compiler-rt: Rename cc files below test/asan to cpp
authorNico Weber <nicolasweber@gmx.de>
Mon, 5 Aug 2019 16:48:12 +0000 (16:48 +0000)
committerNico Weber <nicolasweber@gmx.de>
Mon, 5 Aug 2019 16:48:12 +0000 (16:48 +0000)
See r367803 and similar other changes.

llvm-svn: 367887

422 files changed:
compiler-rt/CMakeLists.txt
compiler-rt/lib/asan/tests/asan_test.cpp
compiler-rt/lib/sanitizer_common/scripts/check_lint.sh
compiler-rt/test/asan/TestCases/Darwin/abort_on_error.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/abort_on_error.cc with 99% similarity]
compiler-rt/test/asan/TestCases/Darwin/asan-symbolize-partial-report-no-external-symbolizer.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/asan-symbolize-partial-report-no-external-symbolizer.cc with 93% similarity]
compiler-rt/test/asan/TestCases/Darwin/asan-symbolize-partial-report-with-module-map.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/asan-symbolize-partial-report-with-module-map.cc with 95% similarity]
compiler-rt/test/asan/TestCases/Darwin/asan-symbolize-with-module-map.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/asan-symbolize-with-module-map.cc with 96% similarity]
compiler-rt/test/asan/TestCases/Darwin/asan_gen_prefixes.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/asan_gen_prefixes.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/atos-symbolizer-dyld-root-path.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/atos-symbolizer-dyld-root-path.cc with 90% similarity]
compiler-rt/test/asan/TestCases/Darwin/atos-symbolizer.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/atos-symbolizer.cc with 80% similarity]
compiler-rt/test/asan/TestCases/Darwin/dladdr-demangling.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/dladdr-demangling.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/dump_registers.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/dump_registers.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/dyld_insert_libraries_reexec.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/dyld_insert_libraries_reexec.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/dyld_insert_libraries_remove.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/dyld_insert_libraries_remove.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/empty-section.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/empty-section.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/haswell-symbolication.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/haswell-symbolication.cc with 99% similarity]
compiler-rt/test/asan/TestCases/Darwin/init_for_dlopen.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/init_for_dlopen.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/interface_symbols_darwin.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/interface_symbols_darwin.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/linked-only.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/linked-only.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/malloc_destroy_zone.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/malloc_destroy_zone.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/malloc_set_zone_name-mprotect.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/malloc_set_zone_name-mprotect.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/malloc_zone-protected.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/malloc_zone-protected.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/mixing-global-constructors.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/mixing-global-constructors.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/odr-lto.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/odr-lto.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/reexec-insert-libraries-env.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/reexec-insert-libraries-env.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/sandbox-symbolizer.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/sandbox-symbolizer.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/scribble.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/scribble.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/suppressions-darwin.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/suppressions-darwin.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/suppressions-function.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/suppressions-function.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/suppressions-sandbox.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/suppressions-sandbox.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Darwin/unset-insert-libraries-on-exec.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/unset-insert-libraries-on-exec.cc with 93% similarity]
compiler-rt/test/asan/TestCases/Darwin/uuid.cpp [moved from compiler-rt/test/asan/TestCases/Darwin/uuid.cc with 95% similarity]
compiler-rt/test/asan/TestCases/Helpers/blacklist-extra.cpp [moved from compiler-rt/test/asan/TestCases/Helpers/blacklist-extra.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Helpers/echo-env.cpp [moved from compiler-rt/test/asan/TestCases/Helpers/echo-env.cc with 85% similarity]
compiler-rt/test/asan/TestCases/Helpers/init-order-atexit-extra.cpp [moved from compiler-rt/test/asan/TestCases/Helpers/init-order-atexit-extra.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Helpers/initialization-blacklist-extra.cpp [moved from compiler-rt/test/asan/TestCases/Helpers/initialization-blacklist-extra.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Helpers/initialization-blacklist-extra2.cpp [moved from compiler-rt/test/asan/TestCases/Helpers/initialization-blacklist-extra2.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Helpers/initialization-blacklist.txt
compiler-rt/test/asan/TestCases/Helpers/initialization-bug-extra.cpp [moved from compiler-rt/test/asan/TestCases/Helpers/initialization-bug-extra.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Helpers/initialization-bug-extra2.cpp [moved from compiler-rt/test/asan/TestCases/Helpers/initialization-bug-extra2.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Helpers/initialization-constexpr-extra.cpp [moved from compiler-rt/test/asan/TestCases/Helpers/initialization-constexpr-extra.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Helpers/initialization-nobug-extra.cpp [moved from compiler-rt/test/asan/TestCases/Helpers/initialization-nobug-extra.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Helpers/underflow.cpp [moved from compiler-rt/test/asan/TestCases/Helpers/underflow.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/abort_on_error.cpp [moved from compiler-rt/test/asan/TestCases/Linux/abort_on_error.cc with 98% similarity]
compiler-rt/test/asan/TestCases/Linux/activation-options.cpp [moved from compiler-rt/test/asan/TestCases/Linux/activation-options.cc with 94% similarity]
compiler-rt/test/asan/TestCases/Linux/aligned_delete_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/aligned_delete_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/allocator_oom_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/allocator_oom_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/asan_default_suppressions.cpp [moved from compiler-rt/test/asan/TestCases/Linux/asan_default_suppressions.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/asan_dlopen_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/asan_dlopen_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/asan_prelink_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/asan_prelink_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/asan_preload_test-1.cpp [moved from compiler-rt/test/asan/TestCases/Linux/asan_preload_test-1.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/asan_preload_test-2.cpp [moved from compiler-rt/test/asan/TestCases/Linux/asan_preload_test-2.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/asan_preload_test-3.cpp [moved from compiler-rt/test/asan/TestCases/Linux/asan_preload_test-3.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/asan_rt_confict_test-1.cpp [moved from compiler-rt/test/asan/TestCases/Linux/asan_rt_confict_test-1.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/asan_rt_confict_test-2.cpp [moved from compiler-rt/test/asan/TestCases/Linux/asan_rt_confict_test-2.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/auto_memory_profile_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/auto_memory_profile_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/bzero.cpp [moved from compiler-rt/test/asan/TestCases/Linux/bzero.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/clang_gcc_abi.cpp [moved from compiler-rt/test/asan/TestCases/Linux/clang_gcc_abi.cc with 81% similarity]
compiler-rt/test/asan/TestCases/Linux/clone_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/clone_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/coverage-missing.cpp [moved from compiler-rt/test/asan/TestCases/Linux/coverage-missing.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/cuda_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/cuda_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/function-sections-are-bad.cpp [moved from compiler-rt/test/asan/TestCases/Linux/function-sections-are-bad.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/global-overflow-bfd.cpp [moved from compiler-rt/test/asan/TestCases/Linux/global-overflow-bfd.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/global-overflow-lld.cpp [moved from compiler-rt/test/asan/TestCases/Linux/global-overflow-lld.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/globals-gc-sections-lld.cpp [moved from compiler-rt/test/asan/TestCases/Linux/globals-gc-sections-lld.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/init-order-dlopen.cpp [moved from compiler-rt/test/asan/TestCases/Linux/init-order-dlopen.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/init_fini_sections.cpp [moved from compiler-rt/test/asan/TestCases/Linux/init_fini_sections.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/initialization-bug-any-order.cpp [moved from compiler-rt/test/asan/TestCases/Linux/initialization-bug-any-order.cc with 96% similarity]
compiler-rt/test/asan/TestCases/Linux/interception_malloc_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/interception_malloc_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/interception_readdir_r_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/interception_readdir_r_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/interception_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/interception_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/interface_symbols_linux.cpp [moved from compiler-rt/test/asan/TestCases/Linux/interface_symbols_linux.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/kernel-area.cpp [moved from compiler-rt/test/asan/TestCases/Linux/kernel-area.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/leak.cpp [moved from compiler-rt/test/asan/TestCases/Linux/leak.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/leak_check_segv.cpp [moved from compiler-rt/test/asan/TestCases/Linux/leak_check_segv.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/local_alias.cpp [moved from compiler-rt/test/asan/TestCases/Linux/local_alias.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/long-object-path.cpp [moved from compiler-rt/test/asan/TestCases/Linux/long-object-path.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/malloc-in-qsort.cpp [moved from compiler-rt/test/asan/TestCases/Linux/malloc-in-qsort.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/malloc_delete_mismatch.cpp [moved from compiler-rt/test/asan/TestCases/Linux/malloc_delete_mismatch.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/memmem_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/memmem_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/mincore.cpp [moved from compiler-rt/test/asan/TestCases/Linux/mincore.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/new_delete_mismatch.cpp [moved from compiler-rt/test/asan/TestCases/Linux/new_delete_mismatch.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/new_delete_mismatch_global.cpp [moved from compiler-rt/test/asan/TestCases/Linux/new_delete_mismatch_global.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/new_delete_mismatch_stack.cpp [moved from compiler-rt/test/asan/TestCases/Linux/new_delete_mismatch_stack.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/nohugepage_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/nohugepage_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/odr-violation.cpp [moved from compiler-rt/test/asan/TestCases/Linux/odr-violation.cc with 96% similarity]
compiler-rt/test/asan/TestCases/Linux/odr-vtable.cpp [moved from compiler-rt/test/asan/TestCases/Linux/odr-vtable.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/odr_indicators.cpp [moved from compiler-rt/test/asan/TestCases/Linux/odr_indicators.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/overflow-in-qsort.cpp [moved from compiler-rt/test/asan/TestCases/Linux/overflow-in-qsort.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/preinit_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/preinit_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/preinstalled_signal.cpp [moved from compiler-rt/test/asan/TestCases/Linux/preinstalled_signal.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/print_memory_profile_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/print_memory_profile_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/pthread_create_from_constructor.cpp [moved from compiler-rt/test/asan/TestCases/Linux/pthread_create_from_constructor.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/pthread_create_version.cpp [moved from compiler-rt/test/asan/TestCases/Linux/pthread_create_version.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/ptrace.cpp [moved from compiler-rt/test/asan/TestCases/Linux/ptrace.cc with 98% similarity]
compiler-rt/test/asan/TestCases/Linux/quarantine_size_mb.cpp [moved from compiler-rt/test/asan/TestCases/Linux/quarantine_size_mb.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/recoverable-lsan.cpp [moved from compiler-rt/test/asan/TestCases/Linux/recoverable-lsan.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/recvfrom.cpp [moved from compiler-rt/test/asan/TestCases/Linux/recvfrom.cc with 94% similarity]
compiler-rt/test/asan/TestCases/Linux/release_to_os_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/release_to_os_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/rlimit_mmap_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/rlimit_mmap_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/sanbox_read_proc_self_maps_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/sanbox_read_proc_self_maps_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/shmctl.cpp [moved from compiler-rt/test/asan/TestCases/Linux/shmctl.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/signal_during_stop_the_world.cpp [moved from compiler-rt/test/asan/TestCases/Linux/signal_during_stop_the_world.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/sized_delete_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/sized_delete_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/stack-overflow-recovery-mode.cpp [moved from compiler-rt/test/asan/TestCases/Linux/stack-overflow-recovery-mode.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/stack-overflow-sigbus.cpp [moved from compiler-rt/test/asan/TestCases/Linux/stack-overflow-sigbus.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/stack-trace-dlclose.cpp [moved from compiler-rt/test/asan/TestCases/Linux/stack-trace-dlclose.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/static_tls.cpp [moved from compiler-rt/test/asan/TestCases/Linux/static_tls.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/swapcontext_annotation.cpp [moved from compiler-rt/test/asan/TestCases/Linux/swapcontext_annotation.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/swapcontext_test.cpp [moved from compiler-rt/test/asan/TestCases/Linux/swapcontext_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/syscalls.cpp [moved from compiler-rt/test/asan/TestCases/Linux/syscalls.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/thread_local_quarantine_pthread_join.cpp [moved from compiler-rt/test/asan/TestCases/Linux/thread_local_quarantine_pthread_join.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/thread_local_quarantine_size_kb.cpp [moved from compiler-rt/test/asan/TestCases/Linux/thread_local_quarantine_size_kb.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/uar_signals.cpp [moved from compiler-rt/test/asan/TestCases/Linux/uar_signals.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/unpoison_tls.cpp [moved from compiler-rt/test/asan/TestCases/Linux/unpoison_tls.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Linux/vfork.cpp [moved from compiler-rt/test/asan/TestCases/Linux/vfork.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/asan-symbolize-bad-path.cpp [moved from compiler-rt/test/asan/TestCases/Posix/asan-symbolize-bad-path.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cpp [moved from compiler-rt/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cc with 93% similarity]
compiler-rt/test/asan/TestCases/Posix/asan_symbolize_script/logging_options_in_help.cpp [moved from compiler-rt/test/asan/TestCases/Posix/asan_symbolize_script/logging_options_in_help.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_help_output.cpp [moved from compiler-rt/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_help_output.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_symbolicate.cpp [moved from compiler-rt/test/asan/TestCases/Posix/asan_symbolize_script/plugin_no_op_symbolicate.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/asan_symbolize_script/set_log_dest.cpp [moved from compiler-rt/test/asan/TestCases/Posix/asan_symbolize_script/set_log_dest.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/asan_symbolize_script/set_log_level.cpp [moved from compiler-rt/test/asan/TestCases/Posix/asan_symbolize_script/set_log_level.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/asprintf.cpp [moved from compiler-rt/test/asan/TestCases/Posix/asprintf.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/assign_large_valloc_to_global.cpp [moved from compiler-rt/test/asan/TestCases/Posix/assign_large_valloc_to_global.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/bcmp_test.cpp [moved from compiler-rt/test/asan/TestCases/Posix/bcmp_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/closed-fds.cpp [moved from compiler-rt/test/asan/TestCases/Posix/closed-fds.cc with 93% similarity]
compiler-rt/test/asan/TestCases/Posix/concurrent_overflow.cpp [moved from compiler-rt/test/asan/TestCases/Posix/concurrent_overflow.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/coverage-fork.cpp [moved from compiler-rt/test/asan/TestCases/Posix/coverage-fork.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/coverage-module-unloaded.cpp [moved from compiler-rt/test/asan/TestCases/Posix/coverage-module-unloaded.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/coverage-reset.cpp [moved from compiler-rt/test/asan/TestCases/Posix/coverage-reset.cc with 71% similarity]
