asan/TestCases/Windows/heapalloc_doublefree.cc +++ b/test/asan/TestCases/Windows/heapalloc_doublefree.cpp diff --git a/test/asan/TestCases/Windows/heapalloc_flags_fallback.cc b/test/asan/TestCases/Windows/heapalloc_flags_fallback.cpp index e040fd581..e040fd581 100644 --- a/test/asan/TestCases/Windows/heapalloc_flags_fallback.cc +++ b/test/asan/TestCases/Windows/heapalloc_flags_fallback.cpp diff --git a/test/asan/TestCases/Windows/heapalloc_huge.cc b/test/asan/TestCases/Windows/heapalloc_huge.cpp index 3a6ce7854..3a6ce7854 100644 --- a/test/asan/TestCases/Windows/heapalloc_huge.cc +++ b/test/asan/TestCases/Windows/heapalloc_huge.cpp diff --git a/test/asan/TestCases/Windows/heapalloc_rtl_transfer.cc b/test/asan/TestCases/Windows/heapalloc_rtl_transfer.cpp index a36e59470..a36e59470 100644 --- a/test/asan/TestCases/Windows/heapalloc_rtl_transfer.cc +++ b/test/asan/TestCases/Windows/heapalloc_rtl_transfer.cpp diff --git a/test/asan/TestCases/Windows/heapalloc_sanity.cc b/test/asan/TestCases/Windows/heapalloc_sanity.cpp index a2ee68621..a2ee68621 100644 --- a/test/asan/TestCases/Windows/heapalloc_sanity.cc +++ b/test/asan/TestCases/Windows/heapalloc_sanity.cpp diff --git a/test/asan/TestCases/Windows/heapalloc_transfer.cc b/test/asan/TestCases/Windows/heapalloc_transfer.cpp index 497d36b41..497d36b41 100644 --- a/test/asan/TestCases/Windows/heapalloc_transfer.cc +++ b/test/asan/TestCases/Windows/heapalloc_transfer.cpp diff --git a/test/asan/TestCases/Windows/heapalloc_uaf.cc b/test/asan/TestCases/Windows/heapalloc_uaf.cpp index e0f1f8657..e0f1f8657 100644 --- a/test/asan/TestCases/Windows/heapalloc_uaf.cc +++ b/test/asan/TestCases/Windows/heapalloc_uaf.cpp diff --git a/test/asan/TestCases/Windows/heapalloc_zero_size.cc b/test/asan/TestCases/Windows/heapalloc_zero_size.cpp index 40396ed5f..40396ed5f 100644 --- a/test/asan/TestCases/Windows/heapalloc_zero_size.cc +++ b/test/asan/TestCases/Windows/heapalloc_zero_size.cpp diff --git a/test/asan/TestCases/Windows/heaprealloc.cc b/test/asan/TestCases/Windows/heaprealloc.cpp index add644c05..add644c05 100644 --- a/test/asan/TestCases/Windows/heaprealloc.cc +++ b/test/asan/TestCases/Windows/heaprealloc.cpp diff --git a/test/asan/TestCases/Windows/heaprealloc_alloc_zero.cc b/test/asan/TestCases/Windows/heaprealloc_alloc_zero.cpp index 7b1272ea5..7b1272ea5 100644 --- a/test/asan/TestCases/Windows/heaprealloc_alloc_zero.cc +++ b/test/asan/TestCases/Windows/heaprealloc_alloc_zero.cpp diff --git a/test/asan/TestCases/Windows/heaprealloc_zero_size.cc b/test/asan/TestCases/Windows/heaprealloc_zero_size.cpp index 96bc9b90c..96bc9b90c 100644 --- a/test/asan/TestCases/Windows/heaprealloc_zero_size.cc +++ b/test/asan/TestCases/Windows/heaprealloc_zero_size.cpp diff --git a/test/asan/TestCases/Windows/hello_world.cc b/test/asan/TestCases/Windows/hello_world.cpp index 0caeb3555..0caeb3555 100644 --- a/test/asan/TestCases/Windows/hello_world.cc +++ b/test/asan/TestCases/Windows/hello_world.cpp diff --git a/test/asan/TestCases/Windows/intercept_memcpy.cc b/test/asan/TestCases/Windows/intercept_memcpy.cpp index 846c6d8b3..db8de07bf 100644 --- a/test/asan/TestCases/Windows/intercept_memcpy.cc +++ b/test/asan/TestCases/Windows/intercept_memcpy.cpp @@ -24,7 +24,7 @@ int main() { // CHECK: WRITE of size 6 at [[ADDR]] thread T0 // CHECK-NEXT: __asan_{{.*}}mem{{.*}} // CHECK-NEXT: call_mem{{.*}} -// CHECK-NEXT: main {{.*}}intercept_memcpy.cc:[[@LINE-5]] +// CHECK-NEXT: main {{.*}}intercept_memcpy.cpp:[[@LINE-5]] // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame // CHECK-NEXT: #0 {{.*}} main // CHECK: 'buff2'{{.*}} <== Memory access at offset {{.*}} overflows this variable diff --git a/test/asan/TestCases/Windows/intercept_strdup.cc b/test/asan/TestCases/Windows/intercept_strdup.cpp index 2bef08d68..46a59ead6 100644 --- a/test/asan/TestCases/Windows/intercept_strdup.cc +++ b/test/asan/TestCases/Windows/intercept_strdup.cpp @@ -17,7 +17,7 @@ int main() { ptr[subscript] = 42; // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK: {{#0 .* main .*}}intercept_strdup.cc:[[@LINE-3]] +// CHECK: {{#0 .* main .*}}intercept_strdup.cpp:[[@LINE-3]] // CHECK: [[ADDR]] is located 1 bytes to the left of 6-byte region // CHECK: allocated by thread T0 here: // @@ -27,6 +27,6 @@ int main() { // // The local call to _strdup above may be the second or third frame depending // on whether we're using the dynamic config. -// CHECK: #{{[12]}} {{.*}} in main {{.*}}intercept_strdup.cc:[[@LINE-21]] +// CHECK: #{{[12]}} {{.*}} in main {{.*}}intercept_strdup.cpp:[[@LINE-21]] free(ptr); } diff --git a/test/asan/TestCases/Windows/intercept_strlen.cc b/test/asan/TestCases/Windows/intercept_strlen.cpp index 217aab2de..0cedf9f22 100644 --- a/test/asan/TestCases/Windows/intercept_strlen.cc +++ b/test/asan/TestCases/Windows/intercept_strlen.cpp @@ -19,9 +19,9 @@ int main() { // FIXME: Should be READ of size 1, see issue 155. // CHECK: READ of size {{[0-9]+}} at [[ADDR]] thread T0 // CHECK: strlen -// CHECK-NEXT: main {{.*}}intercept_strlen.cc:[[@LINE-5]] +// CHECK-NEXT: main {{.*}}intercept_strlen.cpp:[[@LINE-5]] // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame -// CHECK-NEXT: main {{.*}}intercept_strlen.cc +// CHECK-NEXT: main {{.*}}intercept_strlen.cpp // CHECK: 'str'{{.*}} <== Memory access at offset {{.*}} overflows this variable return len < 6; } diff --git a/test/asan/TestCases/Windows/interface_symbols_windows.cc b/test/asan/TestCases/Windows/interface_symbols_windows.cpp index 1738b87e8..1738b87e8 100644 --- a/test/asan/TestCases/Windows/interface_symbols_windows.cc +++ b/test/asan/TestCases/Windows/interface_symbols_windows.cpp diff --git a/test/asan/TestCases/Windows/iostream_sbo.cc b/test/asan/TestCases/Windows/iostream_sbo.cpp index 46f452a32..46f452a32 100644 --- a/test/asan/TestCases/Windows/iostream_sbo.cc +++ b/test/asan/TestCases/Windows/iostream_sbo.cpp diff --git a/test/asan/TestCases/Windows/longjmp.cc b/test/asan/TestCases/Windows/longjmp.cpp index 443933e8a..443933e8a 100644 --- a/test/asan/TestCases/Windows/longjmp.cc +++ b/test/asan/TestCases/Windows/longjmp.cpp diff --git a/test/asan/TestCases/Windows/malloc_left_oob.cc b/test/asan/TestCases/Windows/malloc_left_oob.cpp index 131dff2ef..cf8a1b708 100644 --- a/test/asan/TestCases/Windows/malloc_left_oob.cc +++ b/test/asan/TestCases/Windows/malloc_left_oob.cpp @@ -8,10 +8,10 @@ int main() { buffer[-1] = 42; // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK-NEXT: {{#0 .* main .*malloc_left_oob.cc}}:[[@LINE-3]] +// CHECK-NEXT: {{#0 .* main .*malloc_left_oob.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region // CHECK: allocated by thread T0 here: // CHECK-NEXT: {{#0 .* malloc }} -// CHECK-NEXT: {{#1 .* main .*malloc_left_oob.cc}}:[[@LINE-8]] +// CHECK-NEXT: {{#1 .* main .*malloc_left_oob.cpp}}:[[@LINE-8]] free(buffer); } diff --git a/test/asan/TestCases/Windows/malloc_right_oob.cc b/test/asan/TestCases/Windows/malloc_right_oob.cpp index 4fef3065c..acb55a3a2 100644 --- a/test/asan/TestCases/Windows/malloc_right_oob.cc +++ b/test/asan/TestCases/Windows/malloc_right_oob.cpp @@ -8,10 +8,10 @@ int main() { buffer[42] = 42; // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK-NEXT: {{#0 .* main .*malloc_right_oob.cc}}:[[@LINE-3]] +// CHECK-NEXT: {{#0 .* main .*malloc_right_oob.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located 0 bytes to the right of 42-byte region // CHECK: allocated by thread T0 here: // CHECK-NEXT: {{#0 .* malloc }} -// CHECK-NEXT: {{#1 .* main .*malloc_right_oob.cc}}:[[@LINE-8]] +// CHECK-NEXT: {{#1 .* main .*malloc_right_oob.cpp}}:[[@LINE-8]] free(buffer); } diff --git a/test/asan/TestCases/Windows/malloc_uaf.cc b/test/asan/TestCases/Windows/malloc_uaf.cpp index 5385a5c3c..8cecc680e 100644 --- a/test/asan/TestCases/Windows/malloc_uaf.cc +++ b/test/asan/TestCases/Windows/malloc_uaf.cpp @@ -9,12 +9,12 @@ int main() { buffer[0] = 42; // CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK-NEXT: {{#0 .* main .*malloc_uaf.cc}}:[[@LINE-3]] +// CHECK-NEXT: {{#0 .* main .*malloc_uaf.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located 0 bytes inside of 42-byte region // CHECK: freed by thread T0 here: // CHECK-NEXT: {{#0 .* free }} -// CHECK-NEXT: {{#1 .* main .*malloc_uaf.cc}}:[[@LINE-8]] +// CHECK-NEXT: {{#1 .* main .*malloc_uaf.cpp}}:[[@LINE-8]] // CHECK: previously allocated by thread T0 here: // CHECK-NEXT: {{#0 .* malloc }} -// CHECK-NEXT: {{#1 .* main .*malloc_uaf.cc}}:[[@LINE-12]] +// CHECK-NEXT: {{#1 .* main .*malloc_uaf.cpp}}:[[@LINE-12]] } diff --git a/test/asan/TestCases/Windows/null_deref.cc b/test/asan/TestCases/Windows/null_deref.cpp index 9515602ce..6582bac9e 100644 --- a/test/asan/TestCases/Windows/null_deref.cc +++ b/test/asan/TestCases/Windows/null_deref.cpp @@ -10,6 +10,6 @@ static void NullDeref(int *ptr) { } int main() { NullDeref((int*)0); - // CHECK: {{ #1 0x.* in main.*null_deref.cc:}}[[@LINE-1]]:3 + // CHECK: {{ #1 0x.* in main.*null_deref.cpp:}}[[@LINE-1]]:3 // CHECK: AddressSanitizer can not provide additional info. } diff --git a/test/asan/TestCases/Windows/null_deref_multiple_dlls.cc b/test/asan/TestCases/Windows/null_deref_multiple_dlls.cpp index 281dffa4f..09a572e58 100644 --- a/test/asan/TestCases/Windows/null_deref_multiple_dlls.cc +++ b/test/asan/TestCases/Windows/null_deref_multiple_dlls.cpp @@ -31,7 +31,7 @@ static void NullDeref(int *ptr) { __declspec(dllexport) void foo2() { NullDeref((int*)0); - // CHECK: {{ #1 0x.* in foo2.*null_deref_multiple_dlls.cc:}}[[@LINE-1]] + // CHECK: {{ #1 0x.* in foo2.*null_deref_multiple_dlls.cpp:}}[[@LINE-1]] // CHECK: AddressSanitizer can not provide additional info. } #else diff --git a/test/asan/TestCases/Windows/oom.cc b/test/asan/TestCases/Windows/oom.cpp index bf19aa09c..bf19aa09c 100644 --- a/test/asan/TestCases/Windows/oom.cc +++ b/test/asan/TestCases/Windows/oom.cpp diff --git a/test/asan/TestCases/Windows/operator_array_new_left_oob.cc b/test/asan/TestCases/Windows/operator_array_new_left_oob.cpp index fec8e15b7..a1abd7e1e 100644 --- a/test/asan/TestCases/Windows/operator_array_new_left_oob.cc +++ b/test/asan/TestCases/Windows/operator_array_new_left_oob.cpp @@ -6,12 +6,12 @@ int main() { buffer[-1] = 42; // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK-NEXT: {{#0 .* main .*operator_array_new_left_oob.cc}}:[[@LINE-3]] +// CHECK-NEXT: {{#0 .* main .*operator_array_new_left_oob.cpp}}:[[@LINE-3]] // // CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region // CHECK-LABEL: allocated by thread T0 here: // FIXME: The 'operator new' frame should have []. // CHECK-NEXT: {{#0 .* operator new}} -// CHECK-NEXT: {{#1 .* main .*operator_array_new_left_oob.cc}}:[[@LINE-10]] +// CHECK-NEXT: {{#1 .* main .*operator_array_new_left_oob.cpp}}:[[@LINE-10]] delete [] buffer; } diff --git a/test/asan/TestCases/Windows/operator_array_new_right_oob.cc b/test/asan/TestCases/Windows/operator_array_new_right_oob.cpp index 51c910a2f..05395c0bf 100644 --- a/test/asan/TestCases/Windows/operator_array_new_right_oob.cc +++ b/test/asan/TestCases/Windows/operator_array_new_right_oob.cpp @@ -8,11 +8,11 @@ int main() { buffer[42] = 42; // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK: {{#0 .* main .*operator_array_new_right_oob.cc}}:[[@LINE-3]] +// CHECK: {{#0 .* main .*operator_array_new_right_oob.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located 0 bytes to the right of 42-byte region // CHECK: allocated by thread T0 here: // FIXME: The 'operator new' frame should have []. // CHECK: {{#0 .* operator new}} -// CHECK: {{#1 .* main .*operator_array_new_right_oob.cc}}:[[@LINE-9]] +// CHECK: {{#1 .* main .*operator_array_new_right_oob.cpp}}:[[@LINE-9]] delete [] buffer; } diff --git a/test/asan/TestCases/Windows/operator_array_new_uaf.cc b/test/asan/TestCases/Windows/operator_array_new_uaf.cpp index e6bc1ac1c..552ca9d87 100644 --- a/test/asan/TestCases/Windows/operator_array_new_uaf.cc +++ b/test/asan/TestCases/Windows/operator_array_new_uaf.cpp @@ -9,16 +9,16 @@ int main() { buffer[0] = 42; // CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK: {{#0 .* main .*operator_array_new_uaf.cc}}:[[@LINE-3]] +// CHECK: {{#0 .* main .*operator_array_new_uaf.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located 0 bytes inside of 42-byte region // CHECK-LABEL: freed by thread T0 here: // FIXME: The 'operator delete' frame should have []. // CHECK: {{#0 .* operator delete}} -// CHECK: {{#1 .* main .*operator_array_new_uaf.cc}}:[[@LINE-9]] +// CHECK: {{#1 .* main .