compiler-rt/test/asan/TestCases/Posix/coverage.cpp [moved from compiler-rt/test/asan/TestCases/Posix/coverage.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/current_allocated_bytes.cpp [moved from compiler-rt/test/asan/TestCases/Posix/current_allocated_bytes.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/deep_call_stack.cpp [moved from compiler-rt/test/asan/TestCases/Posix/deep_call_stack.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/deep_thread_stack.cpp [moved from compiler-rt/test/asan/TestCases/Posix/deep_thread_stack.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/dlclose-test.cpp [moved from compiler-rt/test/asan/TestCases/Posix/dlclose-test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/fgets_fputs.cpp [moved from compiler-rt/test/asan/TestCases/Posix/fgets_fputs.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/fread_fwrite.cpp [moved from compiler-rt/test/asan/TestCases/Posix/fread_fwrite.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/free_hook_realloc.cpp [moved from compiler-rt/test/asan/TestCases/Posix/free_hook_realloc.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/freopen.cpp [moved from compiler-rt/test/asan/TestCases/Posix/freopen.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/gc-test.cpp [moved from compiler-rt/test/asan/TestCases/Posix/gc-test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/glob.cpp [moved from compiler-rt/test/asan/TestCases/Posix/glob.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/halt_on_error-torture.cpp [moved from compiler-rt/test/asan/TestCases/Posix/halt_on_error-torture.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/halt_on_error_suppress_equal_pcs.cpp [moved from compiler-rt/test/asan/TestCases/Posix/halt_on_error_suppress_equal_pcs.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/handle_abort_on_error.cpp [moved from compiler-rt/test/asan/TestCases/Posix/handle_abort_on_error.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/init-order-pthread-create.cpp [moved from compiler-rt/test/asan/TestCases/Posix/init-order-pthread-create.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/interception-in-shared-lib-test.cpp [moved from compiler-rt/test/asan/TestCases/Posix/interception-in-shared-lib-test.cc with 97% similarity]
compiler-rt/test/asan/TestCases/Posix/invalid-pointer-pairs-threads.cpp [moved from compiler-rt/test/asan/TestCases/Posix/invalid-pointer-pairs-threads.cc with 98% similarity]
compiler-rt/test/asan/TestCases/Posix/ioctl.cpp [moved from compiler-rt/test/asan/TestCases/Posix/ioctl.cc with 93% similarity]
compiler-rt/test/asan/TestCases/Posix/large_allocator_unpoisons_on_free.cpp [moved from compiler-rt/test/asan/TestCases/Posix/large_allocator_unpoisons_on_free.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/lto-constmerge-odr.cpp [moved from compiler-rt/test/asan/TestCases/Posix/lto-constmerge-odr.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/mmap_limit_mb.cpp [moved from compiler-rt/test/asan/TestCases/Posix/mmap_limit_mb.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/new_array_cookie_test.cpp [moved from compiler-rt/test/asan/TestCases/Posix/new_array_cookie_test.cc with 91% similarity]
compiler-rt/test/asan/TestCases/Posix/new_array_cookie_uaf_test.cpp [moved from compiler-rt/test/asan/TestCases/Posix/new_array_cookie_uaf_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/new_array_cookie_with_new_from_class.cpp [moved from compiler-rt/test/asan/TestCases/Posix/new_array_cookie_with_new_from_class.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/no-fd.cpp [moved from compiler-rt/test/asan/TestCases/Posix/no-fd.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/print_cmdline.cpp [moved from compiler-rt/test/asan/TestCases/Posix/print_cmdline.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/readv.cpp [moved from compiler-rt/test/asan/TestCases/Posix/readv.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/shared-lib-test.cpp [moved from compiler-rt/test/asan/TestCases/Posix/shared-lib-test.cc with 95% similarity]
compiler-rt/test/asan/TestCases/Posix/stack-overflow.cpp [moved from compiler-rt/test/asan/TestCases/Posix/stack-overflow.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/stack-use-after-return.cpp [moved from compiler-rt/test/asan/TestCases/Posix/stack-use-after-return.cc with 96% similarity]
compiler-rt/test/asan/TestCases/Posix/start-deactivated.cpp [moved from compiler-rt/test/asan/TestCases/Posix/start-deactivated.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/strerror_r_test.cpp [moved from compiler-rt/test/asan/TestCases/Posix/strerror_r_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/strndup_oob_test.cpp [moved from compiler-rt/test/asan/TestCases/Posix/strndup_oob_test.cc with 83% similarity]
compiler-rt/test/asan/TestCases/Posix/strndup_oob_test2.cpp [moved from compiler-rt/test/asan/TestCases/Posix/strndup_oob_test2.cc with 92% similarity]
compiler-rt/test/asan/TestCases/Posix/tsd_dtor_leak.cpp [moved from compiler-rt/test/asan/TestCases/Posix/tsd_dtor_leak.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Posix/wait.cpp [moved from compiler-rt/test/asan/TestCases/Posix/wait.cc with 96% similarity]
compiler-rt/test/asan/TestCases/Posix/wait3.cpp [moved from compiler-rt/test/asan/TestCases/Posix/wait3.cc with 96% similarity]
compiler-rt/test/asan/TestCases/Posix/wait4.cpp [moved from compiler-rt/test/asan/TestCases/Posix/wait4.cc with 97% similarity]
compiler-rt/test/asan/TestCases/Posix/waitid.cpp [moved from compiler-rt/test/asan/TestCases/Posix/waitid.cc with 94% similarity]
compiler-rt/test/asan/TestCases/Windows/aligned_mallocs.cpp [moved from compiler-rt/test/asan/TestCases/Windows/aligned_mallocs.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/allocators_sanity.cpp [moved from compiler-rt/test/asan/TestCases/Windows/allocators_sanity.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/beginthreadex.cpp [moved from compiler-rt/test/asan/TestCases/Windows/beginthreadex.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/bind_io_completion_callback.cpp [moved from compiler-rt/test/asan/TestCases/Windows/bind_io_completion_callback.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/bitfield.cpp [moved from compiler-rt/test/asan/TestCases/Windows/bitfield.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/bitfield_uaf.cpp [moved from compiler-rt/test/asan/TestCases/Windows/bitfield_uaf.cc with 79% similarity]
compiler-rt/test/asan/TestCases/Windows/calloc_left_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/calloc_left_oob.cc with 78% similarity]
compiler-rt/test/asan/TestCases/Windows/calloc_right_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/calloc_right_oob.cc with 78% similarity]
compiler-rt/test/asan/TestCases/Windows/calloc_uaf.cpp [moved from compiler-rt/test/asan/TestCases/Windows/calloc_uaf.cc with 75% similarity]
compiler-rt/test/asan/TestCases/Windows/coverage-basic.cpp [moved from compiler-rt/test/asan/TestCases/Windows/coverage-basic.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/coverage-dll-stdio.cpp [moved from compiler-rt/test/asan/TestCases/Windows/coverage-dll-stdio.cc with 94% similarity]
compiler-rt/test/asan/TestCases/Windows/crash_read_write.cpp [moved from compiler-rt/test/asan/TestCases/Windows/crash_read_write.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/crt_initializers.cpp [moved from compiler-rt/test/asan/TestCases/Windows/crt_initializers.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/delay_dbghelp.cpp [moved from compiler-rt/test/asan/TestCases/Windows/delay_dbghelp.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/demangled_names.cpp [moved from compiler-rt/test/asan/TestCases/Windows/demangled_names.cc with 81% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_aligned_mallocs.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_aligned_mallocs.cc with 93% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_allocators_sanity.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_allocators_sanity.cc with 92% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_and_lib.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_and_lib.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_cerr.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_cerr.cc with 93% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_control_c.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_control_c.cc with 98% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_global_dead_strip.c
compiler-rt/test/asan/TestCases/Windows/dll_heap_allocation.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_heap_allocation.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_host.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_host.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_intercept_memchr.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_intercept_memchr.cc with 83% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy.cc with 83% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc with 93% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_intercept_memset.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_intercept_memset.cc with 83% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_intercept_strlen.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_intercept_strlen.cc with 79% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_large_function.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_large_function.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_malloc_left_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_malloc_left_oob.cc with 66% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_malloc_uaf.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_malloc_uaf.cc with 73% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_noreturn.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_noreturn.cc with 71% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_null_deref.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_null_deref.cc with 77% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_operator_array_new_left_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_operator_array_new_left_oob.cc with 83% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_operator_array_new_with_dtor_left_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_operator_array_new_with_dtor_left_oob.cc with 85% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_poison_unpoison.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_poison_unpoison.cc with 78% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_report_globals_symbolization_at_startup.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_report_globals_symbolization_at_startup.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_seh.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_seh.cc with 96% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_stack_use_after_return.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_stack_use_after_return.cc with 76% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_thread_stack_array_left_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_thread_stack_array_left_oob.cc with 89% similarity]
compiler-rt/test/asan/TestCases/Windows/dll_unload.cpp [moved from compiler-rt/test/asan/TestCases/Windows/dll_unload.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/double_free.cpp [moved from compiler-rt/test/asan/TestCases/Windows/double_free.cc with 74% similarity]
compiler-rt/test/asan/TestCases/Windows/double_operator_delete.cpp [moved from compiler-rt/test/asan/TestCases/Windows/double_operator_delete.cc with 76% similarity]
compiler-rt/test/asan/TestCases/Windows/free_hook_realloc.cpp [moved from compiler-rt/test/asan/TestCases/Windows/free_hook_realloc.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/fuse-lld-globals.cpp [moved from compiler-rt/test/asan/TestCases/Windows/fuse-lld-globals.cc with 87% similarity]
compiler-rt/test/asan/TestCases/Windows/fuse-lld.cpp [moved from compiler-rt/test/asan/TestCases/Windows/fuse-lld.cc with 79% similarity]
compiler-rt/test/asan/TestCases/Windows/global_const_string.cpp [moved from compiler-rt/test/asan/TestCases/Windows/global_const_string.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/global_const_string_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/global_const_string_oob.cc with 75% similarity]
compiler-rt/test/asan/TestCases/Windows/heapalloc.cpp [moved from compiler-rt/test/asan/TestCases/Windows/heapalloc.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/heapalloc_dll_double_free.cpp [moved from compiler-rt/test/asan/TestCases/Windows/heapalloc_dll_double_free.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/heapalloc_dll_unload_realloc_uaf.cpp [moved from compiler-rt/test/asan/TestCases/Windows/heapalloc_dll_unload_realloc_uaf.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/heapalloc_doublefree.cpp [moved from compiler-rt/test/asan/TestCases/Windows/heapalloc_doublefree.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/heapalloc_flags_fallback.cpp [moved from compiler-rt/test/asan/TestCases/Windows/heapalloc_flags_fallback.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/heapalloc_huge.cpp [moved from compiler-rt/test/asan/TestCases/Windows/heapalloc_huge.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/heapalloc_rtl_transfer.cpp [moved from compiler-rt/test/asan/TestCases/Windows/heapalloc_rtl_transfer.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/heapalloc_sanity.cpp [moved from compiler-rt/test/asan/TestCases/Windows/heapalloc_sanity.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/heapalloc_transfer.cpp [moved from compiler-rt/test/asan/TestCases/Windows/heapalloc_transfer.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/heapalloc_uaf.cpp [moved from compiler-rt/test/asan/TestCases/Windows/heapalloc_uaf.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/heapalloc_zero_size.cpp [moved from compiler-rt/test/asan/TestCases/Windows/heapalloc_zero_size.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/heaprealloc.cpp [moved from compiler-rt/test/asan/TestCases/Windows/heaprealloc.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/heaprealloc_alloc_zero.cpp [moved from compiler-rt/test/asan/TestCases/Windows/heaprealloc_alloc_zero.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/heaprealloc_zero_size.cpp [moved from compiler-rt/test/asan/TestCases/Windows/heaprealloc_zero_size.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/hello_world.cpp [moved from compiler-rt/test/asan/TestCases/Windows/hello_world.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/intercept_memcpy.cpp [moved from compiler-rt/test/asan/TestCases/Windows/intercept_memcpy.cc with 93% similarity]
compiler-rt/test/asan/TestCases/Windows/intercept_strdup.cpp [moved from compiler-rt/test/asan/TestCases/Windows/intercept_strdup.cc with 85% similarity]
compiler-rt/test/asan/TestCases/Windows/intercept_strlen.cpp [moved from compiler-rt/test/asan/TestCases/Windows/intercept_strlen.cc with 87% similarity]
compiler-rt/test/asan/TestCases/Windows/interface_symbols_windows.cpp [moved from compiler-rt/test/asan/TestCases/Windows/interface_symbols_windows.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/iostream_sbo.cpp [moved from compiler-rt/test/asan/TestCases/Windows/iostream_sbo.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/longjmp.cpp [moved from compiler-rt/test/asan/TestCases/Windows/longjmp.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/malloc_left_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/malloc_left_oob.cc with 77% similarity]
compiler-rt/test/asan/TestCases/Windows/malloc_right_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/malloc_right_oob.cc with 77% similarity]
compiler-rt/test/asan/TestCases/Windows/malloc_uaf.cpp [moved from compiler-rt/test/asan/TestCases/Windows/malloc_uaf.cc with 74% similarity]
compiler-rt/test/asan/TestCases/Windows/null_deref.cpp [moved from compiler-rt/test/asan/TestCases/Windows/null_deref.cc with 87% similarity]
compiler-rt/test/asan/TestCases/Windows/null_deref_multiple_dlls.cpp [moved from compiler-rt/test/asan/TestCases/Windows/null_deref_multiple_dlls.cc with 92% similarity]
compiler-rt/test/asan/TestCases/Windows/oom.cpp [moved from compiler-rt/test/asan/TestCases/Windows/oom.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/operator_array_new_left_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/operator_array_new_left_oob.cc with 76% similarity]
compiler-rt/test/asan/TestCases/Windows/operator_array_new_right_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/operator_array_new_right_oob.cc with 77% similarity]
compiler-rt/test/asan/TestCases/Windows/operator_array_new_uaf.cpp [moved from compiler-rt/test/asan/TestCases/Windows/operator_array_new_uaf.cc with 76% similarity]
compiler-rt/test/asan/TestCases/Windows/operator_array_new_with_dtor_left_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/operator_array_new_with_dtor_left_oob.cc with 95% similarity]
compiler-rt/test/asan/TestCases/Windows/operator_delete_wrong_argument.cpp [moved from compiler-rt/test/asan/TestCases/Windows/operator_delete_wrong_argument.cc with 78% similarity]
compiler-rt/test/asan/TestCases/Windows/operator_new_left_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/operator_new_left_oob.cc with 76% similarity]
compiler-rt/test/asan/TestCases/Windows/operator_new_right_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/operator_new_right_oob.cc with 76% similarity]
compiler-rt/test/asan/TestCases/Windows/operator_new_uaf.cpp [moved from compiler-rt/test/asan/TestCases/Windows/operator_new_uaf.cc with 74% similarity]
compiler-rt/test/asan/TestCases/Windows/queue_user_work_item.cpp [moved from compiler-rt/test/asan/TestCases/Windows/queue_user_work_item.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/queue_user_work_item_report.cpp [moved from compiler-rt/test/asan/TestCases/Windows/queue_user_work_item_report.cc with 89% similarity]
compiler-rt/test/asan/TestCases/Windows/realloc_left_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/realloc_left_oob.cc with 77% similarity]
compiler-rt/test/asan/TestCases/Windows/realloc_right_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/realloc_right_oob.cc with 77% similarity]
compiler-rt/test/asan/TestCases/Windows/realloc_uaf.cpp [moved from compiler-rt/test/asan/TestCases/Windows/realloc_uaf.cc with 74% similarity]
compiler-rt/test/asan/TestCases/Windows/recalloc_sanity.cpp [moved from compiler-rt/test/asan/TestCases/Windows/recalloc_sanity.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/report_after_syminitialize.cpp [moved from compiler-rt/test/asan/TestCases/Windows/report_after_syminitialize.cc with 91% similarity]
compiler-rt/test/asan/TestCases/Windows/report_globals_reload_dll.cpp [moved from compiler-rt/test/asan/TestCases/Windows/report_globals_reload_dll.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/report_globals_vs_freelibrary.cpp [moved from compiler-rt/test/asan/TestCases/Windows/report_globals_vs_freelibrary.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/rtlallocateheap.cpp [moved from compiler-rt/test/asan/TestCases/Windows/rtlallocateheap.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_double_free.cpp [moved from compiler-rt/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_double_free.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_realloc.cpp [moved from compiler-rt/test/asan/TestCases/Windows/rtlallocateheap_dll_unload_realloc.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/rtlallocateheap_flags_fallback.cpp [moved from compiler-rt/test/asan/TestCases/Windows/rtlallocateheap_flags_fallback.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/rtlallocateheap_zero.cpp [moved from compiler-rt/test/asan/TestCases/Windows/rtlallocateheap_zero.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/seh.cpp [moved from compiler-rt/test/asan/TestCases/Windows/seh.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/shadow_conflict_32.cpp [moved from compiler-rt/test/asan/TestCases/Windows/shadow_conflict_32.cc with 97% similarity]
compiler-rt/test/asan/TestCases/Windows/shadow_mapping_failure.cpp [moved from compiler-rt/test/asan/TestCases/Windows/shadow_mapping_failure.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/stack_array_left_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/stack_array_left_oob.cc with 79% similarity]
compiler-rt/test/asan/TestCases/Windows/stack_array_right_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/stack_array_right_oob.cc with 79% similarity]
compiler-rt/test/asan/TestCases/Windows/stack_array_sanity.cpp [moved from compiler-rt/test/asan/TestCases/Windows/stack_array_sanity.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/stack_use_after_return.cpp [moved from compiler-rt/test/asan/TestCases/Windows/stack_use_after_return.cc with 78% similarity]
compiler-rt/test/asan/TestCases/Windows/symbols_path.cpp [moved from compiler-rt/test/asan/TestCases/Windows/symbols_path.cc with 84% similarity]
compiler-rt/test/asan/TestCases/Windows/thread_simple.cpp [moved from compiler-rt/test/asan/TestCases/Windows/thread_simple.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/thread_stack_array_left_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/thread_stack_array_left_oob.cc with 82% similarity]
compiler-rt/test/asan/TestCases/Windows/thread_stack_array_right_oob.cpp [moved from compiler-rt/test/asan/TestCases/Windows/thread_stack_array_right_oob.cc with 82% similarity]
compiler-rt/test/asan/TestCases/Windows/thread_stack_reuse.cpp [moved from compiler-rt/test/asan/TestCases/Windows/thread_stack_reuse.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/thread_stress.cpp [moved from compiler-rt/test/asan/TestCases/Windows/thread_stress.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/thread_suspended.cpp [moved from compiler-rt/test/asan/TestCases/Windows/thread_suspended.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/tls_init.cpp [moved from compiler-rt/test/asan/TestCases/Windows/tls_init.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/unsymbolized.cpp [moved from compiler-rt/test/asan/TestCases/Windows/unsymbolized.cc with 78% similarity]
compiler-rt/test/asan/TestCases/Windows/use_after_realloc.cpp [moved from compiler-rt/test/asan/TestCases/Windows/use_after_realloc.cc with 76% similarity]
compiler-rt/test/asan/TestCases/Windows/use_after_return_linkage.cpp [moved from compiler-rt/test/asan/TestCases/Windows/use_after_return_linkage.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/user-exception.cpp [moved from compiler-rt/test/asan/TestCases/Windows/user-exception.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/windows_h.cpp [moved from compiler-rt/test/asan/TestCases/Windows/windows_h.cc with 100% similarity]
compiler-rt/test/asan/TestCases/Windows/wrong_downcast_on_heap.cpp [moved from compiler-rt/test/asan/TestCases/Windows/wrong_downcast_on_heap.cc with 87% similarity]
compiler-rt/test/asan/TestCases/Windows/wrong_downcast_on_stack.cpp [moved from compiler-rt/test/asan/TestCases/Windows/wrong_downcast_on_stack.cc with 97% similarity]
compiler-rt/test/asan/TestCases/alloca_big_alignment.cpp [moved from compiler-rt/test/asan/TestCases/alloca_big_alignment.cc with 100% similarity]
compiler-rt/test/asan/TestCases/alloca_constant_size.cpp [moved from compiler-rt/test/asan/TestCases/alloca_constant_size.cc with 100% similarity]
compiler-rt/test/asan/TestCases/alloca_detect_custom_size_.cpp [moved from compiler-rt/test/asan/TestCases/alloca_detect_custom_size_.cc with 100% similarity]
compiler-rt/test/asan/TestCases/alloca_instruments_all_paddings.cpp [moved from compiler-rt/test/asan/TestCases/alloca_instruments_all_paddings.cc with 100% similarity]
compiler-rt/test/asan/TestCases/alloca_loop_unpoisoning.cpp [moved from compiler-rt/test/asan/TestCases/alloca_loop_unpoisoning.cc with 100% similarity]
compiler-rt/test/asan/TestCases/alloca_overflow_partial.cpp [moved from compiler-rt/test/asan/TestCases/alloca_overflow_partial.cc with 100% similarity]
compiler-rt/test/asan/TestCases/alloca_overflow_right.cpp [moved from compiler-rt/test/asan/TestCases/alloca_overflow_right.cc with 100% similarity]
compiler-rt/test/asan/TestCases/alloca_safe_access.cpp [moved from compiler-rt/test/asan/TestCases/alloca_safe_access.cc with 100% similarity]
compiler-rt/test/asan/TestCases/alloca_underflow_left.cpp [moved from compiler-rt/test/asan/TestCases/alloca_underflow_left.cc with 100% similarity]
compiler-rt/test/asan/TestCases/alloca_vla_interact.cpp [moved from compiler-rt/test/asan/TestCases/alloca_vla_interact.cc with 100% similarity]
compiler-rt/test/asan/TestCases/asan_and_llvm_coverage_test.cpp [moved from compiler-rt/test/asan/TestCases/asan_and_llvm_coverage_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/asan_options-help.cpp [moved from compiler-rt/test/asan/TestCases/asan_options-help.cc with 100% similarity]
compiler-rt/test/asan/TestCases/atexit_stats.cpp [moved from compiler-rt/test/asan/TestCases/atexit_stats.cc with 100% similarity]
compiler-rt/test/asan/TestCases/blacklist.cpp [moved from compiler-rt/test/asan/TestCases/blacklist.cc with 73% similarity]
compiler-rt/test/asan/TestCases/calloc-overflow.cpp [moved from compiler-rt/test/asan/TestCases/calloc-overflow.cc with 90% similarity]
compiler-rt/test/asan/TestCases/contiguous_container.cpp [moved from compiler-rt/test/asan/TestCases/contiguous_container.cc with 100% similarity]
compiler-rt/test/asan/TestCases/contiguous_container_crash.cpp [moved from compiler-rt/test/asan/TestCases/contiguous_container_crash.cc with 100% similarity]
compiler-rt/test/asan/TestCases/coverage-and-lsan.cpp [moved from compiler-rt/test/asan/TestCases/coverage-and-lsan.cc with 100% similarity]
compiler-rt/test/asan/TestCases/coverage-disabled.cpp [moved from compiler-rt/test/asan/TestCases/coverage-disabled.cc with 100% similarity]
compiler-rt/test/asan/TestCases/coverage-trace-pc.cpp [moved from compiler-rt/test/asan/TestCases/coverage-trace-pc.cc with 100% similarity]
compiler-rt/test/asan/TestCases/debug_double_free.cpp [moved from compiler-rt/test/asan/TestCases/debug_double_free.cc with 100% similarity]
compiler-rt/test/asan/TestCases/debug_locate.cpp [moved from compiler-rt/test/asan/TestCases/debug_locate.cc with 100% similarity]
compiler-rt/test/asan/TestCases/debug_mapping.cpp [moved from compiler-rt/test/asan/TestCases/debug_mapping.cc with 100% similarity]
compiler-rt/test/asan/TestCases/debug_ppc64_mapping.cpp [moved from compiler-rt/test/asan/TestCases/debug_ppc64_mapping.cc with 100% similarity]
compiler-rt/test/asan/TestCases/debug_report.cpp [moved from compiler-rt/test/asan/TestCases/debug_report.cc with 100% similarity]
compiler-rt/test/asan/TestCases/debug_stacks.cpp [moved from compiler-rt/test/asan/TestCases/debug_stacks.cc with 100% similarity]
compiler-rt/test/asan/TestCases/deep_stack_uaf.cpp [moved from compiler-rt/test/asan/TestCases/deep_stack_uaf.cc with 100% similarity]
compiler-rt/test/asan/TestCases/deep_tail_call.cpp [moved from compiler-rt/test/asan/TestCases/deep_tail_call.cc with 100% similarity]
compiler-rt/test/asan/TestCases/default_blacklist.cpp [moved from compiler-rt/test/asan/TestCases/default_blacklist.cc with 100% similarity]
compiler-rt/test/asan/TestCases/default_options.cpp [moved from compiler-rt/test/asan/TestCases/default_options.cc with 100% similarity]
compiler-rt/test/asan/TestCases/describe_address.cpp [moved from compiler-rt/test/asan/TestCases/describe_address.cc with 100% similarity]
compiler-rt/test/asan/TestCases/double-free.cpp [moved from compiler-rt/test/asan/TestCases/double-free.cc with 86% similarity]
compiler-rt/test/asan/TestCases/error_report_callback.cpp [moved from compiler-rt/test/asan/TestCases/error_report_callback.cc with 100% similarity]
compiler-rt/test/asan/TestCases/exitcode.cpp [moved from compiler-rt/test/asan/TestCases/exitcode.cc with 100% similarity]
compiler-rt/test/asan/TestCases/force_inline_opt0.cpp [moved from compiler-rt/test/asan/TestCases/force_inline_opt0.cc with 100% similarity]
compiler-rt/test/asan/TestCases/frexp_interceptor.cpp [moved from compiler-rt/test/asan/TestCases/frexp_interceptor.cc with 100% similarity]
compiler-rt/test/asan/TestCases/global-demangle.cpp [moved from compiler-rt/test/asan/TestCases/global-demangle.cc with 100% similarity]
compiler-rt/test/asan/TestCases/global-location.cpp [moved from compiler-rt/test/asan/TestCases/global-location.cc with 76% similarity]
compiler-rt/test/asan/TestCases/global-overflow.cpp [moved from compiler-rt/test/asan/TestCases/global-overflow.cc with 91% similarity]
compiler-rt/test/asan/TestCases/global-underflow.cc [deleted file]
compiler-rt/test/asan/TestCases/global-underflow.cpp [new file with mode: 0644]
compiler-rt/test/asan/TestCases/handle_noreturn_bug.cpp [moved from compiler-rt/test/asan/TestCases/handle_noreturn_bug.cc with 100% similarity]
compiler-rt/test/asan/TestCases/heap-overflow-large.cpp [moved from compiler-rt/test/asan/TestCases/heap-overflow-large.cc with 100% similarity]
compiler-rt/test/asan/TestCases/heap-overflow.cpp [moved from compiler-rt/test/asan/TestCases/heap-overflow.cc with 92% similarity]
compiler-rt/test/asan/TestCases/heavy_uar_test.cpp [moved from compiler-rt/test/asan/TestCases/heavy_uar_test.cc with 97% similarity]
compiler-rt/test/asan/TestCases/huge_negative_hea_oob.cpp [moved from compiler-rt/test/asan/TestCases/huge_negative_hea_oob.cc with 100% similarity]
compiler-rt/test/asan/TestCases/ill.cpp [moved from compiler-rt/test/asan/TestCases/ill.cc with 100% similarity]
compiler-rt/test/asan/TestCases/init-order-atexit.cpp [moved from compiler-rt/test/asan/TestCases/init-order-atexit.cc with 98% similarity]
compiler-rt/test/asan/TestCases/initialization-blacklist.cpp [moved from compiler-rt/test/asan/TestCases/initialization-blacklist.cc with 83% similarity]
compiler-rt/test/asan/TestCases/initialization-bug.cpp [moved from compiler-rt/test/asan/TestCases/initialization-bug.cc with 97% similarity]
compiler-rt/test/asan/TestCases/initialization-constexpr.cpp [moved from compiler-rt/test/asan/TestCases/initialization-constexpr.cc with 90% similarity]
compiler-rt/test/asan/TestCases/initialization-nobug.cpp [moved from compiler-rt/test/asan/TestCases/initialization-nobug.cc with 96% similarity]
compiler-rt/test/asan/TestCases/inline.cpp [moved from compiler-rt/test/asan/TestCases/inline.cc with 100% similarity]
compiler-rt/test/asan/TestCases/intercept-rethrow-exception.cpp [moved from compiler-rt/test/asan/TestCases/intercept-rethrow-exception.cc with 100% similarity]
compiler-rt/test/asan/TestCases/interception_failure_test.cpp [moved from compiler-rt/test/asan/TestCases/interception_failure_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/interface_test.cpp [moved from compiler-rt/test/asan/TestCases/interface_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/intra-object-overflow.cpp [moved from compiler-rt/test/asan/TestCases/intra-object-overflow.cc with 85% similarity]
compiler-rt/test/asan/TestCases/invalid-free.cpp [moved from compiler-rt/test/asan/TestCases/invalid-free.cc with 89% similarity]
compiler-rt/test/asan/TestCases/invalid-pointer-pairs-compare-errors.cpp [moved from compiler-rt/test/asan/TestCases/invalid-pointer-pairs-compare-errors.cc with 87% similarity]
compiler-rt/test/asan/TestCases/invalid-pointer-pairs-compare-null.cpp [moved from compiler-rt/test/asan/TestCases/invalid-pointer-pairs-compare-null.cc with 100% similarity]
compiler-rt/test/asan/TestCases/invalid-pointer-pairs-compare-success.cpp [moved from compiler-rt/test/asan/TestCases/invalid-pointer-pairs-compare-success.cc with 100% similarity]
compiler-rt/test/asan/TestCases/invalid-pointer-pairs-subtract-errors.cpp [moved from compiler-rt/test/asan/TestCases/invalid-pointer-pairs-subtract-errors.cc with 88% similarity]
compiler-rt/test/asan/TestCases/invalid-pointer-pairs-subtract-success.cpp [moved from compiler-rt/test/asan/TestCases/invalid-pointer-pairs-subtract-success.cc with 100% similarity]
compiler-rt/test/asan/TestCases/invalid-pointer-pairs.cpp [moved from compiler-rt/test/asan/TestCases/invalid-pointer-pairs.cc with 88% similarity]
compiler-rt/test/asan/TestCases/large_func_test.cpp [moved from compiler-rt/test/asan/TestCases/large_func_test.cc with 89% similarity]
compiler-rt/test/asan/TestCases/log-path_test.cpp [moved from compiler-rt/test/asan/TestCases/log-path_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/longjmp.cpp [moved from compiler-rt/test/asan/TestCases/longjmp.cc with 100% similarity]
compiler-rt/test/asan/TestCases/lsan_annotations.cpp [moved from compiler-rt/test/asan/TestCases/lsan_annotations.cc with 100% similarity]
compiler-rt/test/asan/TestCases/malloc-size-too-big.cpp [moved from compiler-rt/test/asan/TestCases/malloc-size-too-big.cc with 92% similarity]
compiler-rt/test/asan/TestCases/malloc_context_size.cpp [moved from compiler-rt/test/asan/TestCases/malloc_context_size.cc with 94% similarity]
compiler-rt/test/asan/TestCases/malloc_fill.cpp [moved from compiler-rt/test/asan/TestCases/malloc_fill.cc with 100% similarity]
compiler-rt/test/asan/TestCases/max_redzone.cpp [moved from compiler-rt/test/asan/TestCases/max_redzone.cc with 100% similarity]
compiler-rt/test/asan/TestCases/memcmp_strict_test.cpp [moved from compiler-rt/test/asan/TestCases/memcmp_strict_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/memcmp_test.cpp [moved from compiler-rt/test/asan/TestCases/memcmp_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/memset_test.cpp [moved from compiler-rt/test/asan/TestCases/memset_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/null_deref.cpp [moved from compiler-rt/test/asan/TestCases/null_deref.cc with 88% similarity]
compiler-rt/test/asan/TestCases/on_error_callback.cpp [moved from compiler-rt/test/asan/TestCases/on_error_callback.cc with 100% similarity]
compiler-rt/test/asan/TestCases/partial_right.cpp [moved from compiler-rt/test/asan/TestCases/partial_right.cc with 100% similarity]
compiler-rt/test/asan/TestCases/pass-object-byval.cpp [moved from compiler-rt/test/asan/TestCases/pass-object-byval.cc with 100% similarity]
compiler-rt/test/asan/TestCases/pass-struct-byval-uar.cpp [moved from compiler-rt/test/asan/TestCases/pass-struct-byval-uar.cc with 100% similarity]
compiler-rt/test/asan/TestCases/pass-struct-byval.cpp [moved from compiler-rt/test/asan/TestCases/pass-struct-byval.cc with 100% similarity]
compiler-rt/test/asan/TestCases/poison_partial.cpp [moved from compiler-rt/test/asan/TestCases/poison_partial.cc with 100% similarity]
compiler-rt/test/asan/TestCases/pr33372.cpp [moved from compiler-rt/test/asan/TestCases/pr33372.cc with 100% similarity]
compiler-rt/test/asan/TestCases/print_summary.cpp [moved from compiler-rt/test/asan/TestCases/print_summary.cc with 94% similarity]
compiler-rt/test/asan/TestCases/realloc.cpp [moved from compiler-rt/test/asan/TestCases/realloc.cc with 100% similarity]
compiler-rt/test/asan/TestCases/scariness_score_test.cpp [moved from compiler-rt/test/asan/TestCases/scariness_score_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/small_memcpy_test.cpp [moved from compiler-rt/test/asan/TestCases/small_memcpy_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/speculative_load.cpp [moved from compiler-rt/test/asan/TestCases/speculative_load.cc with 100% similarity]
compiler-rt/test/asan/TestCases/speculative_load2.cpp [moved from compiler-rt/test/asan/TestCases/speculative_load2.cc with 100% similarity]
compiler-rt/test/asan/TestCases/stack-buffer-overflow-with-position.cpp [moved from compiler-rt/test/asan/TestCases/stack-buffer-overflow-with-position.cc with 100% similarity]
compiler-rt/test/asan/TestCases/stack-buffer-overflow.cpp [moved from compiler-rt/test/asan/TestCases/stack-buffer-overflow.cc with 79% similarity]
compiler-rt/test/asan/TestCases/stack-frame-demangle.cpp [moved from compiler-rt/test/asan/TestCases/stack-frame-demangle.cc with 100% similarity]
compiler-rt/test/asan/TestCases/stack-oob-frames.cpp [moved from compiler-rt/test/asan/TestCases/stack-oob-frames.cc with 100% similarity]
compiler-rt/test/asan/TestCases/strcat-overlap.cpp [moved from compiler-rt/test/asan/TestCases/strcat-overlap.cc with 93% similarity]
compiler-rt/test/asan/TestCases/strcpy-overlap.cpp [moved from compiler-rt/test/asan/TestCases/strcpy-overlap.cc with 92% similarity]
compiler-rt/test/asan/TestCases/strdup_oob_test.cpp [moved from compiler-rt/test/asan/TestCases/strdup_oob_test.cc with 85% similarity]
compiler-rt/test/asan/TestCases/strncat-overlap.cpp [moved from compiler-rt/test/asan/TestCases/strncat-overlap.cc with 92% similarity]
compiler-rt/test/asan/TestCases/strncpy-overflow.cpp [moved from compiler-rt/test/asan/TestCases/strncpy-overflow.cc with 83% similarity]
compiler-rt/test/asan/TestCases/strncpy-overlap.cpp [moved from compiler-rt/test/asan/TestCases/strncpy-overlap.cc with 92% similarity]
compiler-rt/test/asan/TestCases/suppressions-exec-relative-location.cpp [moved from compiler-rt/test/asan/TestCases/suppressions-exec-relative-location.cc with 100% similarity]
compiler-rt/test/asan/TestCases/suppressions-function.cpp [moved from compiler-rt/test/asan/TestCases/suppressions-function.cc with 100% similarity]
compiler-rt/test/asan/TestCases/suppressions-interceptor.cpp [moved from compiler-rt/test/asan/TestCases/suppressions-interceptor.cc with 100% similarity]
compiler-rt/test/asan/TestCases/suppressions-library.cpp [moved from compiler-rt/test/asan/TestCases/suppressions-library.cc with 100% similarity]
compiler-rt/test/asan/TestCases/throw_call_test.cpp [moved from compiler-rt/test/asan/TestCases/throw_call_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/throw_catch.cpp [moved from compiler-rt/test/asan/TestCases/throw_catch.cc with 100% similarity]
compiler-rt/test/asan/TestCases/throw_invoke_test.cpp [moved from compiler-rt/test/asan/TestCases/throw_invoke_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/time_interceptor.cpp [moved from compiler-rt/test/asan/TestCases/time_interceptor.cc with 100% similarity]
compiler-rt/test/asan/TestCases/uar_and_exceptions.cpp [moved from compiler-rt/test/asan/TestCases/uar_and_exceptions.cc with 100% similarity]
compiler-rt/test/asan/TestCases/unaligned_loads_and_stores.cpp [moved from compiler-rt/test/asan/TestCases/unaligned_loads_and_stores.cc with 73% similarity]
compiler-rt/test/asan/TestCases/use-after-delete.cpp [moved from compiler-rt/test/asan/TestCases/use-after-delete.cc with 84% similarity]
compiler-rt/test/asan/TestCases/use-after-free-right.cpp [moved from compiler-rt/test/asan/TestCases/use-after-free-right.cc with 90% similarity]
compiler-rt/test/asan/TestCases/use-after-free.cpp [moved from compiler-rt/test/asan/TestCases/use-after-free.cc with 77% similarity]
compiler-rt/test/asan/TestCases/use-after-poison.cpp [moved from compiler-rt/test/asan/TestCases/use-after-poison.cc with 90% similarity]
compiler-rt/test/asan/TestCases/use-after-scope-capture.cpp [moved from compiler-rt/test/asan/TestCases/use-after-scope-capture.cc with 82% similarity]
compiler-rt/test/asan/TestCases/use-after-scope-conversion.cpp [moved from compiler-rt/test/asan/TestCases/use-after-scope-conversion.cc with 100% similarity]
compiler-rt/test/asan/TestCases/use-after-scope-dtor-order.cpp [moved from compiler-rt/test/asan/TestCases/use-after-scope-dtor-order.cc with 89% similarity]
compiler-rt/test/asan/TestCases/use-after-scope-goto.cpp [moved from compiler-rt/test/asan/TestCases/use-after-scope-goto.cc with 100% similarity]
compiler-rt/test/asan/TestCases/use-after-scope-if.cpp [moved from compiler-rt/test/asan/TestCases/use-after-scope-if.cc with 83% similarity]
compiler-rt/test/asan/TestCases/use-after-scope-inlined.cpp [moved from compiler-rt/test/asan/TestCases/use-after-scope-inlined.cc with 93% similarity]
compiler-rt/test/asan/TestCases/use-after-scope-loop-bug.cpp [moved from compiler-rt/test/asan/TestCases/use-after-scope-loop-bug.cc with 97% similarity]
compiler-rt/test/asan/TestCases/use-after-scope-loop-removed.cpp [moved from compiler-rt/test/asan/TestCases/use-after-scope-loop-removed.cc with 96% similarity]
compiler-rt/test/asan/TestCases/use-after-scope-loop.cpp [moved from compiler-rt/test/asan/TestCases/use-after-scope-loop.cc with 84% similarity]
compiler-rt/test/asan/TestCases/use-after-scope-nobug.cpp [moved from compiler-rt/test/asan/TestCases/use-after-scope-nobug.cc with 100% similarity]
compiler-rt/test/asan/TestCases/use-after-scope-temp.cpp [moved from compiler-rt/test/asan/TestCases/use-after-scope-temp.cc with 84% similarity]
compiler-rt/test/asan/TestCases/use-after-scope-temp2.cpp [moved from compiler-rt/test/asan/TestCases/use-after-scope-temp2.cc with 84% similarity]
compiler-rt/test/asan/TestCases/use-after-scope-types.cpp [moved from compiler-rt/test/asan/TestCases/use-after-scope-types.cc with 98% similarity]
compiler-rt/test/asan/TestCases/use-after-scope.cpp [moved from compiler-rt/test/asan/TestCases/use-after-scope.cc with 88% similarity]
compiler-rt/test/asan/TestCases/verbose-log-path_test.cpp [moved from compiler-rt/test/asan/TestCases/verbose-log-path_test.cc with 100% similarity]
compiler-rt/test/asan/TestCases/vla_chrome_testcase.cpp [moved from compiler-rt/test/asan/TestCases/vla_chrome_testcase.cc with 100% similarity]
compiler-rt/test/asan/TestCases/vla_condition_overflow.cpp [moved from compiler-rt/test/asan/TestCases/vla_condition_overflow.cc with 100% similarity]
compiler-rt/test/asan/TestCases/vla_loop_overfow.cpp [moved from compiler-rt/test/asan/TestCases/vla_loop_overfow.cc with 100% similarity]
compiler-rt/test/asan/TestCases/zero_page_pc.cpp [moved from compiler-rt/test/asan/TestCases/zero_page_pc.cc with 100% similarity]
compiler-rt/test/lit.common.cfg.py