*operator_array_new_uaf.cpp}}:[[@LINE-9]] // CHECK-LABEL: previously allocated by thread T0 here: // FIXME: The 'operator new' frame should have []. // CHECK: {{#0 .* operator new}} -// CHECK: {{#1 .* main .*operator_array_new_uaf.cc}}:[[@LINE-14]] +// CHECK: {{#1 .* main .*operator_array_new_uaf.cpp}}:[[@LINE-14]] return 0; } diff --git a/test/asan/TestCases/Windows/operator_array_new_with_dtor_left_oob.cc b/test/asan/TestCases/Windows/operator_array_new_with_dtor_left_oob.cpp index e91d05ea7..0af00fb7c 100644 --- a/test/asan/TestCases/Windows/operator_array_new_with_dtor_left_oob.cc +++ b/test/asan/TestCases/Windows/operator_array_new_with_dtor_left_oob.cpp @@ -11,7 +11,7 @@ int main() { buffer[-(1 + sizeof(void*) / 4)].x = 42; // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 4 at [[ADDR]] thread T0 -// CHECK-NEXT: {{#0 .* main .*operator_array_new_with_dtor_left_oob.cc}}:[[@LINE-3]] +// CHECK-NEXT: {{#0 .* main .*operator_array_new_with_dtor_left_oob.cpp}}:[[@LINE-3]] // // FIXME: Currently it says "4 bytes ... left of 172-byte region", // should be "8 bytes ... left of 168-byte region", see @@ -20,6 +20,6 @@ int main() { // CHECK-LABEL: allocated by thread T0 here: // FIXME: The 'operator new' frame should have []. // CHECK-NEXT: {{#0 .* operator new}} -// CHECK-NEXT: {{#1 .* main .*operator_array_new_with_dtor_left_oob.cc}}:[[@LINE-13]] +// CHECK-NEXT: {{#1 .* main .*operator_array_new_with_dtor_left_oob.cpp}}:[[@LINE-13]] delete [] buffer; } diff --git a/test/asan/TestCases/Windows/operator_delete_wrong_argument.cc b/test/asan/TestCases/Windows/operator_delete_wrong_argument.cpp index d82bf588e..d8891859f 100644 --- a/test/asan/TestCases/Windows/operator_delete_wrong_argument.cc +++ b/test/asan/TestCases/Windows/operator_delete_wrong_argument.cpp @@ -8,5 +8,5 @@ int main() { delete (x + 1); // CHECK: AddressSanitizer: attempting free on address which was not malloc()-ed // CHECK: {{#0 0x.* operator delete}} -// CHECK: {{#1 .* main .*operator_delete_wrong_argument.cc}}:[[@LINE-3]] +// CHECK: {{#1 .* main .*operator_delete_wrong_argument.cpp}}:[[@LINE-3]] } diff --git a/test/asan/TestCases/Windows/operator_new_left_oob.cc b/test/asan/TestCases/Windows/operator_new_left_oob.cpp index 2a0fb70e4..404b6a284 100644 --- a/test/asan/TestCases/Windows/operator_new_left_oob.cc +++ b/test/asan/TestCases/Windows/operator_new_left_oob.cpp @@ -8,10 +8,10 @@ int main() { buffer[-1] = 42; // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK: {{#0 .* main .*operator_new_left_oob.cc}}:[[@LINE-3]] +// CHECK: {{#0 .* main .*operator_new_left_oob.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located 1 bytes to the left of 1-byte region // CHECK: allocated by thread T0 here: // CHECK: {{#0 .* operator new}} -// CHECK: {{#1 .* main .*operator_new_left_oob.cc}}:[[@LINE-8]] +// CHECK: {{#1 .* main .*operator_new_left_oob.cpp}}:[[@LINE-8]] delete buffer; } diff --git a/test/asan/TestCases/Windows/operator_new_right_oob.cc b/test/asan/TestCases/Windows/operator_new_right_oob.cpp index 9ff08d33c..113266bbb 100644 --- a/test/asan/TestCases/Windows/operator_new_right_oob.cc +++ b/test/asan/TestCases/Windows/operator_new_right_oob.cpp @@ -8,10 +8,10 @@ int main() { buffer[1] = 42; // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK: {{#0 .* main .*operator_new_right_oob.cc}}:[[@LINE-3]] +// CHECK: {{#0 .* main .*operator_new_right_oob.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located 0 bytes to the right of 1-byte region // CHECK: allocated by thread T0 here: // CHECK: {{#0 .* operator new}} -// CHECK: {{#1 .* main .*operator_new_right_oob.cc}}:[[@LINE-8]] +// CHECK: {{#1 .* main .*operator_new_right_oob.cpp}}:[[@LINE-8]] delete buffer; } diff --git a/test/asan/TestCases/Windows/operator_new_uaf.cc b/test/asan/TestCases/Windows/operator_new_uaf.cpp index e1453727d..fe8fc9022 100644 --- a/test/asan/TestCases/Windows/operator_new_uaf.cc +++ b/test/asan/TestCases/Windows/operator_new_uaf.cpp @@ -9,14 +9,14 @@ int main() { *buffer = 42; // CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK: {{#0 .* main .*operator_new_uaf.cc}}:[[@LINE-3]] +// CHECK: {{#0 .* main .*operator_new_uaf.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located 0 bytes inside of 1-byte region // CHECK-LABEL: freed by thread T0 here: // CHECK: {{#0 .* operator delete}} -// CHECK: {{#1 .* main .*operator_new_uaf.cc}}:[[@LINE-8]] +// CHECK: {{#1 .* main .*operator_new_uaf.cpp}}:[[@LINE-8]] // CHECK-LABEL: previously allocated by thread T0 here: // CHECK: {{#0 .* operator new}} -// CHECK: {{#1 .* main .*operator_new_uaf.cc}}:[[@LINE-12]] +// CHECK: {{#1 .* main .*operator_new_uaf.cpp}}:[[@LINE-12]] return 0; } diff --git a/test/asan/TestCases/Windows/queue_user_work_item.cc b/test/asan/TestCases/Windows/queue_user_work_item.cpp index 2a8beb828..2a8beb828 100644 --- a/test/asan/TestCases/Windows/queue_user_work_item.cc +++ b/test/asan/TestCases/Windows/queue_user_work_item.cpp diff --git a/test/asan/TestCases/Windows/queue_user_work_item_report.cc b/test/asan/TestCases/Windows/queue_user_work_item_report.cpp index 9de3d925f..cc57b3b7e 100644 --- a/test/asan/TestCases/Windows/queue_user_work_item_report.cc +++ b/test/asan/TestCases/Windows/queue_user_work_item_report.cpp @@ -11,7 +11,7 @@ DWORD CALLBACK work_item(LPVOID) { stack_buffer[subscript] = 42; // CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T{{[0-9]+}} - // CHECK: {{#0 .* work_item.*queue_user_work_item_report.cc}}:[[@LINE-3]] + // CHECK: {{#0 .* work_item.*queue_user_work_item_report.cpp}}:[[@LINE-3]] SetEvent(done); return 0; } diff --git a/test/asan/TestCases/Windows/realloc_left_oob.cc b/test/asan/TestCases/Windows/realloc_left_oob.cpp index 376214e34..08fd6c91b 100644 --- a/test/asan/TestCases/Windows/realloc_left_oob.cc +++ b/test/asan/TestCases/Windows/realloc_left_oob.cpp @@ -8,10 +8,10 @@ int main() { buffer[-1] = 42; // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK-NEXT: {{#0 .* main .*realloc_left_oob.cc}}:[[@LINE-3]] +// CHECK-NEXT: {{#0 .* main .*realloc_left_oob.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region // CHECK: allocated by thread T0 here: // CHECK-NEXT: {{#0 .* realloc }} -// CHECK-NEXT: {{#1 .* main .*realloc_left_oob.cc}}:[[@LINE-8]] +// CHECK-NEXT: {{#1 .* main .*realloc_left_oob.cpp}}:[[@LINE-8]] free(buffer); } diff --git a/test/asan/TestCases/Windows/realloc_right_oob.cc b/test/asan/TestCases/Windows/realloc_right_oob.cpp index 57934e478..aded5a057 100644 --- a/test/asan/TestCases/Windows/realloc_right_oob.cc +++ b/test/asan/TestCases/Windows/realloc_right_oob.cpp @@ -8,10 +8,10 @@ int main() { buffer[42] = 42; // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK-NEXT: {{#0 .* main .*realloc_right_oob.cc}}:[[@LINE-3]] +// CHECK-NEXT: {{#0 .* main .*realloc_right_oob.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located 0 bytes to the right of 42-byte region // CHECK: allocated by thread T0 here: // CHECK-NEXT: {{#0 .* realloc }} -// CHECK-NEXT: {{#1 .* main .*realloc_right_oob.cc}}:[[@LINE-8]] +// CHECK-NEXT: {{#1 .* main .*realloc_right_oob.cpp}}:[[@LINE-8]] free(buffer); } diff --git a/test/asan/TestCases/Windows/realloc_uaf.cc b/test/asan/TestCases/Windows/realloc_uaf.cpp index 8e318736b..7454d5ab2 100644 --- a/test/asan/TestCases/Windows/realloc_uaf.cc +++ b/test/asan/TestCases/Windows/realloc_uaf.cpp @@ -9,12 +9,12 @@ int main() { buffer[0] = 42; // CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK-NEXT: {{#0 .* main .*realloc_uaf.cc}}:[[@LINE-3]] +// CHECK-NEXT: {{#0 .* main .*realloc_uaf.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located 0 bytes inside of 42-byte region // CHECK: freed by thread T0 here: // CHECK-NEXT: {{#0 .* free }} -// CHECK-NEXT: {{#1 .* main .*realloc_uaf.cc}}:[[@LINE-8]] +// CHECK-NEXT: {{#1 .* main .*realloc_uaf.cpp}}:[[@LINE-8]] // CHECK: previously allocated by thread T0 here: // CHECK-NEXT: {{#0 .* realloc }} -// CHECK-NEXT: {{#1 .* main .*realloc_uaf.cc}}:[[@LINE-12]] +// CHECK-NEXT: {{#1 .* main .*realloc_uaf.cpp}}:[[@LINE-12]] } diff --git a/test/asan/TestCases/Windows/recalloc_sanity.cc b/test/asan/TestCases/Windows/recalloc_sanity.cpp index 41df5d002..41df5d002 100644 --- a/test/asan/TestCases/Windows/recalloc_sanity.cc +++ b/test/asan/TestCases/Windows/recalloc_sanity.cpp diff --git a/test/asan/TestCases/Windows/report_after_syminitialize.cc b/test/asan/TestCases/Windows/report_after_syminitialize.cpp index eec502974..c406152e9 100644 --- a/test/asan/TestCases/Windows/report_after_syminitialize.cc +++ b/test/asan/TestCases/Windows/report_after_syminitialize.cpp @@ -20,6 +20,6 @@ int main() { // CHECK: Hint: address points to the zero page. // CHECK: {{WARNING: .*DbgHelp}} // CHECK: {{WARNING: Failed to use and restart external symbolizer}} - // CHECK: {{#0 0x.* in main.*report_after_syminitialize.cc:}}[[@LINE-6]] + // CHECK: {{#0 0x.* in main.*report_after_syminitialize.cpp:}}[[@LINE-6]] // CHECK: AddressSanitizer can not provide additional info. } diff --git a/test/asan/TestCases/Windows/report_globals_reload_dll.cc b/test/asan/TestCases/Windows/report_globals_reload_dll.cpp index eb6d4bc39..eb6d4bc39 100644 --- a/test/asan/TestCases/Windows/report_globals_reload_dll.cc +++ b/test/asan/TestCases/Windows/report_globals_reload_dll.cpp diff --git a/test/asan/TestCases/Windows/report_globals_vs_freelibrary.cc b/test/asan/TestCases/Windows/report_globals_vs_freelibrary.cpp index 9619aff6a..9619aff6a 100644 --- a/test/asan/TestCases/Windows/report_globals_vs_freelibrary.cc +++ b/test/asan/TestCases/Windows/report_globals_vs_freelibrary.cpp diff --git a/test/asan/TestCases/Windows/rtlallocateheap.cc b/test/asan/TestCases/Windows/rtlallocateheap.cpp index 6ef1caa0e..6ef1caa0e 100644 --- a/test/asan/TestCases/Windows/rtlallocateheap.cc +++ b/test/asan/TestCases/Windows/rtlallocateheap.cpp diff --git a/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_double_free.cc b/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_double_free.cpp index 078114506..078114506 100644 --- a/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_double_free.cc +++ b/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_double_free.cpp diff --git a/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_realloc.cc b/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_realloc.cpp index a2758cad2..a2758cad2 100644 --- a/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_realloc.cc +++ b/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_realloc.cpp diff --git a/test/asan/TestCases/Windows/rtlallocateheap_flags_fallback.cc b/test/asan/TestCases/Windows/rtlallocateheap_flags_fallback.cpp index d7e81ac3a..d7e81ac3a 100644 --- a/test/asan/TestCases/Windows/rtlallocateheap_flags_fallback.cc +++ b/test/asan/TestCases/Windows/rtlallocateheap_flags_fallback.cpp diff --git a/test/asan/TestCases/Windows/rtlallocateheap_zero.cc b/test/asan/TestCases/Windows/rtlallocateheap_zero.cpp index 92d2940a5..92d2940a5 100644 --- a/test/asan/TestCases/Windows/rtlallocateheap_zero.cc +++ b/test/asan/TestCases/Windows/rtlallocateheap_zero.cpp diff --git a/test/asan/TestCases/Windows/seh.cc b/test/asan/TestCases/Windows/seh.cpp index 4cb0c55bc..4cb0c55bc 100644 --- a/test/asan/TestCases/Windows/seh.cc +++ b/test/asan/TestCases/Windows/seh.cpp diff --git a/test/asan/TestCases/Windows/shadow_conflict_32.cc b/test/asan/TestCases/Windows/shadow_conflict_32.cpp index a2b6b4688..9e144be91 100644 --- a/test/asan/TestCases/Windows/shadow_conflict_32.cc +++ b/test/asan/TestCases/Windows/shadow_conflict_32.cpp @@ -24,6 +24,6 @@ extern "C" __declspec(dllexport) int test_function() { return 0; } // CHECK: =={{[0-9:]+}}==ASan shadow was supposed to be located in the [0x2fff0000-0x3fffffff] range. // CHECK: =={{[0-9:]+}}==Dumping process modules -// CHECK-DAG: {{0x30000000-0x300.....}} {{.*}}\shadow_conflict_32.cc.tmp_dll.dll -// CHECK-DAG: {{0x........-0x........}} {{.*}}\shadow_conflict_32.cc.tmp.exe +// CHECK-DAG: {{0x30000000-0x300.....}} {{.*}}\shadow_conflict_32.cpp.tmp_dll.dll +// CHECK-DAG: {{0x........-0x........}} {{.*}}\shadow_conflict_32.cpp.tmp.exe // CHECK-DAG: {{0x........-0x........}} {{.*}}\ntdll.dll diff --git a/test/asan/TestCases/Windows/shadow_mapping_failure.cc b/test/asan/TestCases/Windows/shadow_mapping_failure.cpp index c77468994..c77468994 100644 --- a/test/asan/TestCases/Windows/shadow_mapping_failure.cc +++ b/test/asan/TestCases/Windows/shadow_mapping_failure.cpp diff --git a/test/asan/TestCases/Windows/stack_array_left_oob.cc b/test/asan/TestCases/Windows/stack_array_left_oob.cpp index ea7119b4c..ff3618539 100644 --- a/test/asan/TestCases/Windows/stack_array_left_oob.cc +++ b/test/asan/TestCases/Windows/stack_array_left_oob.cpp @@ -9,8 +9,8 @@ int main() { buffer[subscript] = 42; // CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK-NEXT: {{#0 .