index f69d6b8..0b01ab5 100644 (file)
@@ -281,7 +281,7 @@ append_list_if(COMPILER_RT_HAS_FNO_LTO_FLAG -fno-lto SANITIZER_COMMON_CFLAGS)
 
 # The following is a workaround for powerpc64le. This is the only architecture
 # that requires -fno-function-sections to work properly. If lacking, the ASan
-# Linux test function-sections-are-bad.cc fails with the following error:
+# Linux test function-sections-are-bad.cpp fails with the following error:
 # 'undefined symbol: __sanitizer_unaligned_load32'.
 if(DEFINED TARGET_powerpc64le_CFLAGS)
   append_list_if(COMPILER_RT_HAS_FNO_FUNCTION_SECTIONS_FLAG -fno-function-sections TARGET_powerpc64le_CFLAGS)
index 1318727..47bba08 100644 (file)
@@ -531,7 +531,7 @@ TEST(AddressSanitizer, ManyStackObjectsTest) {
 #endif
 
 #if 0  // This test requires online symbolizer.
-// Moved to lit_tests/stack-oob-frames.cc.
+// Moved to lit_tests/stack-oob-frames.cpp.
 // Reenable here once we have online symbolizer by default.
 NOINLINE static void Frame0(int frame, char *a, char *b, char *c) {
   char d[4] = {0};
index ad90605..ed1cf01 100755 (executable)
@@ -85,7 +85,7 @@ run_lint ${ASAN_RTL_LINT_FILTER} ${ASAN_RTL}/*.cpp \
                                  ${ASAN_RTL}/*.h &
 run_lint ${ASAN_TEST_LINT_FILTER} ${ASAN_RTL}/tests/*.cpp \
                                   ${ASAN_RTL}/tests/*.h &
-run_lint ${ASAN_LIT_TEST_LINT_FILTER} ${LIT_TESTS}/asan/*/*.cc &
+run_lint ${ASAN_LIT_TEST_LINT_FILTER} ${LIT_TESTS}/asan/*/*.cpp &
 
 # TSan
 TSAN_RTL=${COMPILER_RT}/lib/tsan
@@ -122,7 +122,7 @@ run_lint ${SCUDO_RTL_LINT_FILTER} ${SCUDO_RTL}/*.cpp \
 FILES=${COMMON_RTL}/*.inc
 TMPFILES=""
 for FILE in $FILES; do
-  TMPFILE="$(${MKTEMP}).$(basename ${FILE}).cc"
+  TMPFILE="$(${MKTEMP}).$(basename ${FILE}).cpp"
   cp -f $FILE $TMPFILE
   run_lint ${COMMON_RTL_INC_LINT_FILTER} $TMPFILE &
   TMPFILES="$TMPFILES $TMPFILE"
@@ -1,5 +1,5 @@
 // Check that with empty ASAN_OPTIONS, ASan reports on OS X actually crash
-// the process (abort_on_error=1). See also Linux/abort_on_error.cc.
+// the process (abort_on_error=1). See also Linux/abort_on_error.cpp.
 
 // RUN: %clangxx_asan %s -o %t
 
@@ -23,7 +23,7 @@
 // CHECK-FS: WRITE of size 4
 
 extern "C" void foo(int* a) {
-  // CHECK-FS: #0 0x{{.+}} in foo {{.*}}asan-symbolize-partial-report-no-external-symbolizer.cc:[[@LINE+1]]
+  // CHECK-FS: #0 0x{{.+}} in foo {{.*}}asan-symbolize-partial-report-no-external-symbolizer.cpp:[[@LINE+1]]
   *a = 5;
 }
 
@@ -32,7 +32,7 @@ int main() {
   if (!a)
     return 0;
   free(a);
-  // CHECK-FS: #1 0x{{.+}} in main {{.*}}asan-symbolize-partial-report-no-external-symbolizer.cc:[[@LINE+1]]
+  // CHECK-FS: #1 0x{{.+}} in main {{.*}}asan-symbolize-partial-report-no-external-symbolizer.cpp:[[@LINE+1]]
   foo(a);
   return 0;
 }
@@ -25,7 +25,7 @@
 // CHECK-FS: WRITE of size 4
 
 extern "C" void foo(int* a) {
-  // CHECK-FS: #0 0x{{.+}} in foo {{.*}}asan-symbolize-partial-report-with-module-map.cc:[[@LINE+1]]
+  // CHECK-FS: #0 0x{{.+}} in foo {{.*}}asan-symbolize-partial-report-with-module-map.cpp:[[@LINE+1]]
   *a = 5;
 }
 
@@ -34,7 +34,7 @@ int main() {
   if (!a)
     return 0;
   free(a);
-  // CHECK-FS: #1 0x{{.+}} in main {{.*}}asan-symbolize-partial-report-with-module-map.cc:[[@LINE+1]]
+  // CHECK-FS: #1 0x{{.+}} in main {{.*}}asan-symbolize-partial-report-with-module-map.cpp:[[@LINE+1]]
   foo(a);
   return 0;
 }
@@ -16,7 +16,7 @@
 // CHECK-MM: WRITE of size 4
 
 extern "C" void foo(int* a) {
-  // CHECK-MM: #0 0x{{.+}} in foo {{.*}}asan-symbolize-with-module-map.cc:[[@LINE+1]]
+  // CHECK-MM: #0 0x{{.+}} in foo {{.*}}asan-symbolize-with-module-map.cpp:[[@LINE+1]]
   *a = 5;
 }
 
@@ -25,7 +25,7 @@ int main() {
   if (!a)
     return 0;
   free(a);
-  // CHECK-MM: #1 0x{{.+}} in main {{.*}}asan-symbolize-with-module-map.cc:[[@LINE+1]]
+  // CHECK-MM: #1 0x{{.+}} in main {{.*}}asan-symbolize-with-module-map.cpp:[[@LINE+1]]
   foo(a);
   return 0;
 }
@@ -20,11 +20,11 @@ int main(int argc, char **argv) {
   // CHECK: Using atos at user-specified path:
   // CHECK: AddressSanitizer: attempting double-free{{.*}}in thread T0
   // CHECK: #0 0x{{.*}} in {{.*}}free
-  // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer-dyld-root-path.cc:[[@LINE-4]]
+  // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer-dyld-root-path.cpp:[[@LINE-4]]
   // CHECK: freed by thread T0 here:
   // CHECK: #0 0x{{.*}} in {{.*}}free
-  // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer-dyld-root-path.cc:[[@LINE-8]]
+  // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer-dyld-root-path.cpp:[[@LINE-8]]
   // CHECK: allocated by thread T0 here:
-  // CHECK: atos-symbolizer-dyld-root-path.cc:[[@LINE-13]]
+  // CHECK: atos-symbolizer-dyld-root-path.cpp:[[@LINE-13]]
   return res;
 }
@@ -17,11 +17,11 @@ int main(int argc, char **argv) {
   // CHECK: Using atos at user-specified path:
   // CHECK: AddressSanitizer: attempting double-free{{.*}}in thread T0
   // CHECK: #0 0x{{.*}} in {{.*}}free
-  // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer.cc:[[@LINE-4]]
+  // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer.cpp:[[@LINE-4]]
   // CHECK: freed by thread T0 here:
   // CHECK: #0 0x{{.*}} in {{.*}}free
-  // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer.cc:[[@LINE-8]]
+  // CHECK: #1 0x{{.*}} in main {{.*}}atos-symbolizer.cpp:[[@LINE-8]]
   // CHECK: allocated by thread T0 here:
-  // CHECK: atos-symbolizer.cc:[[@LINE-13]]
+  // CHECK: atos-symbolizer.cpp:[[@LINE-13]]
   return res;
 }
@@ -84,7 +84,7 @@ extern "C"
 void faulty_func(char *p) {
   *p = 'x';  // BOOM
   // CHECK: AddressSanitizer: global-buffer-overflow
-  // CHECK-LI: #0 0x{{.*}} in faulty_func{{.*}} {{.*}}haswell-symbolication.cc:[[@LINE-2]]
+  // CHECK-LI: #0 0x{{.*}} in faulty_func{{.*}} {{.*}}haswell-symbolication.cpp:[[@LINE-2]]
   // CHECK-NOLI: #0 0x{{.*}} in faulty_func{{.*}} {{.*}}haswell-symbolication
   // CHECK: is located 2 bytes to the right of global variable 'faulty_global'
   // CHECK-NOT: LLVMSymbolizer: error reading file
@@ -2,7 +2,7 @@
 // executing other programs.
 
 // RUN: %clangxx_asan %s -o %t
-// RUN: %clangxx %p/../Helpers/echo-env.cc -o %t-echo-env
+// RUN: %clangxx %p/../Helpers/echo-env.cpp -o %t-echo-env
 // RUN: %clangxx -DSHARED_LIB %s \
 // RUN:     -dynamiclib -o %t-darwin-dummy-shared-lib-so.dylib
 
@@ -25,7 +25,7 @@ int main(int argc, char *argv[]) {
   memcpy(mybuf, x, 10);
   // CHECK: {{.*ERROR: AddressSanitizer: heap-use-after-free on address}}
   // CHECK: Process module map:
-  // CHECK: uuid.cc.tmp {{.*}} <[[UUID]]>
+  // CHECK: uuid.cpp.tmp {{.*}} <[[UUID]]>
 
   fprintf(stderr, "Done.\n");
 }
@@ -1,5 +1,5 @@
 // Helper binary for
-// lit_tests/TestCases/Darwin/unset-insert-libraries-on-exec.cc
+// lit_tests/TestCases/Darwin/unset-insert-libraries-on-exec.cpp
 // Prints the environment variable with the given name.
 #include <stdio.h>
 #include <stdlib.h>
index 8329463..27e49e2 100644 (file)
@@ -1,3 +1,3 @@
 global:*badGlobal*=init
 type:*badNamespace::BadClass*=init
-src:*initialization-blacklist-extra2.cc=init
+src:*initialization-blacklist-extra2.cpp=init
@@ -1,5 +1,5 @@
 // Check that with empty ASAN_OPTIONS, ASan reports on Linux don't crash
-// the process (abort_on_error=0). See also Darwin/abort_on_error.cc.
+// the process (abort_on_error=0). See also Darwin/abort_on_error.cpp.
 
 // RUN: %clangxx_asan %s -o %t
 
@@ -6,9 +6,9 @@
 // RUN: %clangxx -O0 %s -c -o %t.o
 // RUN: %clangxx_asan -O0 %t.o %libdl -o %t
 
-// RUN: rm -f %t.asan.options.activation-options.cc.tmp
+// RUN: rm -f %t.asan.options.activation-options.cpp.tmp
 // RUN: rm -f %t.asan.options.ABCDE
-// RUN: echo "help=1" >%t.asan.options.activation-options.cc.tmp
+// RUN: echo "help=1" >%t.asan.options.activation-options.cpp.tmp
 
 // RUN: %env_asan_opts=start_deactivated=1 \
 // RUN:   ASAN_ACTIVATION_OPTIONS=include=%t.asan.options.%b %run %t 2>&1 | \
@@ -11,12 +11,12 @@ __attribute__((noinline))
 int boom() {
   volatile int three = 3;
   char * volatile s = (char *)malloc(three);
-// CHECK: #1 0x{{.*}} in boom {{.*}}clang_gcc_abi.cc:[[@LINE-1]]
+// CHECK: #1 0x{{.*}} in boom {{.*}}clang_gcc_abi.cpp:[[@LINE-1]]
   return s[three]; //BOOM
 }
 
 __attribute__((naked, noinline)) void gcc_abi() {
-// CHECK: #2 0x{{.*}} in gcc_abi {{.*}}clang_gcc_abi.cc:[[@LINE+1]]
+// CHECK: #2 0x{{.*}} in gcc_abi {{.*}}clang_gcc_abi.cpp:[[@LINE+1]]
   asm volatile("str fp, [sp, #-8]!\n\t"
                "str lr, [sp, #4]\n\t"
                "add fp, sp, #4\n\t"
@@ -29,7 +29,7 @@ __attribute__((naked, noinline)) void gcc_abi() {
 }
 
 __attribute__((naked, noinline)) void clang_abi() {
-// CHECK: #3 0x{{.*}} in clang_abi {{.*}}clang_gcc_abi.cc:[[@LINE+1]]
+// CHECK: #3 0x{{.*}} in clang_abi {{.*}}clang_gcc_abi.cpp:[[@LINE+1]]
   asm volatile("push {r11, lr}\n\t"
                "mov r11, sp\n\t"
                "bl  gcc_abi\n\t"
@@ -40,5 +40,5 @@ __attribute__((naked, noinline)) void clang_abi() {
 
 int main() {
   clang_abi();
-// CHECK: #4 0x{{.*}} in main {{.*}}clang_gcc_abi.cc:[[@LINE-1]]
+// CHECK: #4 0x{{.*}} in main {{.*}}clang_gcc_abi.cpp:[[@LINE-1]]
 }
@@ -3,9 +3,9 @@
 // independently on order in which we list source files (if we specify
 // strict init-order checking).
 
-// RUN: %clangxx_asan -O0 %s %p/../Helpers/initialization-bug-extra.cc -o %t
+// RUN: %clangxx_asan -O0 %s %p/../Helpers/initialization-bug-extra.cpp -o %t
 // RUN: %env_asan_opts=strict_init_order=true not %run %t 2>&1 | FileCheck %s
-// RUN: %clangxx_asan -O0 %p/../Helpers/initialization-bug-extra.cc %s -o %t
+// RUN: %clangxx_asan -O0 %p/../Helpers/initialization-bug-extra.cpp %s -o %t
 // RUN: %env_asan_opts=strict_init_order=true not %run %t 2>&1 | FileCheck %s
 
 // Do not test with optimization -- the error may be optimized away.
@@ -21,7 +21,7 @@ int __attribute__((noinline)) initX() {
   return y + 1;
   // CHECK: {{AddressSanitizer: initialization-order-fiasco}}
   // CHECK: {{READ of size .* at 0x.* thread T0}}
-  // CHECK: {{#0 0x.* in .*initX.* .*initialization-bug-any-order.cc:}}[[@LINE-3]]
+  // CHECK: {{#0 0x.* in .*initX.* .*initialization-bug-any-order.cpp:}}[[@LINE-3]]
   // CHECK: {{0x.* is located 0 bytes inside of global variable .*y.*}}
 }
 
@@ -51,7 +51,7 @@ namespace foo { char G[SZ]; }
 #include <stdio.h>
 namespace foo { char G[100]; }
 // CHECK: ERROR: AddressSanitizer: odr-violation
-// CHECK: size=100 'foo::G' {{.*}}odr-violation.cc:[[@LINE-2]]:22
+// CHECK: size=100 'foo::G' {{.*}}odr-violation.cpp:[[@LINE-2]]:22
 // CHECK: size={{4|100}} 'foo::G'
 int main(int argc, char **argv) {
   printf("PASS: %p\n", &foo::G);
@@ -60,6 +60,6 @@ int main(int argc, char **argv) {
 
 // CHECK: These globals were registered at these points:
 // CHECK: ODR-EXE
-// CHECK: odr-violation.cc.dynamic
-// CHECK: SUMMARY: AddressSanitizer: odr-violation: global 'foo::G' at {{.*}}odr-violation.cc
+// CHECK: odr-violation.cpp.dynamic
+// CHECK: SUMMARY: AddressSanitizer: odr-violation: global 'foo::G' at {{.*}}odr-violation.cpp
 // DISABLED: PASS
@@ -99,7 +99,7 @@ int main(void) {
 #endif
     res = ptrace((enum __ptrace_request)__PTRACE_REQUEST, pid, __PTRACE_ARGS);
     // CHECK: AddressSanitizer: stack-buffer-overflow
-    // CHECK: {{.*ptrace.cc:}}[[@LINE-2]]
+    // CHECK: {{.*ptrace.cpp:}}[[@LINE-2]]
     assert(!res);
     PRINT_REG_PC(regs);
 
@@ -41,7 +41,7 @@ static void *client_thread_udp(void *data) {
   succeeded = sendto(sockfd, buf, kBufSize, 0, (struct sockaddr *)&serveraddr,
                      sizeof(serveraddr));
   // CHECK-SENDTO: {{READ of size 10 at 0x.* thread T1}}
-  // CHECK-SENDTO: {{    #1 0x.* in client_thread_udp.*recvfrom.cc:}}[[@LINE-3]]
+  // CHECK-SENDTO: {{    #1 0x.* in client_thread_udp.*recvfrom.cpp:}}[[@LINE-3]]
   CHECK_ERROR(succeeded < 0, "in sending message");
   return NULL;
 }
@@ -72,9 +72,9 @@ int main() {
 
   recvfrom(sockfd, buf, kBufSize, 0, NULL, NULL); // BOOM
   // CHECK-RECVFROM: {{WRITE of size 10 at 0x.* thread T0}}
-  // CHECK-RECVFROM: {{    #1 0x.* in main.*recvfrom.cc:}}[[@LINE-2]]
+  // CHECK-RECVFROM: {{    #1 0x.* in main.*recvfrom.cpp:}}[[@LINE-2]]
   // CHECK-RECVFROM: {{Address 0x.* is located in stack of thread T0 at offset}}
-  // CHECK-RECVFROM-NEXT: in{{.*}}main{{.*}}recvfrom.cc
+  // CHECK-RECVFROM-NEXT: in{{.*}}main{{.*}}recvfrom.cpp
   succeeded = pthread_join(client_thread, NULL);
   CHECK_ERROR(succeeded, "joining thread");
   return 0;
@@ -38,11 +38,11 @@ int main(int argc, char *argv[]) {
   inc2(array, -1);  // BOOM
   // CHECK: ERROR: AddressSanitizer: heap-buffer-overflow
   // CHECK: READ of size 4 at 0x{{.*}}
-  // CHECK: #0 {{.*}} in inc2 {{.*}}asan-symbolize-sanity-test.cc:[[@LINE+21]]
-  // CHECK: #1 {{.*}} in main {{.*}}asan-symbolize-sanity-test.cc:[[@LINE-4]]
+  // CHECK: #0 {{.*}} in inc2 {{.*}}asan-symbolize-sanity-test.cpp:[[@LINE+21]]
+  // CHECK: #1 {{.*}} in main {{.*}}asan-symbolize-sanity-test.cpp:[[@LINE-4]]
   // CHECK: allocated by thread T{{.*}} here:
   // CHECK: #{{.*}} in {{(wrap_|__interceptor_)?}}malloc
-  // CHECK: #{{.*}} in main {{.*}}asan-symbolize-sanity-test.cc:[[@LINE-9]]
+  // CHECK: #{{.*}} in main {{.*}}asan-symbolize-sanity-test.cpp:[[@LINE-9]]
   return 0;
 }
 #else  // SHARED_LIBS
@@ -30,6 +30,6 @@ int main(int argc, char **argv) {
   // CHECK-FILE: {{.*ERROR: AddressSanitizer: heap-use-after-free on address}}
   // CHECK-FILE:   {{0x.* at pc 0x.* bp 0x.* sp 0x.*}}
   // CHECK-FILE: {{WRITE of size 1 at 0x.* thread T0}}
-  // CHECK-FILE: {{    #0 0x.* in main .*closed-fds.cc:}}[[@LINE-4]]
+  // CHECK-FILE: {{    #0 0x.* in main .*closed-fds.cpp:}}[[@LINE-4]]
   return 0;
 }
@@ -29,8 +29,8 @@ int main(int argc, char **argv) {
   bar2();
   __sanitizer_cov_dump();
 // CHECK: RESET
-// CHECK-DAG: SanitizerCoverage: ./coverage-reset.cc{{.*}}.sancov: 2 PCs written
-// CHECK-DAG: SanitizerCoverage: ./libcoverage-reset.cc{{.*}}.sancov: 2 PCs written
+// CHECK-DAG: SanitizerCoverage: ./coverage-reset.cpp{{.*}}.sancov: 2 PCs written
+// CHECK-DAG: SanitizerCoverage: ./libcoverage-reset.cpp{{.*}}.sancov: 2 PCs written
 