* main .*stack_array_left_oob.cc}}:[[@LINE-3]] +// CHECK-NEXT: {{#0 .* main .*stack_array_left_oob.cpp}}:[[@LINE-3]] // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:.*]] in frame -// CHECK-NEXT: {{#0 .* main .*stack_array_left_oob.cc}} +// CHECK-NEXT: {{#0 .* main .*stack_array_left_oob.cpp}} // CHECK: 'buffer'{{.*}} <== Memory access at offset [[OFFSET]] underflows this variable } diff --git a/test/asan/TestCases/Windows/stack_array_right_oob.cc b/test/asan/TestCases/Windows/stack_array_right_oob.cpp index bbcb96f8f..20270ffce 100644 --- a/test/asan/TestCases/Windows/stack_array_right_oob.cc +++ b/test/asan/TestCases/Windows/stack_array_right_oob.cpp @@ -9,8 +9,8 @@ int main() { buffer[subscript] = 42; // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK-NEXT: {{#0 .* main .*stack_array_right_oob.cc}}:[[@LINE-3]] +// CHECK-NEXT: {{#0 .* main .*stack_array_right_oob.cpp}}:[[@LINE-3]] // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:.*]] in frame -// CHECK-NEXT: {{#0 .* main .*stack_array_right_oob.cc}} +// CHECK-NEXT: {{#0 .* main .*stack_array_right_oob.cpp}} // CHECK: 'buffer'{{.*}} <== Memory access at offset [[OFFSET]] overflows this variable } diff --git a/test/asan/TestCases/Windows/stack_array_sanity.cc b/test/asan/TestCases/Windows/stack_array_sanity.cpp index 156e9f86f..156e9f86f 100644 --- a/test/asan/TestCases/Windows/stack_array_sanity.cc +++ b/test/asan/TestCases/Windows/stack_array_sanity.cpp diff --git a/test/asan/TestCases/Windows/stack_use_after_return.cc b/test/asan/TestCases/Windows/stack_use_after_return.cpp index 4070bf628..9773084f8 100644 --- a/test/asan/TestCases/Windows/stack_use_after_return.cc +++ b/test/asan/TestCases/Windows/stack_use_after_return.cpp @@ -13,10 +13,10 @@ int main() { *x = 42; // CHECK: AddressSanitizer: stack-use-after-return // CHECK: WRITE of size 1 at {{.*}} thread T0 -// CHECK-NEXT: {{#0 0x.* in main .*stack_use_after_return.cc}}:[[@LINE-3]] +// CHECK-NEXT: {{#0 0x.* in main .*stack_use_after_return.cpp}}:[[@LINE-3]] // // CHECK: is located in stack of thread T0 at offset [[OFFSET:.*]] in frame -// CHECK-NEXT: {{#0 0x.* in foo.*stack_use_after_return.cc}} +// CHECK-NEXT: {{#0 0x.* in foo.*stack_use_after_return.cpp}} // // CHECK: 'stack_buffer'{{.*}} <== Memory access at offset [[OFFSET]] is inside this variable } diff --git a/test/asan/TestCases/Windows/symbols_path.cc b/test/asan/TestCases/Windows/symbols_path.cpp index f12172761..bb07570d8 100644 --- a/test/asan/TestCases/Windows/symbols_path.cc +++ b/test/asan/TestCases/Windows/symbols_path.cpp @@ -13,10 +13,10 @@ int main() { buffer[-1] = 42; // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK-NEXT: {{#0 .* main .*symbols_path.cc}}:[[@LINE-3]] +// CHECK-NEXT: {{#0 .* main .*symbols_path.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region // CHECK: allocated by thread T0 here: // CHECK-NEXT: {{#0 .* malloc}} -// CHECK-NEXT: {{#1 .* main .*symbols_path.cc}}:[[@LINE-8]] +// CHECK-NEXT: {{#1 .* main .*symbols_path.cpp}}:[[@LINE-8]] free(buffer); } diff --git a/test/asan/TestCases/Windows/thread_simple.cc b/test/asan/TestCases/Windows/thread_simple.cpp index fd9ac4c28..fd9ac4c28 100644 --- a/test/asan/TestCases/Windows/thread_simple.cc +++ b/test/asan/TestCases/Windows/thread_simple.cpp diff --git a/test/asan/TestCases/Windows/thread_stack_array_left_oob.cc b/test/asan/TestCases/Windows/thread_stack_array_left_oob.cpp index 2280c1036..2b99bc790 100644 --- a/test/asan/TestCases/Windows/thread_stack_array_left_oob.cc +++ b/test/asan/TestCases/Windows/thread_stack_array_left_oob.cpp @@ -9,7 +9,7 @@ DWORD WINAPI thread_proc(void *) { stack_buffer[subscript] = 42; // CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T1 -// CHECK: {{#0 .* thread_proc.*thread_stack_array_left_oob.cc}}:[[@LINE-3]] +// CHECK: {{#0 .* thread_proc.*thread_stack_array_left_oob.cpp}}:[[@LINE-3]] // CHECK: Address [[ADDR]] is located in stack of thread T1 at offset {{.*}} in frame // CHECK: thread_proc return 0; @@ -18,7 +18,7 @@ DWORD WINAPI thread_proc(void *) { int main() { HANDLE thr = CreateThread(NULL, 0, thread_proc, NULL, 0, NULL); // CHECK: Thread T1 created by T0 here: -// CHECK: {{#[01] .* main .*thread_stack_array_left_oob.cc}}:[[@LINE-2]] +// CHECK: {{#[01] .* main .*thread_stack_array_left_oob.cpp}}:[[@LINE-2]] // A failure to create a thread should fail the test! if (thr == 0) return 0; diff --git a/test/asan/TestCases/Windows/thread_stack_array_right_oob.cc b/test/asan/TestCases/Windows/thread_stack_array_right_oob.cpp index 939b984c5..eaae86936 100644 --- a/test/asan/TestCases/Windows/thread_stack_array_right_oob.cc +++ b/test/asan/TestCases/Windows/thread_stack_array_right_oob.cpp @@ -9,7 +9,7 @@ DWORD WINAPI thread_proc(void *) { stack_buffer[subscript] = 42; // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T1 -// CHECK: {{#0 .* thread_proc.*thread_stack_array_right_oob.cc}}:[[@LINE-3]] +// CHECK: {{#0 .* thread_proc.*thread_stack_array_right_oob.cpp}}:[[@LINE-3]] // CHECK: Address [[ADDR]] is located in stack of thread T1 at offset {{.*}} in frame // CHECK: thread_proc return 0; @@ -18,7 +18,7 @@ DWORD WINAPI thread_proc(void *) { int main(void) { HANDLE thr = CreateThread(NULL, 0, thread_proc, NULL, 0, NULL); // CHECK: Thread T1 created by T0 here: -// CHECK: {{#[01] .* main .*thread_stack_array_right_oob.cc}}:[[@LINE-2]] +// CHECK: {{#[01] .* main .*thread_stack_array_right_oob.cpp}}:[[@LINE-2]] // A failure to create a thread should fail the test! if (thr == 0) return 0; diff --git a/test/asan/TestCases/Windows/thread_stack_reuse.cc b/test/asan/TestCases/Windows/thread_stack_reuse.cpp index e7b12ca2a..e7b12ca2a 100644 --- a/test/asan/TestCases/Windows/thread_stack_reuse.cc +++ b/test/asan/TestCases/Windows/thread_stack_reuse.cpp diff --git a/test/asan/TestCases/Windows/thread_stress.cc b/test/asan/TestCases/Windows/thread_stress.cpp index e25cc6a3c..e25cc6a3c 100644 --- a/test/asan/TestCases/Windows/thread_stress.cc +++ b/test/asan/TestCases/Windows/thread_stress.cpp diff --git a/test/asan/TestCases/Windows/thread_suspended.cc b/test/asan/TestCases/Windows/thread_suspended.cpp index b30cf1484..b30cf1484 100644 --- a/test/asan/TestCases/Windows/thread_suspended.cc +++ b/test/asan/TestCases/Windows/thread_suspended.cpp diff --git a/test/asan/TestCases/Windows/tls_init.cc b/test/asan/TestCases/Windows/tls_init.cpp index a8569f802..a8569f802 100644 --- a/test/asan/TestCases/Windows/tls_init.cc +++ b/test/asan/TestCases/Windows/tls_init.cpp diff --git a/test/asan/TestCases/Windows/unsymbolized.cc b/test/asan/TestCases/Windows/unsymbolized.cpp index 5854dc56d..2c4525801 100644 --- a/test/asan/TestCases/Windows/unsymbolized.cc +++ b/test/asan/TestCases/Windows/unsymbolized.cpp @@ -20,6 +20,6 @@ int do_uaf(void) { free(x); return x[5]; // CHECK: AddressSanitizer: heap-use-after-free - // CHECK: #0 {{0x[a-f0-9]+ \(.*[\\/]unsymbolized.cc.*.exe\+(0x40|0x14000)[a-f0-9]{4}\)}} - // CHECK: #1 {{0x[a-f0-9]+ \(.*[\\/]unsymbolized.cc.*.exe\+(0x40|0x14000)[a-f0-9]{4}\)}} + // CHECK: #0 {{0x[a-f0-9]+ \(.*[\\/]unsymbolized.cpp.*.exe\+(0x40|0x14000)[a-f0-9]{4}\)}} + // CHECK: #1 {{0x[a-f0-9]+ \(.*[\\/]unsymbolized.cpp.*.exe\+(0x40|0x14000)[a-f0-9]{4}\)}} } diff --git a/test/asan/TestCases/Windows/use_after_realloc.cc b/test/asan/TestCases/Windows/use_after_realloc.cpp index c39f4cf06..ce116f9aa 100644 --- a/test/asan/TestCases/Windows/use_after_realloc.cc +++ b/test/asan/TestCases/Windows/use_after_realloc.cpp @@ -11,13 +11,13 @@ int main() { stale[0] = 42; // CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 -// CHECK-NEXT: {{#0 .* main .*use_after_realloc.cc}}:[[@LINE-3]] +// CHECK-NEXT: {{#0 .* main .*use_after_realloc.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located 0 bytes inside of 32-byte region // CHECK: freed by thread T0 here: // CHECK-NEXT: {{#0 .* realloc }} -// CHECK-NEXT: {{#1 .* main .*use_after_realloc.cc}}:[[@LINE-9]] +// CHECK-NEXT: {{#1 .* main .*use_after_realloc.cpp}}:[[@LINE-9]] // CHECK: previously allocated by thread T0 here: // CHECK-NEXT: {{#0 .* realloc }} -// CHECK-NEXT: {{#1 .* main .*use_after_realloc.cc}}:[[@LINE-14]] +// CHECK-NEXT: {{#1 .* main .*use_after_realloc.cpp}}:[[@LINE-14]] free(buffer); } diff --git a/test/asan/TestCases/Windows/use_after_return_linkage.cc b/test/asan/TestCases/Windows/use_after_return_linkage.cpp index 48c5065a0..48c5065a0 100644 --- a/test/asan/TestCases/Windows/use_after_return_linkage.cc +++ b/test/asan/TestCases/Windows/use_after_return_linkage.cpp diff --git a/test/asan/TestCases/Windows/user-exception.cc b/test/asan/TestCases/Windows/user-exception.cpp index ba14a8b23..ba14a8b23 100644 --- a/test/asan/TestCases/Windows/user-exception.cc +++ b/test/asan/TestCases/Windows/user-exception.cpp diff --git a/test/asan/TestCases/Windows/windows_h.cc b/test/asan/TestCases/Windows/windows_h.cpp index f20edec0c..f20edec0c 100644 --- a/test/asan/TestCases/Windows/windows_h.cc +++ b/test/asan/TestCases/Windows/windows_h.cpp diff --git a/test/asan/TestCases/Windows/wrong_downcast_on_heap.cc b/test/asan/TestCases/Windows/wrong_downcast_on_heap.cpp index a703d178d..b96270894 100644 --- a/test/asan/TestCases/Windows/wrong_downcast_on_heap.cc +++ b/test/asan/TestCases/Windows/wrong_downcast_on_heap.cpp @@ -17,7 +17,7 @@ int main(void) { c->extra_field = 42; // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 4 at [[ADDR]] thread T0 -// CHECK: {{#0 0x[0-9a-f]* in main .*wrong_downcast_on_heap.cc}}:[[@LINE-3]] +// CHECK: {{#0 0x[0-9a-f]* in main .*wrong_downcast_on_heap.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located 0 bytes to the right of 4-byte region // CHECK: allocated by thread T0 here: // CHECK: #0 {{.*}} operator new diff --git a/test/asan/TestCases/Windows/wrong_downcast_on_stack.cc b/test/asan/TestCases/Windows/wrong_downcast_on_stack.cpp index 5e28eb639..267775e46 100644 --- a/test/asan/TestCases/Windows/wrong_downcast_on_stack.cc +++ b/test/asan/TestCases/Windows/wrong_downcast_on_stack.cpp @@ -17,7 +17,7 @@ int main(void) { c->extra_field = 42; // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 4 at [[ADDR]] thread T0 -// CHECK-NEXT: {{#0 0x[0-9a-f]* in main .*wrong_downcast_on_stack.cc}}:[[@LINE-3]] +// CHECK-NEXT: {{#0 0x[0-9a-f]* in main .*wrong_downcast_on_stack.cpp}}:[[@LINE-3]] // CHECK: [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:[0-9]+]] in frame // CHECK-NEXT: {{#0 0x[0-9a-f]* in main }} // CHECK: 'p'{{.*}} <== Memory access at offset [[OFFSET]] overflows this variable diff --git a/test/asan/TestCases/alloca_big_alignment.cc b/test/asan/TestCases/alloca_big_alignment.cpp index 0b49424bf..0b49424bf 100644 --- a/test/asan/TestCases/alloca_big_alignment.cc +++ b/test/asan/TestCases/alloca_big_alignment.cpp diff --git a/test/asan/TestCases/alloca_constant_size.cc b/test/asan/TestCases/alloca_constant_size.cpp index 8910ea9f8..8910ea9f8 100644 --- a/test/asan/TestCases/alloca_constant_size.cc +++ b/test/asan/TestCases/alloca_constant_size.cpp diff --git a/test/asan/TestCases/alloca_detect_custom_size_.cc b/test/asan/TestCases/alloca_detect_custom_size_.cpp index 271359bf7..271359bf7 100644 --- a/test/asan/TestCases/alloca_detect_custom_size_.cc +++ b/test/asan/TestCases/alloca_detect_custom_size_.cpp diff --git a/test/asan/TestCases/alloca_instruments_all_paddings.cc b/test/asan/TestCases/alloca_instruments_all_paddings.cpp index 5bf6f80ac..5bf6f80ac 100644 --- a/test/asan/TestCases/alloca_instruments_all_paddings.cc +++ b/test/asan/TestCases/alloca_instruments_all_paddings.cpp diff --git a/test/asan/TestCases/alloca_loop_unpoisoning.cc b/test/asan/TestCases/alloca_loop_unpoisoning.cpp index f9d32aafd..f9d32aafd 100644 --- a/test/asan/TestCases/alloca_loop_unpoisoning.cc +++ b/test/asan/TestCases/alloca_loop_unpoisoning.cpp diff --git a/test/asan/TestCases/alloca_overflow_partial.cc b/test/asan/TestCases/alloca_overflow_partial.cpp index afac40ce6..afac40ce6 100644 --- a/test/asan/TestCases/alloca_overflow_partial.cc +++ b/test/asan/TestCases/alloca_overflow_partial.cpp diff --git a/test/asan/TestCases/alloca_overflow_right.cc b/test/asan/TestCases/alloca_overflow_right.cpp index 615dd1485..615dd1485 100644 --- a/test/asan/TestCases/alloca_overflow_right.cc +++ b/test/asan/TestCases/alloca_overflow_right.cpp diff --git a/test/asan/TestCases/alloca_safe_access.cc b/test/asan/TestCases/alloca_safe_access.cpp index 1cd0dada7..1cd0dada7 100644 --- a/test/asan/TestCases/alloca_safe_access.cc +++ b/test/asan/TestCases/alloca_safe_access.cpp diff --git a/test/asan/TestCases/alloca_underflow_left.cc b/test/asan/TestCases/alloca_underflow_left.cpp index 8720e8cce..8720e8cce 100644 --- a/test/asan/TestCases/alloca_underflow_left.cc +++ b/test/asan/TestCases/alloca_underflow_left.cpp diff --git a/test/asan/TestCases/alloca_vla_interact.cc b/test/asan/TestCases/alloca_vla_interact.cpp index 92b0afafc..92b0afafc 100644 --- a/test/asan/TestCases/alloca_vla_interact.cc +++ b/test/asan/TestCases/alloca_vla_interact.cpp diff --git a/test/asan/TestCases/asan_and_llvm_coverage_test.cc b/test/asan/TestCases/asan_and_llvm_coverage_test.cpp index 2ba5a42d1..2ba5a42d1 100644 --- a/test/asan/TestCases/asan_and_llvm_coverage_test.cc +++ b/test/asan/TestCases/asan_and_llvm_coverage_test.cpp diff --git a/test/asan/TestCases/asan_options-help.cc b/test/asan/TestCases/asan_options-help.cpp index 96a9cd98f..96a9cd98f 100644 --- a/test/asan/TestCases/asan_options-help.cc +++ b/test/asan/TestCases/asan_options-help.cpp diff --git a/test/asan/TestCases/atexit_stats.cc b/test/asan/TestCases/atexit_stats.cpp index c8d97da52..c8d97da52 100644 --- a/test/asan/TestCases/atexit_stats.cc +++ b/test/asan/TestCases/atexit_stats.cpp diff --git a/test/asan/TestCases/blacklist.cc b/test/asan/TestCases/blacklist.cpp index 7c31484c2..9508f6f4d 100644 --- a/test/asan/TestCases/blacklist.cc +++ b/test/asan/TestCases/blacklist.cpp @@ -2,15 +2,15 @@ // RUN: echo "fun:*brokenFunction*" > %tmp // RUN: echo "global:*badGlobal*" >> %tmp -// RUN: echo "src:*blacklist-extra.cc" >> %tmp +// RUN: echo "src:*blacklist-extra.cpp" >> %tmp // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O0 %s -o %t \ -// RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1 +// RUN: %p/Helpers/blacklist-extra.cpp && %run %t 2>&1 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O1 %s -o %t \ -// RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1 +// RUN: %p/Helpers/blacklist-extra.cpp && %run %t 2>&1 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O2 %s -o %t \ -// RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1 +// RUN: %p/Helpers/blacklist-extra.cpp && %run %t 2>&1 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O3 %s -o %t \ -// RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1 +// RUN: %p/Helpers/blacklist-extra.cpp && %run %t 2>&1 // badGlobal is accessed improperly, but we blacklisted it. Align // it to make sure memory past the end of badGlobal will be in @@ -26,7 +26,7 @@ int brokenFunction(int argc) { return x[argc * 10]; // BOOM } -// This function is defined in Helpers/blacklist-extra.cc, a source file which +// This function is defined in Helpers/blacklist-extra.cpp, a source file which // is blacklisted by name int externalBrokenFunction(int x); diff --git a/test/asan/TestCases/calloc-overflow.cc b/test/asan/TestCases/calloc-overflow.cpp index 74582378f..9a0d41ff8 100644 --- a/test/asan/TestCases/calloc-overflow.cc +++ b/test/asan/TestCases/calloc-overflow.cpp @@ -11,7 +11,7 @@ int main() { void *p = calloc(-1, 1000); // CHECK: {{ERROR: AddressSanitizer: calloc parameters overflow: count \* size \(.* \* 1000\) cannot be represented in type size_t}} // CHECK: {{#0 0x.* in .*calloc}} - // CHECK: {{#1 0x.* in main .*calloc-overflow.cc:}}[[@LINE-3]] + // CHECK: {{#1 0x.* in main .*calloc-overflow.cpp:}}[[@LINE-3]] // CHECK: SUMMARY: AddressSanitizer: calloc-overflow printf("calloc returned: %zu\n", (size_t)p); diff --git a/test/asan/TestCases/contiguous_container.cc b/test/asan/TestCases/contiguous_container.cpp index 3f754562a..3f754562a 100644 --- a/test/asan/TestCases/contiguous_container.cc +++ b/test/asan/TestCases/contiguous_container.cpp diff --git a/test/asan/TestCases/contiguous_container_crash.cc b/test/asan/TestCases/contiguous_container_crash.cpp index 2b555f901..2b555f901 100644 --- a/test/asan/TestCases/contiguous_container_crash.cc +++ b/test/asan/TestCases/contiguous_container_crash.cpp diff --git a/test/asan/TestCases/coverage-and-lsan.cc b/test/asan/TestCases/coverage-and-lsan.cpp index 60851dabb..60851dabb 100644 --- a/test/asan/TestCases/coverage-and-lsan.cc +++ b/test/asan/TestCases/coverage-and-lsan.cpp diff --git a/test/asan/TestCases/coverage-disabled.cc b/test/asan/TestCases/coverage-disabled.cpp index 46a822dff..46a822dff 100644 --- a/test/asan/TestCases/coverage-disabled.cc +++ b/test/asan/TestCases/coverage-disabled.cpp diff --git a/test/asan/TestCases/coverage-trace-pc.cc b/test/asan/TestCases/coverage-trace-pc.cpp index c03a6f02f..c03a6f02f 100644 --- a/test/asan/TestCases/coverage-trace-pc.cc +++ b/test/asan/TestCases/coverage-trace-pc.cpp diff --git a/test/asan/TestCases/debug_double_free.cc b/test/asan/TestCases/debug_double_free.cpp index 44c820b63..44c820b63 100644 --- a/test/asan/TestCases/debug_double_free.cc +++ b/test/asan/TestCases/debug_double_free.cpp diff --git a/test/asan/TestCases/debug_locate.cc b/test/asan/TestCases/debug_locate.cpp index 5971a7727..5971a7727 100644 --- a/test/asan/TestCases/debug_locate.cc +++ b/test/asan/TestCases/debug_locate.cpp diff --git a/test/asan/TestCases/debug_mapping.cc b/test/asan/TestCases/debug_mapping.cpp index 40083f028..40083f028 100644 --- a/test/asan/TestCases/debug_mapping.cc +++ b/test/asan/TestCases/debug_mapping.cpp diff --git a/test/asan/TestCases/debug_ppc64_mapping.cc b/test/asan/TestCases/debug_ppc64_mapping.cpp index a67804023..a67804023 100644 --- a/test/asan/TestCases/debug_ppc64_mapping.cc +++ b/test/asan/TestCases/debug_ppc64_mapping.cpp diff --git a/test/asan/TestCases/debug_report.cc b/test/asan/TestCases/debug_report.cpp index 14bb70e9f..14bb70e9f 100644 --- a/test/asan/TestCases/debug_report.cc +++ b/test/asan/TestCases/debug_report.cpp diff --git a/test/asan/TestCases/debug_stacks.cc b/test/asan/TestCases/debug_stacks.cpp index 7c320bfcb..7c320bfcb 100644 --- a/test/asan/TestCases/debug_stacks.cc +++ b/test/asan/TestCases/debug_stacks.cpp diff --git a/test/asan/TestCases/deep_stack_uaf.cc b/test/asan/TestCases/deep_stack_uaf.cpp index bdf0dbdb4..bdf0dbdb4 100644 --- a/test/asan/TestCases/deep_stack_uaf.cc +++ b/test/asan/TestCases/deep_stack_uaf.cpp diff --git a/test/asan/TestCases/deep_tail_call.cc b/test/asan/TestCases/deep_tail_call.cpp index 628ef06db..628ef06db 100644 --- a/test/asan/TestCases/deep_tail_call.cc +++ b/test/asan/TestCases/deep_tail_call.cpp diff --git a/test/asan/TestCases/default_blacklist.cc b/test/asan/TestCases/default_blacklist.cpp index 84c0438f3..84c0438f3 100644 --- a/test/asan/TestCases/default_blacklist.cc +++ b/test/asan/TestCases/default_blacklist.cpp diff --git a/test/asan/TestCases/default_options.cc b/test/asan/TestCases/default_options.cpp index 27af76d7f..27af76d7f 100644 --- a/test/asan/TestCases/default_options.cc +++ b/test/asan/TestCases/default_options.cpp diff --git a/test/asan/TestCases/describe_address.cc b/test/asan/TestCases/describe_address.cpp index 868c0eb1c..868c0eb1c 100644 --- a/test/asan/TestCases/describe_address.cc +++ b/test/asan/TestCases/describe_address.cpp diff --git a/test/asan/TestCases/double-free.cc b/test/asan/TestCases/double-free.cpp index 2a26b23fb..b01e41005 100644 --- a/test/asan/TestCases/double-free.cc +++ b/test/asan/TestCases/double-free.cpp @@ -19,12 +19,12 @@ int main(int argc, char **argv) { free(x + argc - 1); // BOOM // CHECK: AddressSanitizer: attempting double-free{{.*}}in thread T0 // CHECK: #0 0x{{.*}} in {{.*}}free - // CHECK: #1 0x{{.*}} in main {{.*}}double-free.cc:[[@LINE-3]] + // CHECK: #1 0x{{.*}} in main {{.*}}double-free.cpp:[[@LINE-3]] // CHECK: freed by thread T0 here: // MALLOC-CTX: #0 0x{{.*}} in {{.*}}free - // MALLOC-CTX: #1 0x{{.*}} in main {{.*}}double-free.cc:[[@LINE-7]] + // MALLOC-CTX: #1 0x{{.*}} in main {{.*}}double-free.cpp:[[@LINE-7]] // CHECK: allocated by thread T0 here: - // MALLOC-CTX: double-free.cc:[[@LINE-12]] + // MALLOC-CTX: double-free.cpp:[[@LINE-12]] // CHECK-RECOVER: AddressSanitizer: attempting double-free{{.*}}in thread T0 // CHECK-RECOVER-NOT: AddressSanitizer CHECK failed: return res; diff --git a/test/asan/TestCases/error_report_callback.cc b/test/asan/TestCases/error_report_callback.cpp index 8c5bbe418..8c5bbe418 100644 --- a/test/asan/TestCases/error_report_callback.cc +++ b/test/asan/TestCases/error_report_callback.cpp diff --git a/test/asan/TestCases/exitcode.cc b/test/asan/TestCases/exitcode.cpp index cb1054099..cb1054099 100644 --- a/test/asan/TestCases/exitcode.cc +++ b/test/asan/TestCases/exitcode.cpp diff --git a/test/asan/TestCases/force_inline_opt0.cc b/test/asan/TestCases/force_inline_opt0.cpp index e6e5d26c7..e6e5d26c7 100644 --- a/test/asan/TestCases/force_inline_opt0.cc +++ b/test/asan/TestCases/force_inline_opt0.cpp diff --git a/test/asan/TestCases/frexp_interceptor.cc b/test/asan/TestCases/frexp_interceptor.cpp index d75ba992b..d75ba992b 100644 --- a/test/asan/TestCases/frexp_interceptor.cc +++ b/test/asan/TestCases/frexp_interceptor.cpp diff --git a/test/asan/TestCases/global-demangle.cc b/test/asan/TestCases/global-demangle.cpp index 5f7ff91b1..5f7ff91b1 100644 --- a/test/asan/TestCases/global-demangle.cc +++ b/test/asan/TestCases/global-demangle.cpp diff --git a/test/asan/TestCases/global-location.cc b/test/asan/TestCases/global-location.cpp index 795e50bf6..42711f97c 100644 --- a/test/asan/TestCases/global-location.cc +++ b/test/asan/TestCases/global-location.cpp @@ -13,9 +13,9 @@ struct C { }; int global[10]; -// GLOB: 0x{{.*}} is located 4 bytes to the right of global variable 'global' defined in '{{.*}}global-location.cc:[[@LINE-1]]:5' {{.*}} of size 40 +// GLOB: 0x{{.*}} is located 4 bytes to the right of global variable 'global' defined in '{{.*}}global-location.cpp:[[@LINE-1]]:5' {{.*}} of size 40 int C::array[10]; -// CLASS_STATIC: 0x{{.*}} is located 4 bytes to the right of global variable 'C::array' defined in '{{.*}}global-location.cc:[[@LINE-1]]:8' {{.*}} of size 40 +// CLASS_STATIC: 0x{{.*}} is located 4 bytes to the right of global variable 'C::array' defined in '{{.*}}global-location.cpp:[[@LINE-1]]:8' {{.*}} of size 40 int main(int argc, char **argv) { int one = argc - 1; @@ -24,12 +24,12 @@ int main(int argc, char **argv) { case 'c': return C::array[one * 11]; case 'f': static int array[10]; - // FUNC_STATIC: 0x{{.*}} is located 4 bytes to the right of global variable 'array' defined in '{{.*}}global-location.cc:[[@LINE-1]]:16' {{.*}} of size 40 + // FUNC_STATIC: 0x{{.*}} is located 4 bytes to the right of global variable 'array' defined in '{{.*}}global-location.cpp:[[@LINE-1]]:16' {{.*}} of size 40 memset(array, 0, 10); return array[one * 11]; case 'l': const char *str = "0123456789"; - // LITERAL: 0x{{.*}} is located 0 bytes to the right of global variable {{.*}} defined in '{{.*}}global-location.cc:[[@LINE-1]]:23' {{.*}} of size 11 + // LITERAL: 0x{{.*}} is located 0 bytes to the right of global variable {{.*}} defined in '{{.*}}global-location.cpp:[[@LINE-1]]:23' {{.*}} of size 11 return str[one * 11]; } return 0; diff --git a/test/asan/TestCases/global-overflow.cc b/test/asan/TestCases/global-overflow.cpp index a39a95306..d0aab2ade 100644 --- a/test/asan/TestCases/global-overflow.cc +++ b/test/asan/TestCases/global-overflow.cpp @@ -13,7 +13,7 @@ int main(int argc, char **argv) { memset(ZZZ, 0, 10); int res = YYY[argc * 10]; // BOOOM // CHECK: {{READ of size 1 at 0x.* thread T0}} - // CHECK: {{ #0 0x.* in main .*global-overflow.cc:}}[[@LINE-2]] + // CHECK: {{ #0 0x.* in main .*global-overflow.cpp:}}[[@LINE-2]] // CHECK: {{0x.* is located 0 bytes to the right of global variable}} // CHECK: {{.*YYY.* of size 10}} res += XXX[argc] + ZZZ[argc]; diff --git a/test/asan/TestCases/global-underflow.cc b/test/asan/TestCases/global-underflow.cc deleted file mode 100644 index 4a0351356..000000000 --- a/test/asan/TestCases/global-underflow.cc +++ /dev/null @@ -1,17 +0,0 @@ -// RUN: %clangxx_asan -O0 %s %p/Helpers/underflow.cc -o %t && not %run %t 2>&1 | FileCheck %s -// RUN: %clangxx_asan -O1 %s %p/Helpers/underflow.cc -o %t && not %run %t 2>&1 | FileCheck %s -// RUN: %clangxx_asan -O2 %s %p/Helpers/underflow.cc -o %t && not %run %t 2>&1 | FileCheck %s -// RUN: %clangxx_asan -O3 %s %p/Helpers/underflow.cc -o %t && not %run %t 2>&1 | FileCheck %s - -int XXX[2] = {2, 3}; -extern int YYY[]; -#include <string.h> -int main(int argc, char **argv) { - memset(XXX, 0, 2*sizeof(int)); - // CHECK: {{READ of size 4 at 0x.* thread T0}} - // CHECK: {{ #0 0x.* in main .