   fprintf(stderr, "RESET\n");
   __sanitizer_cov_reset();
@@ -38,8 +38,8 @@ int main(int argc, char **argv) {
   bar1();
   __sanitizer_cov_dump();
 // CHECK: RESET
-// CHECK-DAG: SanitizerCoverage: ./coverage-reset.cc{{.*}}.sancov: 1 PCs written
-// CHECK-DAG: SanitizerCoverage: ./libcoverage-reset.cc{{.*}}.sancov: 1 PCs written
+// CHECK-DAG: SanitizerCoverage: ./coverage-reset.cpp{{.*}}.sancov: 1 PCs written
+// CHECK-DAG: SanitizerCoverage: ./libcoverage-reset.cpp{{.*}}.sancov: 1 PCs written
 
   fprintf(stderr, "RESET\n");
   __sanitizer_cov_reset();
@@ -47,7 +47,7 @@ int main(int argc, char **argv) {
   foo2();
   __sanitizer_cov_dump();
 // CHECK: RESET
-// CHECK: SanitizerCoverage: ./coverage-reset.cc{{.*}}.sancov: 2 PCs written
+// CHECK: SanitizerCoverage: ./coverage-reset.cpp{{.*}}.sancov: 2 PCs written
 
   fprintf(stderr, "RESET\n");
   __sanitizer_cov_reset();
@@ -55,13 +55,13 @@ int main(int argc, char **argv) {
   bar2();
   __sanitizer_cov_dump();
 // CHECK: RESET
-// CHECK: SanitizerCoverage: ./libcoverage-reset.cc{{.*}}.sancov: 2 PCs written
+// CHECK: SanitizerCoverage: ./libcoverage-reset.cpp{{.*}}.sancov: 2 PCs written
 
   fprintf(stderr, "RESET\n");
   __sanitizer_cov_reset();
 // CHECK: RESET
 
   bar2();
-// CHECK: SanitizerCoverage: ./libcoverage-reset.cc{{.*}}.sancov: 1 PCs written
+// CHECK: SanitizerCoverage: ./libcoverage-reset.cpp{{.*}}.sancov: 1 PCs written
 }
 #endif
@@ -23,7 +23,7 @@ int main(int argc, char *argv[]) {
   my_memset(buf, 11);
   // CHECK: {{.*ERROR: AddressSanitizer: stack-buffer-overflow}}
   // CHECK: {{WRITE of size 11 at 0x.* thread T0}}
-  // CHECK: {{0x.* in my_memset .*interception-in-shared-lib-test.cc:}}[[@LINE-10]]
+  // CHECK: {{0x.* in my_memset .*interception-in-shared-lib-test.cpp:}}[[@LINE-10]]
   return 0;
 }
 #endif
@@ -44,7 +44,7 @@ int main(int argc, char **argv) {
     char *parent_pointer = &local;
 
     // B: ERROR: AddressSanitizer: invalid-pointer-pair
-    // B: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-threads.cc:[[@LINE+1]]
+    // B: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-threads.cpp:[[@LINE+1]]
     unsigned r = parent_pointer - pointers[0];
   }
 
@@ -21,7 +21,7 @@ int main(int argc, char **argv) {
   int res = ioctl(fd, FIONBIO, &nonblock + 1);
   // CHECK: AddressSanitizer: stack-buffer-overflow
   // CHECK: READ of size 4 at
-  // CHECK: {{#.* in main .*ioctl.cc:}}[[@LINE-3]]
+  // CHECK: {{#.* in main .*ioctl.cpp:}}[[@LINE-3]]
   assert(res == 0);
   close(fd);
   return 0;
@@ -20,7 +20,7 @@ int main(int argc, char **argv) {
   C *buffer = new C[argc];
   buffer[-2].x = 10;
 // CHECK: AddressSanitizer: heap-buffer-overflow
-// CHECK: in main {{.*}}new_array_cookie_test.cc:[[@LINE-2]]
+// CHECK: in main {{.*}}new_array_cookie_test.cpp:[[@LINE-2]]
 // CHECK: is located 0 bytes inside of 12-byte region
 // NO_COOKIE: ZZZZZZZZ
   delete [] buffer;
@@ -34,7 +34,7 @@ int main(int argc, char *argv[]) {
   // CHECK: {{.*ERROR: AddressSanitizer: global-buffer-overflow}}
   // CHECK: {{READ of size 4 at 0x.* thread T0}}
   // CHECK: {{    #0 0x.*}}
-  // CHECK: {{    #1 0x.* in main .*shared-lib-test.cc:}}[[@LINE-4]]
+  // CHECK: {{    #1 0x.* in main .*shared-lib-test.cpp:}}[[@LINE-4]]
   return 0;
 }
 #else  // SHARED_LIB
@@ -56,11 +56,11 @@ void Func2(char *x) {
   fprintf(stderr, "2: %p\n", x);
   *x = 1;
   // CHECK: WRITE of size 1 {{.*}} thread T0
-  // CHECK:     #0{{.*}}Func2{{.*}}stack-use-after-return.cc:[[@LINE-2]]
+  // CHECK:     #0{{.*}}Func2{{.*}}stack-use-after-return.cpp:[[@LINE-2]]
   // CHECK: is located in stack of thread T0 at offset
   // CHECK: 'local'{{.*}} <== Memory access at offset {{16|32}} is inside this variable
   // THREAD: WRITE of size 1 {{.*}} thread T{{[1-9]}}
-  // THREAD:     #0{{.*}}Func2{{.*}}stack-use-after-return.cc:[[@LINE-6]]
+  // THREAD:     #0{{.*}}Func2{{.*}}stack-use-after-return.cpp:[[@LINE-6]]
   // THREAD: is located in stack of thread T{{[1-9]}} at offset
   // THREAD: 'local'{{.*}} <== Memory access at offset {{16|32}} is inside this variable
   // CHECK-20: T0: FakeStack created:{{.*}} stack_size_log: 20
@@ -17,11 +17,11 @@ int main(int argc, char **argv) {
   char *copy = strndup(kString, 2);
   int x = copy[2 + argc];  // BOOM
   // CHECK: AddressSanitizer: heap-buffer-overflow
-  // CHECK: #0 {{.*}}main {{.*}}strndup_oob_test.cc:[[@LINE-2]]
+  // CHECK: #0 {{.*}}main {{.*}}strndup_oob_test.cpp:[[@LINE-2]]
   // CHECK-LABEL: allocated by thread T{{.*}} here:
   // CHECK: #{{[01]}} {{.*}}strndup
-  // CHECK: #{{.*}}main {{.*}}strndup_oob_test.cc:[[@LINE-6]]
+  // CHECK: #{{.*}}main {{.*}}strndup_oob_test.cpp:[[@LINE-6]]
   // CHECK-LABEL: SUMMARY
-  // CHECK: strndup_oob_test.cc:[[@LINE-7]]
+  // CHECK: strndup_oob_test.cpp:[[@LINE-7]]
   return x;
 }
@@ -17,6 +17,6 @@ int main(int argc, char **argv) {
   char *copy = strndup(kChars, 3);\r
   copy = strndup(kChars, 10);\r
   // CHECK: AddressSanitizer: global-buffer-overflow\r
-  // CHECK: {{.*}}main {{.*}}.cc:[[@LINE-2]]\r
+  // CHECK: {{.*}}main {{.*}}.cpp:[[@LINE-2]]\r
   return *copy;\r
 }\r
@@ -24,7 +24,7 @@ int main(int argc, char **argv) {
     // CHECK: stack-buffer-overflow
     // CHECK: {{WRITE of size .* at 0x.* thread T0}}
     // CHECK: {{in .*wait}}
-    // CHECK: {{in main .*wait.cc:}}
+    // CHECK: {{in main .*wait.cpp:}}
     // CHECK: is located in stack of thread T0 at offset
     // CHECK: {{in main}}
     return res == -1 ? 1 : 0;
@@ -26,7 +26,7 @@ int main(int argc, char **argv) {
     // CHECK: stack-buffer-overflow
     // CHECK: {{WRITE of size .* at 0x.* thread T0}}
     // CHECK: {{in .*wait}}
-    // CHECK: {{in main .*wait3.cc:}}
+    // CHECK: {{in main .*wait3.cpp:}}
     // CHECK: is located in stack of thread T0 at offset
     // CHECK: {{in main}}
     return res == -1 ? 1 : 0;
@@ -34,7 +34,7 @@ int main(int argc, char **argv) {
     // CHECK: stack-buffer-overflow
     // CHECK: {{WRITE of size .* at 0x.* thread T0}}
     // CHECK: {{in .*wait}}
-    // CHECK: {{in main .*wait4.cc:}}
+    // CHECK: {{in main .*wait4.cpp:}}
     // CHECK: is located in stack of thread T0 at offset
     // CHECK: {{in main}}
     return res == -1 ? 1 : 0;
@@ -20,7 +20,7 @@ int main(int argc, char **argv) {
     // CHECK: stack-buffer-overflow
     // CHECK: {{WRITE of size .* at 0x.* thread T0}}
     // CHECK: {{in .*waitid}}
-    // CHECK: {{in main .*waitid.cc:}}
+    // CHECK: {{in main .*waitid.cpp:}}
     // CHECK: is located in stack of thread T0 at offset
     // CHECK: {{in main}}
     return res != -1;
@@ -14,7 +14,7 @@ void make_access(S *s) {
   s->bf2 = 2;
 // CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: READ of size {{[124]}} at [[ADDR]]
-// CHECK:   {{#0 .* make_access.*bitfield_uaf.cc}}:[[@LINE-3]]
+// CHECK:   {{#0 .* make_access.*bitfield_uaf.cpp}}:[[@LINE-3]]
 // CHECK:   {{#1 .* main}}
 }
 
@@ -24,10 +24,10 @@ int main(void) {
 // CHECK: [[ADDR]] is located 0 bytes inside of 4-byte region
 // CHECK-LABEL: freed by thread T0 here:
 // CHECK:   {{#0 .* free }}
-// CHECK:   {{#1 .* main .*bitfield_uaf.cc}}:[[@LINE-4]]
+// CHECK:   {{#1 .* main .*bitfield_uaf.cpp}}:[[@LINE-4]]
 // CHECK-LABEL: previously allocated by thread T0 here:
 // CHECK:   {{#0 .* malloc }}
-// CHECK:   {{#1 .* main .*bitfield_uaf.cc}}:[[@LINE-8]]
+// CHECK:   {{#1 .* main .*bitfield_uaf.cpp}}:[[@LINE-8]]
   make_access(s);
   return 0;
 }
@@ -8,10 +8,10 @@ int main() {
   buffer[-1] = 42;
 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 4 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*calloc_left_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*calloc_left_oob.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 4 bytes to the left of 168-byte region
 // CHECK: allocated by thread T0 here:
 // CHECK-NEXT: {{#0 .* calloc }}
-// CHECK-NEXT: {{#1 .* main .*calloc_left_oob.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*calloc_left_oob.cpp}}:[[@LINE-8]]
   free(buffer);
 }
@@ -8,10 +8,10 @@ int main() {
   buffer[42] = 42;
 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 4 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*calloc_right_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*calloc_right_oob.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 0 bytes to the right of 168-byte region
 // CHECK: allocated by thread T0 here:
 // CHECK-NEXT: {{#0 .* calloc }}
-// CHECK-NEXT: {{#1 .* main .*calloc_right_oob.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*calloc_right_oob.cpp}}:[[@LINE-8]]
   free(buffer);
 }
@@ -9,12 +9,12 @@ int main() {
   buffer[0] = 42;
 // CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 4 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*calloc_uaf.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*calloc_uaf.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 0 bytes inside of 168-byte region
 // CHECK: freed by thread T0 here:
 // CHECK-NEXT: {{#0 .* free }}
-// CHECK-NEXT: {{#1 .* main .*calloc_uaf.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*calloc_uaf.cpp}}:[[@LINE-8]]
 // CHECK: previously allocated by thread T0 here:
 // CHECK-NEXT: {{#0 .* calloc }}
-// CHECK-NEXT: {{#1 .* main .*calloc_uaf.cc}}:[[@LINE-12]]
+// CHECK-NEXT: {{#1 .* main .*calloc_uaf.cpp}}:[[@LINE-12]]
 }
@@ -2,7 +2,7 @@
 // __local_stdio_printf_options function isn't instrumented for coverage.
 
 // RUN: rm -rf %t && mkdir %t && cd %t
-// RUN: %clang_cl_asan -fsanitize-coverage=func,trace-pc-guard -Od %p/dll_host.cc -Fet.exe
+// RUN: %clang_cl_asan -fsanitize-coverage=func,trace-pc-guard -Od %p/dll_host.cpp -Fet.exe
 // RUN: %clang_cl_asan -fsanitize-coverage=func,trace-pc-guard -LD -Od %s -Fet.dll
 // RUN: %run ./t.exe t.dll 2>&1 | FileCheck %s
 
@@ -43,8 +43,8 @@ int main() {
   free(buffer);
   A<char*> a(buffer);
 // CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]]
-// CHECK: foo::bar<42>{{.*}}demangled_names.cc
-// CHECK: foo::spam{{.*}}demangled_names.cc
-// CHECK: baz<char *,1>{{.*}}demangled_names.cc
-// CHECK: A<char *>::~A<char *>{{.*}}demangled_names.cc
+// CHECK: foo::bar<42>{{.*}}demangled_names.cpp
+// CHECK: foo::spam{{.*}}demangled_names.cpp
+// CHECK: baz<char *,1>{{.*}}demangled_names.cpp
+// CHECK: A<char *>::~A<char *>{{.*}}demangled_names.cpp
 }
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
 // RUN: %run %t %t.dll | FileCheck %s
 
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
 // RUN: %run %t %t.dll | FileCheck %s
 
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
 // RUN: %run %t %t.dll 2>&1 | FileCheck %s
 
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 // RUN: %clang_cl_asan -LD -O2 %s -Fe%t.dll
 // RUNX: %run %t %t.dll 2>&1 | FileCheck %s
 
index 845095d..e5716be 100644 (file)
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 //
 // RUN: %clang_cl_asan /Gw -LD -Od %s -Fe%t.dll
 // RUN: %env_asan_opts=report_globals=2 %run %t %t.dll 2>&1 | FileCheck %s --check-prefix=NOSTRIP
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
 // RUN: not %run %t %t.dll 2>&1 | FileCheck %s
 