*global-underflow.cc:}}[[@LINE+3]] - // CHECK: {{0x.* is located 4 bytes to the left of global variable}} - // CHECK: {{.*YYY.* of size 12}} - int res = YYY[-1]; - return res; -} diff --git a/test/asan/TestCases/global-underflow.cpp b/test/asan/TestCases/global-underflow.cpp new file mode 100644 index 000000000..81aac5897 --- /dev/null +++ b/test/asan/TestCases/global-underflow.cpp @@ -0,0 +1,17 @@ +// RUN: %clangxx_asan -O0 %s %p/Helpers/underflow.cpp -o %t && not %run %t 2>&1 | FileCheck %s +// RUN: %clangxx_asan -O1 %s %p/Helpers/underflow.cpp -o %t && not %run %t 2>&1 | FileCheck %s +// RUN: %clangxx_asan -O2 %s %p/Helpers/underflow.cpp -o %t && not %run %t 2>&1 | FileCheck %s +// RUN: %clangxx_asan -O3 %s %p/Helpers/underflow.cpp -o %t && not %run %t 2>&1 | FileCheck %s + +int XXX[2] = {2, 3}; +extern int YYY[]; +#include <string.h> +int main(int argc, char **argv) { + memset(XXX, 0, 2*sizeof(int)); + // CHECK: {{READ of size 4 at 0x.* thread T0}} + // CHECK: {{ #0 0x.* in main .*global-underflow.cpp:}}[[@LINE+3]] + // CHECK: {{0x.* is located 4 bytes to the left of global variable}} + // CHECK: {{.*YYY.* of size 12}} + int res = YYY[-1]; + return res; +} diff --git a/test/asan/TestCases/handle_noreturn_bug.cc b/test/asan/TestCases/handle_noreturn_bug.cpp index 8c3c66a42..8c3c66a42 100644 --- a/test/asan/TestCases/handle_noreturn_bug.cc +++ b/test/asan/TestCases/handle_noreturn_bug.cpp diff --git a/test/asan/TestCases/heap-overflow-large.cc b/test/asan/TestCases/heap-overflow-large.cpp index 566b1158a..566b1158a 100644 --- a/test/asan/TestCases/heap-overflow-large.cc +++ b/test/asan/TestCases/heap-overflow-large.cpp diff --git a/test/asan/TestCases/heap-overflow.cc b/test/asan/TestCases/heap-overflow.cpp index 3ddb243b3..a9b62d874 100644 --- a/test/asan/TestCases/heap-overflow.cc +++ b/test/asan/TestCases/heap-overflow.cpp @@ -14,7 +14,7 @@ int main(int argc, char **argv) { memset(x, 0, 10); int res = x[argc * 10]; // BOOOM // CHECK: {{READ of size 1 at 0x.* thread T0}} - // CHECK: {{ #0 0x.* in main .*heap-overflow.cc:}}[[@LINE-2]] + // CHECK: {{ #0 0x.* in main .*heap-overflow.cpp:}}[[@LINE-2]] // CHECK: {{0x.* is located 0 bytes to the right of 10-byte region}} // CHECK: {{allocated by thread T0 here:}} diff --git a/test/asan/TestCases/heavy_uar_test.cc b/test/asan/TestCases/heavy_uar_test.cpp index 29a1d1965..a203174e0 100644 --- a/test/asan/TestCases/heavy_uar_test.cc +++ b/test/asan/TestCases/heavy_uar_test.cpp @@ -64,7 +64,7 @@ int main(int argc, char **argv) { stale_stack[100]++; // CHECK: ERROR: AddressSanitizer: stack-use-after-return on address // CHECK: is located in stack of thread T0 at offset {{116|132}} in frame - // CHECK: in LeakStack{{.*}}heavy_uar_test.cc: + // CHECK: in LeakStack{{.*}}heavy_uar_test.cpp: // CHECK: [{{16|32}}, {{1040|1056}}) 'x' return 0; } diff --git a/test/asan/TestCases/huge_negative_hea_oob.cc b/test/asan/TestCases/huge_negative_hea_oob.cpp index 96e7e613d..96e7e613d 100644 --- a/test/asan/TestCases/huge_negative_hea_oob.cc +++ b/test/asan/TestCases/huge_negative_hea_oob.cpp diff --git a/test/asan/TestCases/ill.cc b/test/asan/TestCases/ill.cpp index d7b535091..d7b535091 100644 --- a/test/asan/TestCases/ill.cc +++ b/test/asan/TestCases/ill.cpp diff --git a/test/asan/TestCases/init-order-atexit.cc b/test/asan/TestCases/init-order-atexit.cpp index 021b2bd39..57bddd463 100644 --- a/test/asan/TestCases/init-order-atexit.cc +++ b/test/asan/TestCases/init-order-atexit.cpp @@ -4,7 +4,7 @@ // (3) destructor of A reads uninitialized global C from another module. // We do *not* want to report init-order bug in this case. -// RUN: %clangxx_asan -O0 %s %p/Helpers/init-order-atexit-extra.cc -o %t +// RUN: %clangxx_asan -O0 %s %p/Helpers/init-order-atexit-extra.cpp -o %t // RUN: %env_asan_opts=strict_init_order=true not %run %t 2>&1 | FileCheck %s #include <stdio.h> diff --git a/test/asan/TestCases/initialization-blacklist.cc b/test/asan/TestCases/initialization-blacklist.cpp index 3a98fc63e..f0b86e57a 100644 --- a/test/asan/TestCases/initialization-blacklist.cc +++ b/test/asan/TestCases/initialization-blacklist.cpp @@ -1,15 +1,15 @@ // Test for blacklist functionality of initialization-order checker. -// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-blacklist-extra.cc\ -// RUN: %p/Helpers/initialization-blacklist-extra2.cc \ +// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-blacklist-extra.cpp\ +// RUN: %p/Helpers/initialization-blacklist-extra2.cpp \ // RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1 -// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-blacklist-extra.cc\ -// RUN: %p/Helpers/initialization-blacklist-extra2.cc \ +// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-blacklist-extra.cpp\ +// RUN: %p/Helpers/initialization-blacklist-extra2.cpp \ // RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1 -// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-blacklist-extra.cc\ -// RUN: %p/Helpers/initialization-blacklist-extra2.cc \ +// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-blacklist-extra.cpp\ +// RUN: %p/Helpers/initialization-blacklist-extra2.cpp \ // RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1 diff --git a/test/asan/TestCases/initialization-bug.cc b/test/asan/TestCases/initialization-bug.cpp index 20fdbfe5f..bcf0715c3 100644 --- a/test/asan/TestCases/initialization-bug.cc +++ b/test/asan/TestCases/initialization-bug.cpp @@ -1,6 +1,6 @@ // Test to make sure basic initialization order errors are caught. -// RUN: %clangxx_asan %macos_min_target_10_11 -O0 %s %p/Helpers/initialization-bug-extra2.cc -o %t-INIT-ORDER-EXE +// RUN: %clangxx_asan %macos_min_target_10_11 -O0 %s %p/Helpers/initialization-bug-extra2.cpp -o %t-INIT-ORDER-EXE // RUN: %env_asan_opts=check_initialization_order=true not %run %t-INIT-ORDER-EXE 2>&1 | FileCheck %s // Do not test with optimization -- the error may be optimized away. diff --git a/test/asan/TestCases/initialization-constexpr.cc b/test/asan/TestCases/initialization-constexpr.cpp index 53619ea81..d92006529 100644 --- a/test/asan/TestCases/initialization-constexpr.cc +++ b/test/asan/TestCases/initialization-constexpr.cpp @@ -4,13 +4,13 @@ // constructor implies that it was initialized during constant initialization, // not dynamic initialization). -// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-constexpr-extra.cc --std=c++11 -o %t +// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-constexpr-extra.cpp --std=c++11 -o %t // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1 -// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-constexpr-extra.cc --std=c++11 -o %t +// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-constexpr-extra.cpp --std=c++11 -o %t // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1 -// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-constexpr-extra.cc --std=c++11 -o %t +// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-constexpr-extra.cpp --std=c++11 -o %t // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1 -// RUN: %clangxx_asan -O3 %s %p/Helpers/initialization-constexpr-extra.cc --std=c++11 -o %t +// RUN: %clangxx_asan -O3 %s %p/Helpers/initialization-constexpr-extra.cpp --std=c++11 -o %t // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1 class Integer { diff --git a/test/asan/TestCases/initialization-nobug.cc b/test/asan/TestCases/initialization-nobug.cpp index 783c7894d..d4dc85514 100644 --- a/test/asan/TestCases/initialization-nobug.cc +++ b/test/asan/TestCases/initialization-nobug.cpp @@ -1,13 +1,13 @@ // A collection of various initializers which shouldn't trip up initialization // order checking. If successful, this will just return 0. -// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-nobug-extra.cc -o %t +// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-nobug-extra.cpp -o %t // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1 -// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-nobug-extra.cc -o %t +// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-nobug-extra.cpp -o %t // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1 -// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-nobug-extra.cc -o %t +// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-nobug-extra.cpp -o %t // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1 -// RUN: %clangxx_asan -O3 %s %p/Helpers/initialization-nobug-extra.cc -o %t +// RUN: %clangxx_asan -O3 %s %p/Helpers/initialization-nobug-extra.cpp -o %t // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1 // Simple access: diff --git a/test/asan/TestCases/inline.cc b/test/asan/TestCases/inline.cpp index daeb7b49e..daeb7b49e 100644 --- a/test/asan/TestCases/inline.cc +++ b/test/asan/TestCases/inline.cpp diff --git a/test/asan/TestCases/intercept-rethrow-exception.cc b/test/asan/TestCases/intercept-rethrow-exception.cpp index c3944d6d5..c3944d6d5 100644 --- a/test/asan/TestCases/intercept-rethrow-exception.cc +++ b/test/asan/TestCases/intercept-rethrow-exception.cpp diff --git a/test/asan/TestCases/interception_failure_test.cc b/test/asan/TestCases/interception_failure_test.cpp index 4f6698e3a..4f6698e3a 100644 --- a/test/asan/TestCases/interception_failure_test.cc +++ b/test/asan/TestCases/interception_failure_test.cpp diff --git a/test/asan/TestCases/interface_test.cc b/test/asan/TestCases/interface_test.cpp index 9419f07e9..9419f07e9 100644 --- a/test/asan/TestCases/interface_test.cc +++ b/test/asan/TestCases/interface_test.cpp diff --git a/test/asan/TestCases/intra-object-overflow.cc b/test/asan/TestCases/intra-object-overflow.cpp index b71e951bb..17bf35dfe 100644 --- a/test/asan/TestCases/intra-object-overflow.cc +++ b/test/asan/TestCases/intra-object-overflow.cpp @@ -16,7 +16,7 @@ class Foo { } void set(int i, int val) { a[i] = val; } // CHECK: ERROR: AddressSanitizer: intra-object-overflow -// CHECK: #0 {{.*}}Foo::set{{.*}}intra-object-overflow.cc:[[@LINE-2]] +// CHECK: #0 {{.*}}Foo::set{{.*}}intra-object-overflow.cpp:[[@LINE-2]] private: int pre1, pre2; int a[11]; @@ -27,7 +27,7 @@ int main(int argc, char **argv) { int idx = argc == 2 ? atoi(argv[1]) : 0; Foo *foo = new Foo; foo->set(idx, 42); -// CHECK: #1 {{.*}}main{{.*}}intra-object-overflow.cc:[[@LINE-1]] +// CHECK: #1 {{.*}}main{{.*}}intra-object-overflow.cpp:[[@LINE-1]] // CHECK: is located 84 bytes inside of 128-byte region delete foo; } diff --git a/test/asan/TestCases/invalid-free.cc b/test/asan/TestCases/invalid-free.cpp index be45e438b..f550dc14a 100644 --- a/test/asan/TestCases/invalid-free.cc +++ b/test/asan/TestCases/invalid-free.cpp @@ -14,9 +14,9 @@ int main(int argc, char **argv) { int res = x[argc]; free(x + 5); // BOOM // CHECK: AddressSanitizer: attempting free on address{{.*}}in thread T0 - // CHECK: invalid-free.cc:[[@LINE-2]] + // CHECK: invalid-free.cpp:[[@LINE-2]] // CHECK: is located 5 bytes inside of 10-byte region // CHECK: allocated by thread T0 here: - // MALLOC-CTX: invalid-free.cc:[[@LINE-8]] + // MALLOC-CTX: invalid-free.cpp:[[@LINE-8]] return res; } diff --git a/test/asan/TestCases/invalid-pointer-pairs-compare-errors.cc b/test/asan/TestCases/invalid-pointer-pairs-compare-errors.cpp index 0690d40d2..7b1479e2d 100644 --- a/test/asan/TestCases/invalid-pointer-pairs-compare-errors.cc +++ b/test/asan/TestCases/invalid-pointer-pairs-compare-errors.cpp @@ -23,82 +23,82 @@ int main() { char *heap2 = (char *)malloc(42); // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]] foo(heap1, heap2); free(heap1); free(heap2); heap1 = (char *)malloc(1024); // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]] foo(heap1, heap1 + 1025); // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]] foo(heap1 + 1024, heap1 + 1025); free(heap1); heap1 = (char *)malloc(4096); // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]] foo(heap1, heap1 + 4097); // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]] foo(heap1, 0); // Global variables. // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]] foo(&global1[0], &global2[10]); char *p = &small_global[0]; foo(p, p); // OK foo(p, p + 7); // OK // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]] foo(p, p + 8); // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]] foo(p - 1, p); // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]] foo(p, p - 1); // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]] foo(p - 1, p + 8); p = &large_global[0]; // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]] foo(p - 1, p); // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]] foo(p, p - 1); // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]] foo(p, &global1[0]); // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]] foo(p, &small_global[0]); // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]] foo(p, 0); // Stack variables. char stack1, stack2; // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]] foo(&stack1, &stack2); // Mixtures. // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]] foo(heap1, &stack1); // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair foo(heap1, &global1[0]); // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair foo(&stack1, &global1[0]); // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]] foo(&stack1, 0); free(heap1); diff --git a/test/asan/TestCases/invalid-pointer-pairs-compare-null.cc b/test/asan/TestCases/invalid-pointer-pairs-compare-null.cpp index 9f7f7b6f4..9f7f7b6f4 100644 --- a/test/asan/TestCases/invalid-pointer-pairs-compare-null.cc +++ b/test/asan/TestCases/invalid-pointer-pairs-compare-null.cpp diff --git a/test/asan/TestCases/invalid-pointer-pairs-compare-success.cc b/test/asan/TestCases/invalid-pointer-pairs-compare-success.cpp index d0d92265f..d0d92265f 100644 --- a/test/asan/TestCases/invalid-pointer-pairs-compare-success.cc +++ b/test/asan/TestCases/invalid-pointer-pairs-compare-success.cpp diff --git a/test/asan/TestCases/invalid-pointer-pairs-subtract-errors.cc b/test/asan/TestCases/invalid-pointer-pairs-subtract-errors.cpp index 20aaebeb4..535833d05 100644 --- a/test/asan/TestCases/invalid-pointer-pairs-subtract-errors.cc +++ b/test/asan/TestCases/invalid-pointer-pairs-subtract-errors.cpp @@ -17,29 +17,29 @@ int main() { char *heap2 = (char *)malloc(42); // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cpp:[[@LINE+1]] foo(heap1, heap2); // Global variables. // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cpp:[[@LINE+1]] foo(&global1[0], &global2[10]); // Stack variables. char stack1, stack2; // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cpp:[[@LINE+1]] foo(&stack1, &stack2); // Mixtures. // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cpp:[[@LINE+1]] foo(heap1, &stack1); // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cpp:[[@LINE+1]] foo(heap1, &global1[0]); // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair - // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cc:[[@LINE+1]] + // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cpp:[[@LINE+1]] foo(&stack1, &global1[0]); free(heap1); diff --git a/test/asan/TestCases/invalid-pointer-pairs-subtract-success.cc b/test/asan/TestCases/invalid-pointer-pairs-subtract-success.cpp index 7ea120ed5..7ea120ed5 100644 --- a/test/asan/TestCases/invalid-pointer-pairs-subtract-success.cc +++ b/test/asan/TestCases/invalid-pointer-pairs-subtract-success.cpp diff --git a/test/asan/TestCases/invalid-pointer-pairs.cc b/test/asan/TestCases/invalid-pointer-pairs.cpp index e1df151d1..8e57bdc0c 100644 --- a/test/asan/TestCases/invalid-pointer-pairs.cc +++ b/test/asan/TestCases/invalid-pointer-pairs.cpp @@ -13,10 +13,10 @@ int f(char c, char *p, char *q) { // [[PTR1:0x[0-9a-f]+]] [[PTR2:0x[0-9a-f]+]] switch (c) { case 'g': - // CMP: #{{[0-9]+ .*}} in f({{char, char\*, char\*|char,char \*,char \*}}) {{.*}}invalid-pointer-pairs.cc:[[@LINE+1]] + // CMP: #{{[0-9]+ .*}} in f({{char, char\*, char\*|char,char \*,char \*}}) {{.*}}invalid-pointer-pairs.cpp:[[@LINE+1]] return p > q; case 's': - // SUB: #{{[0-9]+ .*}} in f({{char, char\*, char\*|char,char \*,char \*}}) {{.*}}invalid-pointer-pairs.cc:[[@LINE+1]] + // SUB: #{{[0-9]+ .*}} in f({{char, char\*, char\*|char,char \*,char \*}}) {{.*}}invalid-pointer-pairs.cpp:[[@LINE+1]] return p - q; case 'k': { // OK-NOT: ERROR @@ -26,7 +26,7 @@ int f(char c, char *p, char *q) { case 'f': { char *p3 = p + 20; free(p); - // FREE: #{{[0-9]+ .*}} in f({{char, char\*, char\*|char,char \*,char \*}}) {{.*}}invalid-pointer-pairs.cc:[[@LINE+2]] + // FREE: #{{[0-9]+ .*}} in f({{char, char\*, char\*|char,char \*,char \*}}) {{.*}}invalid-pointer-pairs.cpp:[[@LINE+2]] // FREE: freed by thread return p < p3; } diff --git a/test/asan/TestCases/large_func_test.cc b/test/asan/TestCases/large_func_test.cpp index 1f5f7ccd5..776e19393 100644 --- a/test/asan/TestCases/large_func_test.cc +++ b/test/asan/TestCases/large_func_test.cpp @@ -24,8 +24,8 @@ static void LargeFunction(int *x, int zero) { x[zero + 103]++; // we should report this exact line // atos incorrectly extracts the symbol name for the static functions on // Darwin. - // CHECK-Linux: {{#0 0x.* in LargeFunction.*large_func_test.cc:}}[[@LINE-3]] - // CHECK-Darwin: {{#0 0x.* in .*LargeFunction.*large_func_test.cc}}:[[@LINE-4]] + // CHECK-Linux: {{#0 0x.* in LargeFunction.*large_func_test.cpp:}}[[@LINE-3]] + // CHECK-Darwin: {{#0 0x.* in .*LargeFunction.*large_func_test.cpp}}:[[@LINE-4]] x[10]++; x[11]++; @@ -42,11 +42,11 @@ static void LargeFunction(int *x, int zero) { int main(int argc, char **argv) { int *x = new int[100]; LargeFunction(x, argc - 1); - // CHECK: {{ #1 0x.* in main .*large_func_test.cc:}}[[@LINE-1]] + // CHECK: {{ #1 0x.* in main .*large_func_test.cpp:}}[[@LINE-1]] // CHECK: {{0x.* is located 12 bytes to the right of 400-byte region}} // CHECK: {{allocated by thread T0 here:}} // CHECK-Linux: {{ #0 0x.* in operator new.*}} // CHECK-Darwin: {{ #0 0x.* in .*_Zna.*}} - // CHECK: {{ #1 0x.* in main .*large_func_test.cc:}}[[@LINE-7]] + // CHECK: {{ #1 0x.* in main .*large_func_test.cpp:}}[[@LINE-7]] delete[] x; } diff --git a/test/asan/TestCases/log-path_test.cc b/test/asan/TestCases/log-path_test.cpp index fd33a31d6..fd33a31d6 100644 --- a/test/asan/TestCases/log-path_test.cc +++ b/test/asan/TestCases/log-path_test.cpp diff --git a/test/asan/TestCases/longjmp.cc b/test/asan/TestCases/longjmp.cpp index 8e9f2ae19..8e9f2ae19 100644 --- a/test/asan/TestCases/longjmp.cc +++ b/test/asan/TestCases/longjmp.cpp diff --git a/test/asan/TestCases/lsan_annotations.cc b/test/asan/TestCases/lsan_annotations.cpp index f52b0ff66..f52b0ff66 100644 --- a/test/asan/TestCases/lsan_annotations.cc +++ b/test/asan/TestCases/lsan_annotations.cpp diff --git a/test/asan/TestCases/malloc-size-too-big.cc b/test/asan/TestCases/malloc-size-too-big.cpp index f41b7ef75..71d6a3e71 100644 --- a/test/asan/TestCases/malloc-size-too-big.cc +++ b/test/asan/TestCases/malloc-size-too-big.cpp @@ -18,7 +18,7 @@ int main() { void *p = malloc(kMaxAllowedMallocSizePlusOne); // CHECK: {{ERROR: AddressSanitizer: requested allocation size .* \(.* after adjustments for alignment, red zones etc\.\) exceeds maximum supported size}} // CHECK: {{#0 0x.* in .*malloc}} - // CHECK: {{#1 0x.* in main .*malloc-size-too-big.cc:}}[[@LINE-3]] + // CHECK: {{#1 0x.* in main .*malloc-size-too-big.cpp:}}[[@LINE-3]] // CHECK: SUMMARY: AddressSanitizer: allocation-size-too-big printf("malloc returned: %zu\n", (size_t)p); diff --git a/test/asan/TestCases/malloc_context_size.cc b/test/asan/TestCases/malloc_context_size.cpp index c753a3a5d..65ef2781c 100644 --- a/test/asan/TestCases/malloc_context_size.cc +++ b/test/asan/TestCases/malloc_context_size.cpp @@ -22,6 +22,6 @@ int main() { // TWO: previously allocated by thread T{{.*}} here: // TWO-NEXT: #0 0x{{.*}} - // TWO-NEXT: #1 0x{{.*}} in main {{.*}}malloc_context_size.cc + // TWO-NEXT: #1 0x{{.*}} in main {{.*}}malloc_context_size.cpp // TWO: SUMMARY: AddressSanitizer: heap-use-after-free } diff --git a/test/asan/TestCases/malloc_fill.cc b/test/asan/TestCases/malloc_fill.cpp index c897bbbc8..c897bbbc8 100644 --- a/test/asan/TestCases/malloc_fill.cc +++ b/test/asan/TestCases/malloc_fill.cpp diff --git a/test/asan/TestCases/max_redzone.cc b/test/asan/TestCases/max_redzone.cpp index 99c886d1e..99c886d1e 100644 --- a/test/asan/TestCases/max_redzone.cc +++ b/test/asan/TestCases/max_redzone.cpp diff --git a/test/asan/TestCases/memcmp_strict_test.cc b/test/asan/TestCases/memcmp_strict_test.cpp index 61ffe8b03..61ffe8b03 100644 --- a/test/asan/TestCases/memcmp_strict_test.cc +++ b/test/asan/TestCases/memcmp_strict_test.cpp diff --git a/test/asan/TestCases/memcmp_test.cc b/test/asan/TestCases/memcmp_test.cpp index e666b6d16..e666b6d16 100644 --- a/test/asan/TestCases/memcmp_test.cc +++ b/test/asan/TestCases/memcmp_test.cpp diff --git a/test/asan/TestCases/memset_test.cc b/test/asan/TestCases/memset_test.cpp index 0530c8483..0530c8483 100644 --- a/test/asan/TestCases/memset_test.cc +++ b/test/asan/TestCases/memset_test.cpp diff --git a/test/asan/TestCases/null_deref.cc b/test/asan/TestCases/null_deref.cpp index 222c526fd..a8947a437 100644 --- a/test/asan/TestCases/null_deref.cc +++ b/test/asan/TestCases/null_deref.cpp @@ -15,10 +15,10 @@ void NullDeref(int *ptr) { ptr[10]++; // BOOM // atos on Mac cannot extract the symbol name correctly. Also, on FreeBSD 9.2 // the demangling function rejects local names with 'L' in front of them. - // CHECK: {{ #0 0x.* in .*NullDeref.*null_deref.cc}} + // CHECK: {{ #0 0x.* in .*NullDeref.*null_deref.cpp}} } int main() { NullDeref((int*)0); - // CHECK: {{ #1 0x.* in main.*null_deref.cc}} + // CHECK: {{ #1 0x.* in main.*null_deref.cpp}} // CHECK: AddressSanitizer can not provide additional info. } diff --git a/test/asan/TestCases/on_error_callback.cc b/test/asan/TestCases/on_error_callback.cpp index f37d1eb7f..f37d1eb7f 100644 --- a/test/asan/TestCases/on_error_callback.cc +++ b/test/asan/TestCases/on_error_callback.cpp diff --git a/test/asan/TestCases/partial_right.cc b/test/asan/TestCases/partial_right.cpp index b60c1a597..b60c1a597 100644 --- a/test/asan/TestCases/partial_right.cc +++ b/test/asan/TestCases/partial_right.cpp diff --git a/test/asan/TestCases/pass-object-byval.cc b/test/asan/TestCases/pass-object-byval.cpp index f9191c53d..f9191c53d 100644 --- a/test/asan/TestCases/pass-object-byval.cc +++ b/test/asan/TestCases/pass-object-byval.cpp diff --git a/test/asan/TestCases/pass-struct-byval-uar.cc b/test/asan/TestCases/pass-struct-byval-uar.cpp index aa6fa579e..aa6fa579e 100644 --- a/test/asan/TestCases/pass-struct-byval-uar.cc +++ b/test/asan/TestCases/pass-struct-byval-uar.cpp diff --git a/test/asan/TestCases/pass-struct-byval.cc b/test/asan/TestCases/pass-struct-byval.cpp index ba49eccf4..ba49eccf4 100644 --- a/test/asan/TestCases/pass-struct-byval.cc +++ b/test/asan/TestCases/pass-struct-byval.cpp diff --git a/test/asan/TestCases/poison_partial.cc b/test/asan/TestCases/poison_partial.cpp index 3a1b41999..3a1b41999 100644 --- a/test/asan/TestCases/poison_partial.cc +++ b/test/asan/TestCases/poison_partial.cpp diff --git a/test/asan/TestCases/pr33372.cc b/test/asan/TestCases/pr33372.cpp index a4b606e02..a4b606e02 100644 --- a/test/asan/TestCases/pr33372.cc +++ b/test/asan/TestCases/pr33372.cpp diff --git a/test/asan/TestCases/print_summary.cc b/test/asan/TestCases/print_summary.cpp index 3983ebc68..f3f769705 100644 --- a/test/asan/TestCases/print_summary.cc +++ b/test/asan/TestCases/print_summary.cpp @@ -8,7 +8,7 @@ int main() { delete[] x; return x[0]; // SOURCE: ERROR: AddressSanitizer: heap-use-after-free - // SOURCE: SUMMARY: AddressSanitizer: heap-use-after-free {{.*}}print_summary.cc:[[@LINE-2]]{{.*}} main + // SOURCE: SUMMARY: AddressSanitizer: heap-use-after-free {{.*}}print_summary.cpp:[[@LINE-2]]{{.*}} main // MODULE: ERROR: AddressSanitizer: heap-use-after-free // MODULE: SUMMARY: AddressSanitizer: heap-use-after-free ({{.*}}+0x{{.*}}) // MISSING: ERROR: AddressSanitizer: heap-use-after-free diff --git a/test/asan/TestCases/realloc.cc b/test/asan/TestCases/realloc.cpp index fcf383b1a..fcf383b1a 100644 --- a/test/asan/TestCases/realloc.cc +++ b/test/asan/TestCases/realloc.cpp diff --git a/test/asan/TestCases/scariness_score_test.cc b/test/asan/TestCases/scariness_score_test.cpp index fb174eb52..fb174eb52 100644 --- a/test/asan/TestCases/scariness_score_test.cc +++ b/test/asan/TestCases/scariness_score_test.cpp diff --git a/test/asan/TestCases/small_memcpy_test.cc b/test/asan/TestCases/small_memcpy_test.cpp index ef0ac35b8..ef0ac35b8 100644 --- a/test/asan/TestCases/small_memcpy_test.cc +++ b/test/asan/TestCases/small_memcpy_test.cpp diff --git a/test/asan/TestCases/speculative_load.cc b/test/asan/TestCases/speculative_load.cpp index fdf70eb39..fdf70eb39 100644 --- a/test/asan/TestCases/speculative_load.cc +++ b/test/asan/TestCases/speculative_load.cpp diff --git a/test/asan/TestCases/speculative_load2.cc b/test/asan/TestCases/speculative_load2.cpp index 51051eb2b..51051eb2b 100644 --- a/test/asan/TestCases/speculative_load2.cc +++ b/test/asan/TestCases/speculative_load2.cpp diff --git a/test/asan/TestCases/stack-buffer-overflow-with-position.cc b/test/asan/TestCases/stack-buffer-overflow-with-position.cpp index 0077663d6..0077663d6 100644 --- a/test/asan/TestCases/stack-buffer-overflow-with-position.cc +++ b/test/asan/TestCases/stack-buffer-overflow-with-position.cpp diff --git a/test/asan/TestCases/stack-buffer-overflow.cc b/test/asan/TestCases/stack-buffer-overflow.cpp index bd0c4772c..07cf39433 100644 --- a/test/asan/TestCases/stack-buffer-overflow.cc +++ b/test/asan/TestCases/stack-buffer-overflow.cpp @@ -9,8 +9,8 @@ int main(int argc, char **argv) { memset(x, 0, 10); int res = x[argc * 10]; // BOOOM // CHECK: {{READ of size 1 at 0x.