@@ -19,9 +19,9 @@ int test_function() {
 // CHECK: READ of size 7 at [[ADDR]] thread T0
 // CHECK-NEXT:  __asan_wrap_memchr
 // CHECK-NEXT:  memchr
-// CHECK-NEXT:  test_function {{.*}}dll_intercept_memchr.cc:[[@LINE-5]]
+// CHECK-NEXT:  test_function {{.*}}dll_intercept_memchr.cpp:[[@LINE-5]]
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
-// CHECK-NEXT:  test_function {{.*}}dll_intercept_memchr.cc
+// CHECK-NEXT:  test_function {{.*}}dll_intercept_memchr.cpp
 // CHECK: 'buff'{{.*}} <== Memory access at offset {{.*}} overflows this variable
   return 0;
 }
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 // RUN: %clang_cl_asan -Wno-fortify-source -LD -Od %s -Fe%t.dll
 // RUN: not %run %t %t.dll 2>&1 | FileCheck %s
 
@@ -24,9 +24,9 @@ int test_function() {
 // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 6 at [[ADDR]] thread T0
 // CHECK-NEXT:  __asan_{{.*}}memcpy
-// CHECK-NEXT:  test_function {{.*}}dll_intercept_memcpy.cc:[[@LINE-4]]
+// CHECK-NEXT:  test_function {{.*}}dll_intercept_memcpy.cpp:[[@LINE-4]]
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
-// CHECK-NEXT:  test_function {{.*}}dll_intercept_memcpy.cc
+// CHECK-NEXT:  test_function {{.*}}dll_intercept_memcpy.cpp
 // CHECK: 'buff2'{{.*}} <== Memory access at offset {{.*}} overflows this variable
   return 0;
 }
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
 // RUN: not %run %t %t.dll 2>&1 | FileCheck %s
 
@@ -26,9 +26,9 @@ int test_function() {
 // CHECK: WRITE of size 6 at [[ADDR]] thread T0
 // CHECK-NEXT:  __asan_{{.*}}mem{{.*}}
 // CHECK-NEXT:  call_memcpy
-// CHECK-NEXT:  test_function {{.*}}dll_intercept_memcpy_indirect.cc:[[@LINE-5]]
+// CHECK-NEXT:  test_function {{.*}}dll_intercept_memcpy_indirect.cpp:[[@LINE-5]]
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
-// CHECK-NEXT:  test_function {{.*}}dll_intercept_memcpy_indirect.cc
+// CHECK-NEXT:  test_function {{.*}}dll_intercept_memcpy_indirect.cpp
 // CHECK: 'buff2'{{.*}} <== Memory access at offset {{.*}} overflows this variable
   return 0;
 }
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 // RUN: %clang_cl_asan -Wno-fortify-source -LD -Od %s -Fe%t.dll
 // RUN: not %run %t %t.dll 2>&1 | FileCheck %s
 
@@ -24,9 +24,9 @@ int test_function() {
 // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 6 at [[ADDR]] thread T0
 // CHECK-NEXT:  __asan_memset
-// CHECK-NEXT:  test_function {{.*}}dll_intercept_memset.cc:[[@LINE-4]]
+// CHECK-NEXT:  test_function {{.*}}dll_intercept_memset.cpp:[[@LINE-4]]
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
-// CHECK-NEXT:  test_function {{.*}}dll_intercept_memset.cc
+// CHECK-NEXT:  test_function {{.*}}dll_intercept_memset.cpp
 // CHECK: 'buff'{{.*}} <== Memory access at offset {{.*}} overflows this variable
   return 0;
 }
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
 // RUN: not %run %t %t.dll 2>&1 | FileCheck %s
 
@@ -20,9 +20,9 @@ int test_function() {
 // FIXME: Should be READ of size 1, see issue 155.
 // CHECK: READ of size {{[0-9]+}} at [[ADDR]] thread T0
 // CHECK-NEXT: {{#0 .*}}strlen
-// CHECK-NEXT: {{#1 .* test_function .*}}dll_intercept_strlen.cc:[[@LINE-5]]
+// CHECK-NEXT: {{#1 .* test_function .*}}dll_intercept_strlen.cpp:[[@LINE-5]]
 //
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
-// CHECK-NEXT: test_function {{.*}}dll_intercept_strlen.cc:
+// CHECK-NEXT: test_function {{.*}}dll_intercept_strlen.cpp:
   return len > 42;
 }
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
 // RUN: not %run %t %t.dll 2>&1 | FileCheck %s
 
@@ -9,14 +9,14 @@ int test_function() {
   buffer[-1] = 42;
 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: test_function {{.*}}dll_malloc_left_oob.cc:[[@LINE-3]]
-// CHECK-NEXT: main {{.*}}dll_host.cc
+// CHECK-NEXT: test_function {{.*}}dll_malloc_left_oob.cpp:[[@LINE-3]]
+// CHECK-NEXT: main {{.*}}dll_host.cpp
 //
 // CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region
 // CHECK-LABEL: allocated by thread T0 here:
 // CHECK-NEXT:   malloc
-// CHECK-NEXT:   test_function {{.*}}dll_malloc_left_oob.cc:[[@LINE-10]]
-// CHECK-NEXT:   main {{.*}}dll_host.cc
+// CHECK-NEXT:   test_function {{.*}}dll_malloc_left_oob.cpp:[[@LINE-10]]
+// CHECK-NEXT:   main {{.*}}dll_host.cpp
 // CHECK-LABEL: SUMMARY
   free(buffer);
   return 0;
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
 // RUN: not %run %t %t.dll 2>&1 | FileCheck %s
 
@@ -11,18 +11,18 @@ int test_function() {
   buffer[0] = 42;
 // CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 4 at [[ADDR]] thread T0
-// CHECK-NEXT:  test_function {{.*}}dll_malloc_uaf.cc:[[@LINE-3]]
+// CHECK-NEXT:  test_function {{.*}}dll_malloc_uaf.cpp:[[@LINE-3]]
 // CHECK-NEXT:  main {{.*}}dll_host
 //
 // CHECK: [[ADDR]] is located 0 bytes inside of 42-byte region
 // CHECK-LABEL: freed by thread T0 here:
 // CHECK-NEXT:  free
-// CHECK-NEXT:  test_function {{.*}}dll_malloc_uaf.cc:[[@LINE-10]]
+// CHECK-NEXT:  test_function {{.*}}dll_malloc_uaf.cpp:[[@LINE-10]]
 // CHECK-NEXT:  main {{.*}}dll_host
 //
 // CHECK-LABEL: previously allocated by thread T0 here:
 // CHECK-NEXT:  malloc
-// CHECK-NEXT:  test_function {{.*}}dll_malloc_uaf.cc:[[@LINE-16]]
+// CHECK-NEXT:  test_function {{.*}}dll_malloc_uaf.cpp:[[@LINE-16]]
 // CHECK-NEXT:  main {{.*}}dll_host
   return 0;
 }
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
 // RUN: not %run %t %t.dll 2>&1 | FileCheck %s
 
@@ -11,12 +11,12 @@ void noreturn_f() {
   _exit(1);
 // CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT:  noreturn_f{{.*}}dll_noreturn.cc:[[@LINE-4]]
-// CHECK-NEXT:  test_function{{.*}}dll_noreturn.cc
-// CHECK-NEXT:  main{{.*}}dll_host.cc
+// CHECK-NEXT:  noreturn_f{{.*}}dll_noreturn.cpp:[[@LINE-4]]
+// CHECK-NEXT:  test_function{{.*}}dll_noreturn.cpp
+// CHECK-NEXT:  main{{.*}}dll_host.cpp
 //
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:.*]] in frame
-// CHECK-NEXT:  noreturn_f{{.*}}dll_noreturn.cc
+// CHECK-NEXT:  noreturn_f{{.*}}dll_noreturn.cpp
 // CHECK: 'buffer'{{.*}} <== Memory access at offset [[OFFSET]] underflows this variable
 // CHECK-LABEL: SUMMARY
 }
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
 // RUN: not %run %t %t.dll 2>&1 | FileCheck %s
 
@@ -12,7 +12,7 @@ static void NullDeref(int *ptr) {
 extern "C" __declspec(dllexport)
 int test_function() {
   NullDeref((int*)0);
-  // CHECK: {{    #1 0x.* in test_function .*\dll_null_deref.cc:}}[[@LINE-1]]
+  // CHECK: {{    #1 0x.* in test_function .*\dll_null_deref.cpp:}}[[@LINE-1]]
   // CHECK: AddressSanitizer can not provide additional info.
   return 0;
 }
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
 // RUN: not %run %t %t.dll 2>&1 | FileCheck %s
 
@@ -8,8 +8,8 @@ int test_function() {
   buffer[-1] = 42;
 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_left_oob.cc:[[@LINE-3]]
-// CHECK-NEXT: main {{.*}}dll_host.cc
+// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_left_oob.cpp:[[@LINE-3]]
+// CHECK-NEXT: main {{.*}}dll_host.cpp
 //
 // CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region
 // CHECK-LABEL: allocated by thread T0 here:
@@ -17,8 +17,8 @@ int test_function() {
 // operator new/delete in DLLs when using -MT CRT.
 // FIXME: The 'operator new' frame should have [].
 // CHECK:        operator new
-// CHECK-NEXT:   test_function {{.*}}dll_operator_array_new_left_oob.cc:[[@LINE-13]]
-// CHECK-NEXT:   main {{.*}}dll_host.cc
+// CHECK-NEXT:   test_function {{.*}}dll_operator_array_new_left_oob.cpp:[[@LINE-13]]
+// CHECK-NEXT:   main {{.*}}dll_host.cpp
 // CHECK-LABEL: SUMMARY
   delete [] buffer;
   return 0;
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
 // RUN: not %run %t %t.dll 2>&1 | FileCheck %s
 
@@ -13,8 +13,8 @@ int test_function() {
   buffer[-(1 + sizeof(void*) / 4)].x = 42;
 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 4 at [[ADDR]] thread T0
-// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_with_dtor_left_oob.cc:[[@LINE-3]]
-// CHECK-NEXT: main {{.*}}dll_host.cc
+// CHECK-NEXT: test_function {{.*}}dll_operator_array_new_with_dtor_left_oob.cpp:[[@LINE-3]]
+// CHECK-NEXT: main {{.*}}dll_host.cpp
 //
 // FIXME: Currently it says "4 bytes ... left of 172-byte region",
 //        should be "8 bytes ... left of 168-byte region", see
@@ -25,8 +25,8 @@ int test_function() {
 // FIXME: The operator new frame should have [].
 // CHECK-LABEL: allocated by thread T0 here:
 // CHECK:        operator new
-// CHECK-NEXT:   test_function {{.*}}dll_operator_array_new_with_dtor_left_oob.cc:[[@LINE-16]]
-// CHECK-NEXT:   main {{.*}}dll_host.cc
+// CHECK-NEXT:   test_function {{.*}}dll_operator_array_new_with_dtor_left_oob.cpp:[[@LINE-16]]
+// CHECK-NEXT:   main {{.*}}dll_host.cpp
 // CHECK-LABEL: SUMMARY
   delete [] buffer;
   return 0;
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
 // RUN: not %run %t %t.dll 2>&1 | FileCheck %s
 
@@ -24,12 +24,12 @@ int test_function() {
   should_crash(&buffer[96]);
 // CHECK: AddressSanitizer: use-after-poison on address [[ADDR:0x[0-9a-f]+]]
 // CHECK-NEXT: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: should_crash{{.*}}\dll_poison_unpoison.cc
-// CHECK-NEXT: test_function{{.*}}\dll_poison_unpoison.cc:[[@LINE-4]]
+// CHECK-NEXT: should_crash{{.*}}\dll_poison_unpoison.cpp
+// CHECK-NEXT: test_function{{.*}}\dll_poison_unpoison.cpp:[[@LINE-4]]
 // CHECK-NEXT: main
 //
 // CHECK: [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:.*]] in frame
-// CHECK-NEXT: test_function{{.*}}\dll_poison_unpoison.cc
+// CHECK-NEXT: test_function{{.*}}\dll_poison_unpoison.cpp
 // CHECK: 'buffer'{{.*}} <== Memory access at offset [[OFFSET]] is inside this variable
   return 0;
 }
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 //
 // Check both -GS and -GS- builds:
 // RUN: %clang_cl_asan -GS  -LD -Od %s -Fe%t.dll
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
 // RUN: %env_asan_opts=detect_stack_use_after_return=1 not %run %t %t.dll 2>&1 | FileCheck %s
 
@@ -17,11 +17,11 @@ int test_function() {
   *x = 42;
 // CHECK: AddressSanitizer: stack-use-after-return
 // CHECK: WRITE of size 1 at [[ADDR:.*]] thread T0
-// CHECK-NEXT:  test_function{{.*}}dll_stack_use_after_return.cc:[[@LINE-3]]
+// CHECK-NEXT:  test_function{{.*}}dll_stack_use_after_return.cpp:[[@LINE-3]]
 // CHECK-NEXT:  main
 //
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:.*]] in frame
-// CHECK-NEXT: #0 {{.*}} foo{{.*}}dll_stack_use_after_return.cc
+// CHECK-NEXT: #0 {{.*}} foo{{.*}}dll_stack_use_after_return.cpp
 // CHECK: 'stack_buffer'{{.*}} <== Memory access at offset [[OFFSET]] is inside this variable
   return 0;
 }
@@ -1,4 +1,4 @@
-// RUN: %clang_cl_asan -Od %p/dll_host.cc -Fe%t
+// RUN: %clang_cl_asan -Od %p/dll_host.cpp -Fe%t
 // RUN: %clang_cl_asan -LD -Od %s -Fe%t.dll
 // RUN: not %run %t %t.dll 2>&1 | FileCheck %s
 
@@ -11,10 +11,10 @@ DWORD WINAPI thread_proc(void *context) {
   stack_buffer[subscript] = 42;
 // CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T1
-// CHECK-NEXT:  thread_proc{{.*}}dll_thread_stack_array_left_oob.cc:[[@LINE-3]]
+// CHECK-NEXT:  thread_proc{{.*}}dll_thread_stack_array_left_oob.cpp:[[@LINE-3]]
 //
 // CHECK: Address [[ADDR]] is located in stack of thread T1 at offset [[OFFSET:.*]] in frame
-// CHECK-NEXT:  thread_proc{{.*}}dll_thread_stack_array_left_oob.cc
+// CHECK-NEXT:  thread_proc{{.*}}dll_thread_stack_array_left_oob.cpp
 //
 // CHECK: 'stack_buffer'{{.*}} <== Memory access at offset [[OFFSET]] underflows this variable
 