* thread T0}} - // CHECK: {{ #0 0x.* in main .*stack-buffer-overflow.cc:}}[[@LINE-2]] + // CHECK: {{ #0 0x.* in main .*stack-buffer-overflow.cpp:}}[[@LINE-2]] // CHECK: {{Address 0x.* is located in stack of thread T0 at offset}} - // CHECK-NEXT: in{{.*}}main{{.*}}stack-buffer-overflow.cc + // CHECK-NEXT: in{{.*}}main{{.*}}stack-buffer-overflow.cpp return res; } diff --git a/test/asan/TestCases/stack-frame-demangle.cc b/test/asan/TestCases/stack-frame-demangle.cpp index 11a8b38e6..11a8b38e6 100644 --- a/test/asan/TestCases/stack-frame-demangle.cc +++ b/test/asan/TestCases/stack-frame-demangle.cpp diff --git a/test/asan/TestCases/stack-oob-frames.cc b/test/asan/TestCases/stack-oob-frames.cpp index 3b5d511b2..3b5d511b2 100644 --- a/test/asan/TestCases/stack-oob-frames.cc +++ b/test/asan/TestCases/stack-oob-frames.cpp diff --git a/test/asan/TestCases/strcat-overlap.cc b/test/asan/TestCases/strcat-overlap.cpp index 5539b130f..d3dd2a7c0 100644 --- a/test/asan/TestCases/strcat-overlap.cc +++ b/test/asan/TestCases/strcat-overlap.cpp @@ -43,8 +43,8 @@ __attribute__((noinline)) void bad_function() { // CHECK: strcat-param-overlap: memory ranges // CHECK: [{{0x.*,[ ]*0x.*}}) and [{{0x.*,[ ]*0x.*}}) overlap // CHECK: {{#0 0x.* in .*strcat}} - // CHECK: {{#1 0x.* in bad_function.*strcat-overlap.cc:}}[[@LINE+2]] - // CHECK: {{#2 0x.* in main .*strcat-overlap.cc:}}[[@LINE+5]] + // CHECK: {{#1 0x.* in bad_function.*strcat-overlap.cpp:}}[[@LINE+2]] + // CHECK: {{#2 0x.* in main .*strcat-overlap.cpp:}}[[@LINE+5]] strcat(buffer, buffer + 1); // BOOM } diff --git a/test/asan/TestCases/strcpy-overlap.cc b/test/asan/TestCases/strcpy-overlap.cpp index 53b77e13d..36f1ec4da 100644 --- a/test/asan/TestCases/strcpy-overlap.cc +++ b/test/asan/TestCases/strcpy-overlap.cpp @@ -37,8 +37,8 @@ __attribute__((noinline)) void bad_function() { // CHECK: strcpy-param-overlap: memory ranges // CHECK: [{{0x.*,[ ]*0x.*}}) and [{{0x.*,[ ]*0x.*}}) overlap // CHECK: {{#0 0x.* in .*strcpy}} - // CHECK: {{#1 0x.* in bad_function.*strcpy-overlap.cc:}}[[@LINE+2]] - // CHECK: {{#2 0x.* in main .*strcpy-overlap.cc:}}[[@LINE+5]] + // CHECK: {{#1 0x.* in bad_function.*strcpy-overlap.cpp:}}[[@LINE+2]] + // CHECK: {{#2 0x.* in main .*strcpy-overlap.cpp:}}[[@LINE+5]] strcpy(buffer, buffer + 1); // BOOM } diff --git a/test/asan/TestCases/strdup_oob_test.cc b/test/asan/TestCases/strdup_oob_test.cpp index e251dfcb4..14791e46d 100644 --- a/test/asan/TestCases/strdup_oob_test.cc +++ b/test/asan/TestCases/strdup_oob_test.cpp @@ -21,11 +21,11 @@ int main(int argc, char **argv) { char *copy = strdup(kString); int x = copy[4 + argc]; // BOOM // CHECK: AddressSanitizer: heap-buffer-overflow - // CHECK: #0 {{.*}}main {{.*}}strdup_oob_test.cc:[[@LINE-2]] + // CHECK: #0 {{.*}}main {{.*}}strdup_oob_test.cpp:[[@LINE-2]] // CHECK-LABEL: allocated by thread T{{.*}} here: // CHECK: #{{[01]}} {{.*}}strdup - // CHECK: #{{.*}}main {{.*}}strdup_oob_test.cc:[[@LINE-6]] + // CHECK: #{{.*}}main {{.*}}strdup_oob_test.cpp:[[@LINE-6]] // CHECK-LABEL: SUMMARY - // CHECK: strdup_oob_test.cc:[[@LINE-7]] + // CHECK: strdup_oob_test.cpp:[[@LINE-7]] return x; } diff --git a/test/asan/TestCases/strncat-overlap.cc b/test/asan/TestCases/strncat-overlap.cpp index 959b783d2..9e6ad5914 100644 --- a/test/asan/TestCases/strncat-overlap.cc +++ b/test/asan/TestCases/strncat-overlap.cpp @@ -37,8 +37,8 @@ __attribute__((noinline)) void bad_function() { // CHECK: strncat-param-overlap: memory ranges // CHECK: [{{0x.*,[ ]*0x.*}}) and [{{0x.*,[ ]*0x.*}}) overlap // CHECK: {{#0 0x.* in .*strncat}} - // CHECK: {{#1 0x.* in bad_function.*strncat-overlap.cc:}}[[@LINE+2]] - // CHECK: {{#2 0x.* in main .*strncat-overlap.cc:}}[[@LINE+5]] + // CHECK: {{#1 0x.* in bad_function.*strncat-overlap.cpp:}}[[@LINE+2]] + // CHECK: {{#2 0x.* in main .*strncat-overlap.cpp:}}[[@LINE+5]] strncat(buffer, buffer + 1, 3); // BOOM } diff --git a/test/asan/TestCases/strncpy-overflow.cc b/test/asan/TestCases/strncpy-overflow.cpp index 7da9a8ff8..3047b7f8a 100644 --- a/test/asan/TestCases/strncpy-overflow.cc +++ b/test/asan/TestCases/strncpy-overflow.cpp @@ -16,14 +16,14 @@ int main(int argc, char **argv) { // CHECK: {{WRITE of size 10 at 0x.* thread T0}} // CHECK-Linux: {{ #0 0x.* in .*strncpy}} // CHECK-Darwin: {{ #0 0x.* in wrap_strncpy}} - // CHECK: {{ #1 0x.* in main .*strncpy-overflow.cc:}}[[@LINE-4]] + // CHECK: {{ #1 0x.* in main .*strncpy-overflow.cpp:}}[[@LINE-4]] // CHECK: {{0x.* is located 0 bytes to the right of 9-byte region}} // CHECK: {{allocated by thread T0 here:}} // CHECK-Linux: {{ #0 0x.* in .*malloc}} - // CHECK-Linux: {{ #1 0x.* in main .*strncpy-overflow.cc:}}[[@LINE-10]] + // CHECK-Linux: {{ #1 0x.* in main .*strncpy-overflow.cpp:}}[[@LINE-10]] // CHECK-Darwin: {{ #0 0x.* in wrap_malloc.*}} - // CHECK-Darwin: {{ #1 0x.* in main .*strncpy-overflow.cc:}}[[@LINE-13]] + // CHECK-Darwin: {{ #1 0x.* in main .*strncpy-overflow.cpp:}}[[@LINE-13]] return short_buffer[8]; } diff --git a/test/asan/TestCases/strncpy-overlap.cc b/test/asan/TestCases/strncpy-overlap.cpp index d7052cb49..f855b6af3 100644 --- a/test/asan/TestCases/strncpy-overlap.cc +++ b/test/asan/TestCases/strncpy-overlap.cpp @@ -37,8 +37,8 @@ __attribute__((noinline)) void bad_function() { // CHECK: strncpy-param-overlap: memory ranges // CHECK: [{{0x.*,[ ]*0x.*}}) and [{{0x.*,[ ]*0x.*}}) overlap // CHECK: {{#0 0x.* in .*strncpy}} - // CHECK: {{#1 0x.* in bad_function.*strncpy-overlap.cc:}}[[@LINE+2]] - // CHECK: {{#2 0x.* in main .*strncpy-overlap.cc:}}[[@LINE+5]] + // CHECK: {{#1 0x.* in bad_function.*strncpy-overlap.cpp:}}[[@LINE+2]] + // CHECK: {{#2 0x.* in main .*strncpy-overlap.cpp:}}[[@LINE+5]] strncpy(buffer, buffer + 1, 5); // BOOM } diff --git a/test/asan/TestCases/suppressions-exec-relative-location.cc b/test/asan/TestCases/suppressions-exec-relative-location.cpp index 3f6d23925..3f6d23925 100644 --- a/test/asan/TestCases/suppressions-exec-relative-location.cc +++ b/test/asan/TestCases/suppressions-exec-relative-location.cpp diff --git a/test/asan/TestCases/suppressions-function.cc b/test/asan/TestCases/suppressions-function.cpp index 510a9bc5b..510a9bc5b 100644 --- a/test/asan/TestCases/suppressions-function.cc +++ b/test/asan/TestCases/suppressions-function.cpp diff --git a/test/asan/TestCases/suppressions-interceptor.cc b/test/asan/TestCases/suppressions-interceptor.cpp index e44ccb8e6..e44ccb8e6 100644 --- a/test/asan/TestCases/suppressions-interceptor.cc +++ b/test/asan/TestCases/suppressions-interceptor.cpp diff --git a/test/asan/TestCases/suppressions-library.cc b/test/asan/TestCases/suppressions-library.cpp index 181ed7582..181ed7582 100644 --- a/test/asan/TestCases/suppressions-library.cc +++ b/test/asan/TestCases/suppressions-library.cpp diff --git a/test/asan/TestCases/throw_call_test.cc b/test/asan/TestCases/throw_call_test.cpp index 20a7c0b76..20a7c0b76 100644 --- a/test/asan/TestCases/throw_call_test.cc +++ b/test/asan/TestCases/throw_call_test.cpp diff --git a/test/asan/TestCases/throw_catch.cc b/test/asan/TestCases/throw_catch.cpp index d7f00ea9e..d7f00ea9e 100644 --- a/test/asan/TestCases/throw_catch.cc +++ b/test/asan/TestCases/throw_catch.cpp diff --git a/test/asan/TestCases/throw_invoke_test.cc b/test/asan/TestCases/throw_invoke_test.cpp index bbfa1c7b9..bbfa1c7b9 100644 --- a/test/asan/TestCases/throw_invoke_test.cc +++ b/test/asan/TestCases/throw_invoke_test.cpp diff --git a/test/asan/TestCases/time_interceptor.cc b/test/asan/TestCases/time_interceptor.cpp index f78af1056..f78af1056 100644 --- a/test/asan/TestCases/time_interceptor.cc +++ b/test/asan/TestCases/time_interceptor.cpp diff --git a/test/asan/TestCases/uar_and_exceptions.cc b/test/asan/TestCases/uar_and_exceptions.cpp index 2357ae803..2357ae803 100644 --- a/test/asan/TestCases/uar_and_exceptions.cc +++ b/test/asan/TestCases/uar_and_exceptions.cpp diff --git a/test/asan/TestCases/unaligned_loads_and_stores.cc b/test/asan/TestCases/unaligned_loads_and_stores.cpp index f1b1d0d45..fa8d7becf 100644 --- a/test/asan/TestCases/unaligned_loads_and_stores.cc +++ b/test/asan/TestCases/unaligned_loads_and_stores.cpp @@ -23,29 +23,29 @@ int main(int argc, char **argv) { switch (argv[1][0]) { case 'A': res = __sanitizer_unaligned_load16(x + 15); break; // CHECK-A ERROR: AddressSanitizer: heap-buffer-overflow on address -// CHECK-A: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-2]] +// CHECK-A: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-2]] // CHECK-A: is located 0 bytes to the right of 16-byte region case 'B': res = __sanitizer_unaligned_load32(x + 14); break; -// CHECK-B: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]] +// CHECK-B: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]] case 'C': res = __sanitizer_unaligned_load32(x + 13); break; -// CHECK-C: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]] +// CHECK-C: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]] case 'D': res = __sanitizer_unaligned_load64(x + 15); break; -// CHECK-D: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]] +// CHECK-D: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]] case 'E': res = __sanitizer_unaligned_load64(x + 9); break; -// CHECK-E: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]] +// CHECK-E: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]] case 'K': __sanitizer_unaligned_store16(x + 15, 0); break; // CHECK-K ERROR: AddressSanitizer: heap-buffer-overflow on address -// CHECK-K: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-2]] +// CHECK-K: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-2]] // CHECK-K: is located 0 bytes to the right of 16-byte region case 'L': __sanitizer_unaligned_store32(x + 15, 0); break; -// CHECK-L: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]] +// CHECK-L: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]] case 'M': __sanitizer_unaligned_store32(x + 13, 0); break; -// CHECK-M: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]] +// CHECK-M: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]] case 'N': __sanitizer_unaligned_store64(x + 10, 0); break; -// CHECK-N: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]] +// CHECK-N: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]] case 'O': __sanitizer_unaligned_store64(x + 14, 0); break; -// CHECK-O: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]] +// CHECK-O: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]] } delete x; return res; diff --git a/test/asan/TestCases/use-after-delete.cc b/test/asan/TestCases/use-after-delete.cpp index 44404cd18..c72e0f791 100644 --- a/test/asan/TestCases/use-after-delete.cc +++ b/test/asan/TestCases/use-after-delete.cpp @@ -12,17 +12,17 @@ int main() { // CHECK: {{.*ERROR: AddressSanitizer: heap-use-after-free on address}} // CHECK: {{0x.* at pc 0x.* bp 0x.* sp 0x.*}} // CHECK: {{READ of size 1 at 0x.* thread T0}} - // CHECK: {{ #0 0x.* in main .*use-after-delete.cc:}}[[@LINE-4]] + // CHECK: {{ #0 0x.* in main .*use-after-delete.cpp:}}[[@LINE-4]] // CHECK: {{0x.* is located 5 bytes inside of 10-byte region .0x.*,0x.*}} // CHECK: {{freed by thread T0 here:}} // CHECK-Linux: {{ #0 0x.* in operator delete\[\]}} - // CHECK-Linux: {{ #1 0x.* in main .*use-after-delete.cc:}}[[@LINE-10]] + // CHECK-Linux: {{ #1 0x.* in main .*use-after-delete.cpp:}}[[@LINE-10]] // CHECK: {{previously allocated by thread T0 here:}} // CHECK-Linux: {{ #0 0x.* in operator new\[\]}} - // CHECK-Linux: {{ #1 0x.* in main .*use-after-delete.cc:}}[[@LINE-16]] + // CHECK-Linux: {{ #1 0x.* in main .*use-after-delete.cpp:}}[[@LINE-16]] // CHECK: Shadow byte legend (one shadow byte represents {{[0-9]+}} application bytes): // CHECK: Global redzone: diff --git a/test/asan/TestCases/use-after-free-right.cc b/test/asan/TestCases/use-after-free-right.cpp index d72370e72..c4ae2810c 100644 --- a/test/asan/TestCases/use-after-free-right.cc +++ b/test/asan/TestCases/use-after-free-right.cpp @@ -15,21 +15,21 @@ int main() { // CHECK: {{.*ERROR: AddressSanitizer: heap-use-after-free on address}} // CHECK: {{0x.* at pc 0x.* bp 0x.* sp 0x.*}} // CHECK: {{WRITE of size 1 at 0x.* thread T0}} - // CHECK: {{ #0 0x.* in main .*use-after-free-right.cc:}}[[@LINE-4]] + // CHECK: {{ #0 0x.* in main .*use-after-free-right.cpp:}}[[@LINE-4]] // CHECK: {{0x.* is located 0 bytes inside of 1-byte region .0x.*,0x.*}} // CHECK: {{freed by thread T0 here:}} // CHECK-Linux: {{ #0 0x.* in .*free}} - // CHECK-Linux: {{ #1 0x.* in main .*use-after-free-right.cc:}}[[@LINE-10]] + // CHECK-Linux: {{ #1 0x.* in main .*use-after-free-right.cpp:}}[[@LINE-10]] // CHECK-Darwin: {{ #0 0x.* in wrap_free}} - // CHECK-Darwin: {{ #1 0x.* in main .*use-after-free-right.cc:}}[[@LINE-13]] + // CHECK-Darwin: {{ #1 0x.* in main .*use-after-free-right.cpp:}}[[@LINE-13]] // CHECK: {{previously allocated by thread T0 here:}} // CHECK-Linux: {{ #0 0x.* in .*malloc}} - // CHECK-Linux: {{ #1 0x.* in main .*use-after-free-right.cc:}}[[@LINE-19]] + // CHECK-Linux: {{ #1 0x.* in main .*use-after-free-right.cpp:}}[[@LINE-19]] // CHECK-Darwin: {{ #0 0x.* in wrap_malloc.*}} - // CHECK-Darwin: {{ #1 0x.* in main .*use-after-free-right.cc:}}[[@LINE-22]] + // CHECK-Darwin: {{ #1 0x.* in main .*use-after-free-right.cpp:}}[[@LINE-22]] } diff --git a/test/asan/TestCases/use-after-free.cc b/test/asan/TestCases/use-after-free.cpp index a24c7d497..54cd32dda 100644 --- a/test/asan/TestCases/use-after-free.cc +++ b/test/asan/TestCases/use-after-free.cpp @@ -12,23 +12,23 @@ int main() { // CHECK: {{.*ERROR: AddressSanitizer: heap-use-after-free on address}} // CHECK: {{0x.* at pc 0x.* bp 0x.* sp 0x.*}} // CHECK: {{READ of size 1 at 0x.* thread T0}} - // CHECK: {{ #0 0x.* in main .*use-after-free.cc:}}[[@LINE-4]] + // CHECK: {{ #0 0x.* in main .*use-after-free.cpp:}}[[@LINE-4]] // CHECK: {{0x.* is located 5 bytes inside of 10-byte region .0x.*,0x.*}} // CHECK: {{freed by thread T0 here:}} // CHECK-Linux: {{ #0 0x.* in .*free}} - // CHECK-Linux: {{ #1 0x.* in main .*use-after-free.cc:}}[[@LINE-10]] + // CHECK-Linux: {{ #1 0x.* in main .*use-after-free.cpp:}}[[@LINE-10]] // CHECK-Darwin: {{ #0 0x.* in wrap_free}} - // CHECK-Darwin: {{ #1 0x.* in main .*use-after-free.cc:}}[[@LINE-13]] + // CHECK-Darwin: {{ #1 0x.* in main .*use-after-free.cpp:}}[[@LINE-13]] // CHECK: {{previously allocated by thread T0 here:}} // CHECK-Linux: {{ #0 0x.* in .*malloc}} - // CHECK-Linux: {{ #1 0x.* in main .*use-after-free.cc:}}[[@LINE-19]] + // CHECK-Linux: {{ #1 0x.* in main .*use-after-free.cpp:}}[[@LINE-19]] // CHECK-Darwin: {{ #0 0x.* in wrap_malloc.*}} - // CHECK-Darwin: {{ #1 0x.* in main .*use-after-free.cc:}}[[@LINE-22]] + // CHECK-Darwin: {{ #1 0x.* in main .*use-after-free.cpp:}}[[@LINE-22]] // CHECK: Shadow byte legend (one shadow byte represents {{[0-9]+}} application bytes): // CHECK: Global redzone: // CHECK: ASan internal: diff --git a/test/asan/TestCases/use-after-poison.cc b/test/asan/TestCases/use-after-poison.cpp index 9df042b60..b32bb8cd2 100644 --- a/test/asan/TestCases/use-after-poison.cc +++ b/test/asan/TestCases/use-after-poison.cpp @@ -14,7 +14,7 @@ int main(int argc, char **argv) { __asan_poison_memory_region(x, 16); int res = x[argc * 10]; // BOOOM // CHECK: ERROR: AddressSanitizer: use-after-poison - // CHECK: main{{.*}}use-after-poison.cc:[[@LINE-2]] + // CHECK: main{{.*}}use-after-poison.cpp:[[@LINE-2]] delete [] x; return res; } diff --git a/test/asan/TestCases/use-after-scope-capture.cc b/test/asan/TestCases/use-after-scope-capture.cpp index 113ce3536..5e93dbb48 100644 --- a/test/asan/TestCases/use-after-scope-capture.cc +++ b/test/asan/TestCases/use-after-scope-capture.cpp @@ -10,7 +10,7 @@ int main() { f = [&x]() { return x; // BOOM // CHECK: ERROR: AddressSanitizer: stack-use-after-scope - // CHECK: #0 0x{{.*}} in {{.*}}use-after-scope-capture.cc:[[@LINE-2]] + // CHECK: #0 0x{{.*}} in {{.*}}use-after-scope-capture.cpp:[[@LINE-2]] }; } return f(); // BOOM diff --git a/test/asan/TestCases/use-after-scope-conversion.cc b/test/asan/TestCases/use-after-scope-conversion.cpp index 99b845d07..99b845d07 100644 --- a/test/asan/TestCases/use-after-scope-conversion.cc +++ b/test/asan/TestCases/use-after-scope-conversion.cpp diff --git a/test/asan/TestCases/use-after-scope-dtor-order.cc b/test/asan/TestCases/use-after-scope-dtor-order.cpp index 8cdfa6a1c..8d4f772c0 100644 --- a/test/asan/TestCases/use-after-scope-dtor-order.cc +++ b/test/asan/TestCases/use-after-scope-dtor-order.cpp @@ -8,7 +8,7 @@ struct IntHolder { ~IntHolder() { printf("Value: %d\n", *val_); // BOOM // CHECK: ERROR: AddressSanitizer: stack-use-after-scope - // CHECK: #0 0x{{.*}} in IntHolder::~IntHolder{{.*}}.cc:[[@LINE-2]] + // CHECK: #0 0x{{.*}} in IntHolder::~IntHolder{{.*}}.cpp:[[@LINE-2]] } void set(int *val) { val_ = val; } int *get() { return val_; } diff --git a/test/asan/TestCases/use-after-scope-goto.cc b/test/asan/TestCases/use-after-scope-goto.cpp index 351cbe995..351cbe995 100644 --- a/test/asan/TestCases/use-after-scope-goto.cc +++ b/test/asan/TestCases/use-after-scope-goto.cpp diff --git a/test/asan/TestCases/use-after-scope-if.cc b/test/asan/TestCases/use-after-scope-if.cpp index 8180077a0..579008385 100644 --- a/test/asan/TestCases/use-after-scope-if.cc +++ b/test/asan/TestCases/use-after-scope-if.cpp @@ -11,5 +11,5 @@ int main() { } return *p; // BOOM // CHECK: ERROR: AddressSanitizer: stack-use-after-scope - // CHECK: #0 0x{{.*}} in main {{.*}}.cc:[[@LINE-2]] + // CHECK: #0 0x{{.*}} in main {{.*}}.cpp:[[@LINE-2]] } diff --git a/test/asan/TestCases/use-after-scope-inlined.cc b/test/asan/TestCases/use-after-scope-inlined.cpp index bed9814c8..ce72fa236 100644 --- a/test/asan/TestCases/use-after-scope-inlined.cc +++ b/test/asan/TestCases/use-after-scope-inlined.cpp @@ -20,7 +20,7 @@ int main(int argc, char *argv[]) { // CHECK: ERROR: AddressSanitizer: stack-use-after-scope // CHECK: READ of size 4 at 0x{{.*}} thread T0 // CHECK: #0 0x{{.*}} in main - // CHECK: {{.*}}use-after-scope-inlined.cc:[[@LINE-4]] + // CHECK: {{.*}}use-after-scope-inlined.cpp:[[@LINE-4]] // CHECK: Address 0x{{.*}} is located in stack of thread T0 at offset [[OFFSET:[^ ]*]] in frame // CHECK: {{.*}} in main // CHECK: This frame has diff --git a/test/asan/TestCases/use-after-scope-loop-bug.cc b/test/asan/TestCases/use-after-scope-loop-bug.cpp index d4b12eca9..b5b02d7f1 100644 --- a/test/asan/TestCases/use-after-scope-loop-bug.cc +++ b/test/asan/TestCases/use-after-scope-loop-bug.cpp @@ -11,7 +11,7 @@ int main() { } return *p; // BOOM // CHECK: ERROR: AddressSanitizer: stack-use-after-scope - // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope-loop-bug.cc:[[@LINE-2]] + // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope-loop-bug.cpp:[[@LINE-2]] // CHECK: Address 0x{{.*}} is located in stack of thread T{{.*}} at offset [[OFFSET:[^ ]+]] in frame // {{\[}}[[OFFSET]], {{[0-9]+}}) 'x' } diff --git a/test/asan/TestCases/use-after-scope-loop-removed.cc b/test/asan/TestCases/use-after-scope-loop-removed.cpp index 730bf3a3e..0e8944e93 100644 --- a/test/asan/TestCases/use-after-scope-loop-removed.cc +++ b/test/asan/TestCases/use-after-scope-loop-removed.cpp @@ -12,7 +12,7 @@ int main() { } return *p; // BOOM // CHECK: ERROR: AddressSanitizer: stack-use-after-scope - // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope-loop-removed.cc:[[@LINE-2]] + // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope-loop-removed.cpp:[[@LINE-2]] // CHECK: Address 0x{{.*}} is located in stack of thread T{{.*}} at offset [[OFFSET:[^ ]+]] in frame // {{\[}}[[OFFSET]], {{[0-9]+}}) 'x' } diff --git a/test/asan/TestCases/use-after-scope-loop.cc b/test/asan/TestCases/use-after-scope-loop.cpp index d99761bc7..dcd6435ae 100644 --- a/test/asan/TestCases/use-after-scope-loop.cc +++ b/test/asan/TestCases/use-after-scope-loop.cpp @@ -10,5 +10,5 @@ int main() { } return **p; // BOOM // CHECK: ERROR: AddressSanitizer: stack-use-after-scope - // CHECK: #0 0x{{.*}} in main {{.*}}.cc:[[@LINE-2]] + // CHECK: #0 0x{{.*}} in main {{.*}}.cpp:[[@LINE-2]] } diff --git a/test/asan/TestCases/use-after-scope-nobug.cc b/test/asan/TestCases/use-after-scope-nobug.cpp index cf471dc34..cf471dc34 100644 --- a/test/asan/TestCases/use-after-scope-nobug.cc +++ b/test/asan/TestCases/use-after-scope-nobug.cpp diff --git a/test/asan/TestCases/use-after-scope-temp.cc b/test/asan/TestCases/use-after-scope-temp.cpp index 4dcef59a2..b97f312b4 100644 --- a/test/asan/TestCases/use-after-scope-temp.cc +++ b/test/asan/TestCases/use-after-scope-temp.cpp @@ -16,6 +16,6 @@ int main(int argc, char *argv[]) { save({argc}); int x = saved->val; // BOOM // CHECK: ERROR: AddressSanitizer: stack-use-after-scope - // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope-temp.cc:[[@LINE-2]] + // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope-temp.cpp:[[@LINE-2]] return x; } diff --git a/test/asan/TestCases/use-after-scope-temp2.cc b/test/asan/TestCases/use-after-scope-temp2.cpp index 1ecd3cbe2..99e4f2505 100644 --- a/test/asan/TestCases/use-after-scope-temp2.cc +++ b/test/asan/TestCases/use-after-scope-temp2.cpp @@ -15,6 +15,6 @@ int main(int argc, char *argv[]) { saved = &IntHolder().Self(); int x = saved->val; // BOOM // CHECK: ERROR: AddressSanitizer: stack-use-after-scope - // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope-temp2.cc:[[@LINE-2]] + // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope-temp2.cpp:[[@LINE-2]] return x; } diff --git a/test/asan/TestCases/use-after-scope-types.cc b/test/asan/TestCases/use-after-scope-types.cpp index ec6742bbb..5afd3b1ef 100644 --- a/test/asan/TestCases/use-after-scope-types.cc +++ b/test/asan/TestCases/use-after-scope-types.cpp @@ -41,7 +41,7 @@ template <class T> __attribute__((noinline)) void test() { ptr.Access(); // CHECK: ERROR: AddressSanitizer: stack-use-after-scope - // CHECK: #{{[0-9]+}} 0x{{.*}} in {{(void )?test.*\((void)?\) .*}}use-after-scope-types.cc + // CHECK: #{{[0-9]+}} 0x{{.*}} in {{(void )?test.*\((void)?\) .*}}use-after-scope-types.cpp // CHECK: Address 0x{{.*}} is located in stack of thread T{{.*}} at offset [[OFFSET:[^ ]+]] in frame // {{\[}}[[OFFSET]], {{[0-9]+}}) 'x' } diff --git a/test/asan/TestCases/use-after-scope.cc b/test/asan/TestCases/use-after-scope.cpp index 4c5998abe..fdc937bb6 100644 --- a/test/asan/TestCases/use-after-scope.cc +++ b/test/asan/TestCases/use-after-scope.cpp @@ -14,7 +14,7 @@ int main() { } *p = 5; // BOOM // CHECK: ERROR: AddressSanitizer: stack-use-after-scope - // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope.cc:[[@LINE-2]] + // CHECK: #0 0x{{.*}} in main {{.*}}use-after-scope.cpp:[[@LINE-2]] // CHECK: Address 0x{{.*}} is located in stack of thread T{{.*}} at offset [[OFFSET:[^ ]+]] in frame // {{\[}}[[OFFSET]], {{[0-9]+}}) 'x' return 0; diff --git a/test/asan/TestCases/verbose-log-path_test.cc b/test/asan/TestCases/verbose-log-path_test.cpp index 5407d15d6..5407d15d6 100644 --- a/test/asan/TestCases/verbose-log-path_test.cc +++ b/test/asan/TestCases/verbose-log-path_test.cpp diff --git a/test/asan/TestCases/vla_chrome_testcase.cc b/test/asan/TestCases/vla_chrome_testcase.cpp index a87718006..a87718006 100644 --- a/test/asan/TestCases/vla_chrome_testcase.cc +++ b/test/asan/TestCases/vla_chrome_testcase.cpp diff --git a/test/asan/TestCases/vla_condition_overflow.cc b/test/asan/TestCases/vla_condition_overflow.cpp index cf42d794e..cf42d794e 100644 --- a/test/asan/TestCases/vla_condition_overflow.cc +++ b/test/asan/TestCases/vla_condition_overflow.cpp diff --git a/test/asan/TestCases/vla_loop_overfow.cc b/test/asan/TestCases/vla_loop_overfow.cpp index b6a5864c0..b6a5864c0 100644 --- a/test/asan/TestCases/vla_loop_overfow.cc +++ b/test/asan/TestCases/vla_loop_overfow.cpp diff --git a/test/asan/TestCases/zero_page_pc.cc b/test/asan/TestCases/zero_page_pc.cpp index ba35df880..ba35df880 100644 --- a/test/asan/TestCases/zero_page_pc.cc +++ b/test/asan/TestCases/zero_page_pc.cpp diff --git a/test/lit.common.cfg.py b/test/lit.common.cfg.py index af0721ad1..2a8d93166 100644 --- a/test/lit.common.cfg.py +++ b/test/lit.common.cfg.py @@ -254,7 +254,7 @@ if config.host_os == 'Darwin': config.available_features.add('osx-autointerception') config.available_features.add('osx-ld64-live_support') else: - # The ASAN initialization-bug.cc test should XFAIL on OS X systems + # The ASAN initialization-bug.cpp test should XFAIL on OS X systems # older than El Capitan. By marking the test as being unsupported with # this "feature", we can pass the test on newer OS X versions and other # platforms. |