@@ -25,8 +25,8 @@ extern "C" __declspec(dllexport)
 int test_function() {
   HANDLE thr = CreateThread(NULL, 0, thread_proc, NULL, 0, NULL);
 // CHECK-LABEL: Thread T1 created by T0 here:
-// CHECK:         test_function{{.*}}dll_thread_stack_array_left_oob.cc:[[@LINE-2]]
-// CHECK-NEXT:    main{{.*}}dll_host.cc
+// CHECK:         test_function{{.*}}dll_thread_stack_array_left_oob.cpp:[[@LINE-2]]
+// CHECK-NEXT:    main{{.*}}dll_host.cpp
 // CHECK-LABEL: SUMMARY
   if (thr == 0)
     return 1;
@@ -9,13 +9,13 @@ int main() {
   free(x);
 // CHECK: AddressSanitizer: attempting double-free on [[ADDR:0x[0-9a-f]+]]
 // CHECK-NEXT: {{#0 .* free }}
-// CHECK-NEXT: {{#1 .* main .*double_free.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#1 .* main .*double_free.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 0 bytes inside of 168-byte region
 // CHECK-LABEL: freed by thread T0 here:
 // CHECK-NEXT: {{#0 .* free }}
-// CHECK-NEXT: {{#1 .* main .*double_free.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*double_free.cpp}}:[[@LINE-8]]
 // CHECK-LABEL: previously allocated by thread T0 here:
 // CHECK-NEXT: {{#0 .* malloc }}
-// CHECK-NEXT: {{#1 .* main .*double_free.cc}}:[[@LINE-12]]
+// CHECK-NEXT: {{#1 .* main .*double_free.cpp}}:[[@LINE-12]]
   return 0;
 }
@@ -10,16 +10,16 @@ int main() {
 // CHECK: AddressSanitizer: attempting double-free on [[ADDR:0x[0-9a-f]+]]
 // FIXME: The 'operator delete' frame should have [].
 // CHECK-NEXT: {{#0 .* operator delete}}
-// CHECK-NEXT: {{#1 .* main .*double_operator_delete.cc}}:[[@LINE-4]]
+// CHECK-NEXT: {{#1 .* main .*double_operator_delete.cpp}}:[[@LINE-4]]
 // CHECK: [[ADDR]] is located 0 bytes inside of 168-byte region
 // CHECK-LABEL: freed by thread T0 here:
 // FIXME: The 'operator delete' frame should have [].
 // CHECK-NEXT: {{#0 .* operator delete}}
-// CHECK-NEXT: {{#1 .* main .*double_operator_delete.cc}}:[[@LINE-10]]
+// CHECK-NEXT: {{#1 .* main .*double_operator_delete.cpp}}:[[@LINE-10]]
 // CHECK-LABEL: previously allocated by thread T0 here:
 // FIXME: The 'operator new' frame should have [].
 // CHECK-NEXT: {{#0 .* operator new}}
-// CHECK-NEXT: {{#1 .* main .*double_operator_delete.cc}}:[[@LINE-15]]
+// CHECK-NEXT: {{#1 .* main .*double_operator_delete.cpp}}:[[@LINE-15]]
   return 0;
 }
 
@@ -10,7 +10,7 @@ int main(int argc, char **argv) {
   memset(ZZZ, 0, 10);
   int res = YYY[argc * 10];  // BOOOM
   // CHECK: {{READ of size 1 at 0x.* thread T0}}
-  // CHECK: {{    #0 0x.* in main .*fuse-lld-globals.cc:}}[[@LINE-2]]
+  // CHECK: {{    #0 0x.* in main .*fuse-lld-globals.cpp:}}[[@LINE-2]]
   // CHECK: {{0x.* is located 0 bytes to the right of global variable}}
   // CHECK:   {{.*YYY.* of size 10}}
   res += XXX[argc] + ZZZ[argc];
@@ -13,7 +13,7 @@ int main() {
   return x[5];
   // CHECK: heap-use-after-free
   // CHECK: free
-  // CHECK: main{{.*}}fuse-lld.cc:[[@LINE-4]]:3
+  // CHECK: main{{.*}}fuse-lld.cpp:[[@LINE-4]]:3
   // CHECK: malloc
-  // CHECK: main{{.*}}fuse-lld.cc:[[@LINE-7]]:20
+  // CHECK: main{{.*}}fuse-lld.cpp:[[@LINE-7]]:20
 }
@@ -12,8 +12,8 @@ int main(void) {
 // CHECK-NOT: Boo
 // CHECK: AddressSanitizer: global-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: READ of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT:   {{#0 .* main .*global_const_string_oob.cc:}}[[@LINE-5]]
-// CHECK: [[ADDR]] is located 5 bytes to the right of global variable [[STR:.*]] defined in {{'.*global_const_string_oob.cc:7:.*' .*}} of size 11
+// CHECK-NEXT:   {{#0 .* main .*global_const_string_oob.cpp:}}[[@LINE-5]]
+// CHECK: [[ADDR]] is located 5 bytes to the right of global variable [[STR:.*]] defined in {{'.*global_const_string_oob.cpp:7:.*' .*}} of size 11
 // CHECK:   [[STR]] is ascii string 'foobarspam'
   return 0;
 }
@@ -24,7 +24,7 @@ int main() {
 // CHECK: WRITE of size 6 at [[ADDR]] thread T0
 // CHECK-NEXT:  __asan_{{.*}}mem{{.*}}
 // CHECK-NEXT:  call_mem{{.*}}
-// CHECK-NEXT:  main {{.*}}intercept_memcpy.cc:[[@LINE-5]]
+// CHECK-NEXT:  main {{.*}}intercept_memcpy.cpp:[[@LINE-5]]
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
 // CHECK-NEXT:   #0 {{.*}} main
 // CHECK: 'buff2'{{.*}} <== Memory access at offset {{.*}} overflows this variable
@@ -17,7 +17,7 @@ int main() {
   ptr[subscript] = 42;
 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK:   {{#0 .* main .*}}intercept_strdup.cc:[[@LINE-3]]
+// CHECK:   {{#0 .* main .*}}intercept_strdup.cpp:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 1 bytes to the left of 6-byte region
 // CHECK: allocated by thread T0 here:
 //
@@ -27,6 +27,6 @@ int main() {
 //
 // The local call to _strdup above may be the second or third frame depending
 // on whether we're using the dynamic config.
-// CHECK:   #{{[12]}} {{.*}} in main {{.*}}intercept_strdup.cc:[[@LINE-21]]
+// CHECK:   #{{[12]}} {{.*}} in main {{.*}}intercept_strdup.cpp:[[@LINE-21]]
   free(ptr);
 }
@@ -19,9 +19,9 @@ int main() {
 // FIXME: Should be READ of size 1, see issue 155.
 // CHECK: READ of size {{[0-9]+}} at [[ADDR]] thread T0
 // CHECK:      strlen 
-// CHECK-NEXT: main {{.*}}intercept_strlen.cc:[[@LINE-5]]
+// CHECK-NEXT: main {{.*}}intercept_strlen.cpp:[[@LINE-5]]
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
-// CHECK-NEXT: main {{.*}}intercept_strlen.cc
+// CHECK-NEXT: main {{.*}}intercept_strlen.cpp
 // CHECK: 'str'{{.*}} <== Memory access at offset {{.*}} overflows this variable
   return len < 6;
 }
@@ -8,10 +8,10 @@ int main() {
   buffer[-1] = 42;
 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*malloc_left_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*malloc_left_oob.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region
 // CHECK: allocated by thread T0 here:
 // CHECK-NEXT: {{#0 .* malloc }}
-// CHECK-NEXT: {{#1 .* main .*malloc_left_oob.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*malloc_left_oob.cpp}}:[[@LINE-8]]
   free(buffer);
 }
@@ -8,10 +8,10 @@ int main() {
   buffer[42] = 42;
 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*malloc_right_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*malloc_right_oob.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 0 bytes to the right of 42-byte region
 // CHECK: allocated by thread T0 here:
 // CHECK-NEXT: {{#0 .* malloc }}
-// CHECK-NEXT: {{#1 .* main .*malloc_right_oob.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*malloc_right_oob.cpp}}:[[@LINE-8]]
   free(buffer);
 }
@@ -9,12 +9,12 @@ int main() {
   buffer[0] = 42;
 // CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*malloc_uaf.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*malloc_uaf.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 0 bytes inside of 42-byte region
 // CHECK: freed by thread T0 here:
 // CHECK-NEXT: {{#0 .* free }}
-// CHECK-NEXT: {{#1 .* main .*malloc_uaf.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*malloc_uaf.cpp}}:[[@LINE-8]]
 // CHECK: previously allocated by thread T0 here:
 // CHECK-NEXT: {{#0 .* malloc }}
-// CHECK-NEXT: {{#1 .* main .*malloc_uaf.cc}}:[[@LINE-12]]
+// CHECK-NEXT: {{#1 .* main .*malloc_uaf.cpp}}:[[@LINE-12]]
 }
@@ -10,6 +10,6 @@ static void NullDeref(int *ptr) {
 }
 int main() {
   NullDeref((int*)0);
-  // CHECK: {{    #1 0x.* in main.*null_deref.cc:}}[[@LINE-1]]:3
+  // CHECK: {{    #1 0x.* in main.*null_deref.cpp:}}[[@LINE-1]]:3
   // CHECK: AddressSanitizer can not provide additional info.
 }
@@ -31,7 +31,7 @@ static void NullDeref(int *ptr) {
 
 __declspec(dllexport) void foo2() {
   NullDeref((int*)0);
-  // CHECK: {{    #1 0x.* in foo2.*null_deref_multiple_dlls.cc:}}[[@LINE-1]]
+  // CHECK: {{    #1 0x.* in foo2.*null_deref_multiple_dlls.cpp:}}[[@LINE-1]]
   // CHECK: AddressSanitizer can not provide additional info.
 }
 #else
@@ -6,12 +6,12 @@ int main() {
   buffer[-1] = 42;
 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*operator_array_new_left_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*operator_array_new_left_oob.cpp}}:[[@LINE-3]]
 //
 // CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region
 // CHECK-LABEL: allocated by thread T0 here:
 // FIXME: The 'operator new' frame should have [].
 // CHECK-NEXT: {{#0 .* operator new}}
-// CHECK-NEXT: {{#1 .* main .*operator_array_new_left_oob.cc}}:[[@LINE-10]]
+// CHECK-NEXT: {{#1 .* main .*operator_array_new_left_oob.cpp}}:[[@LINE-10]]
   delete [] buffer;
 }
@@ -8,11 +8,11 @@ int main() {
   buffer[42] = 42;
 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK:   {{#0 .* main .*operator_array_new_right_oob.cc}}:[[@LINE-3]]
+// CHECK:   {{#0 .* main .*operator_array_new_right_oob.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 0 bytes to the right of 42-byte region
 // CHECK: allocated by thread T0 here:
 // FIXME: The 'operator new' frame should have [].
 // CHECK:   {{#0 .* operator new}}
-// CHECK:   {{#1 .* main .*operator_array_new_right_oob.cc}}:[[@LINE-9]]
+// CHECK:   {{#1 .* main .*operator_array_new_right_oob.cpp}}:[[@LINE-9]]
   delete [] buffer;
 }
@@ -9,16 +9,16 @@ int main() {
   buffer[0] = 42;
 // CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK:   {{#0 .* main .*operator_array_new_uaf.cc}}:[[@LINE-3]]
+// CHECK:   {{#0 .* main .*operator_array_new_uaf.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 0 bytes inside of 42-byte region
 // CHECK-LABEL: freed by thread T0 here:
 // FIXME: The 'operator delete' frame should have [].
 // CHECK:   {{#0 .* operator delete}}
-// CHECK:   {{#1 .* main .*operator_array_new_uaf.cc}}:[[@LINE-9]]
+// CHECK:   {{#1 .* main .*operator_array_new_uaf.cpp}}:[[@LINE-9]]
 // CHECK-LABEL: previously allocated by thread T0 here:
 // FIXME: The 'operator new' frame should have [].
 // CHECK:   {{#0 .* operator new}}
-// CHECK:   {{#1 .* main .*operator_array_new_uaf.cc}}:[[@LINE-14]]
+// CHECK:   {{#1 .* main .*operator_array_new_uaf.cpp}}:[[@LINE-14]]
   return 0;
 }
 
@@ -11,7 +11,7 @@ int main() {
   buffer[-(1 + sizeof(void*) / 4)].x = 42;
 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 4 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*operator_array_new_with_dtor_left_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*operator_array_new_with_dtor_left_oob.cpp}}:[[@LINE-3]]
 //
 // FIXME: Currently it says "4 bytes ... left of 172-byte region",
 //        should be "8 bytes ... left of 168-byte region", see
@@ -20,6 +20,6 @@ int main() {
 // CHECK-LABEL: allocated by thread T0 here:
 // FIXME: The 'operator new' frame should have [].
 // CHECK-NEXT: {{#0 .* operator new}}
-// CHECK-NEXT: {{#1 .* main .*operator_array_new_with_dtor_left_oob.cc}}:[[@LINE-13]]
+// CHECK-NEXT: {{#1 .* main .*operator_array_new_with_dtor_left_oob.cpp}}:[[@LINE-13]]
   delete [] buffer;
 }
@@ -8,5 +8,5 @@ int main() {
   delete (x + 1);
 // CHECK: AddressSanitizer: attempting free on address which was not malloc()-ed
 // CHECK:   {{#0 0x.* operator delete}}
-// CHECK:   {{#1 .* main .*operator_delete_wrong_argument.cc}}:[[@LINE-3]]
+// CHECK:   {{#1 .* main .*operator_delete_wrong_argument.cpp}}:[[@LINE-3]]
 }
@@ -8,10 +8,10 @@ int main() {
   buffer[-1] = 42;
 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK:   {{#0 .* main .*operator_new_left_oob.cc}}:[[@LINE-3]]
+// CHECK:   {{#0 .* main .*operator_new_left_oob.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 1 bytes to the left of 1-byte region
 // CHECK: allocated by thread T0 here:
 // CHECK:   {{#0 .* operator new}}
-// CHECK:   {{#1 .* main .*operator_new_left_oob.cc}}:[[@LINE-8]]
+// CHECK:   {{#1 .* main .*operator_new_left_oob.cpp}}:[[@LINE-8]]
   delete buffer;
 }
@@ -8,10 +8,10 @@ int main() {
   buffer[1] = 42;
 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK:   {{#0 .* main .*operator_new_right_oob.cc}}:[[@LINE-3]]
+// CHECK:   {{#0 .* main .*operator_new_right_oob.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 0 bytes to the right of 1-byte region
 // CHECK: allocated by thread T0 here:
 // CHECK:   {{#0 .* operator new}}
-// CHECK:   {{#1 .* main .*operator_new_right_oob.cc}}:[[@LINE-8]]
+// CHECK:   {{#1 .* main .*operator_new_right_oob.cpp}}:[[@LINE-8]]
   delete buffer;
 }
@@ -9,14 +9,14 @@ int main() {
   *buffer = 42;
 // CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK:   {{#0 .* main .*operator_new_uaf.cc}}:[[@LINE-3]]
+// CHECK:   {{#0 .* main .*operator_new_uaf.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 0 bytes inside of 1-byte region
 // CHECK-LABEL: freed by thread T0 here:
 // CHECK:   {{#0 .* operator delete}}
-// CHECK:   {{#1 .* main .*operator_new_uaf.cc}}:[[@LINE-8]]
+// CHECK:   {{#1 .* main .*operator_new_uaf.cpp}}:[[@LINE-8]]
 // CHECK-LABEL: previously allocated by thread T0 here:
 // CHECK:   {{#0 .* operator new}}
-// CHECK:   {{#1 .* main .*operator_new_uaf.cc}}:[[@LINE-12]]
+// CHECK:   {{#1 .* main .*operator_new_uaf.cpp}}:[[@LINE-12]]
   return 0;
 }
 
@@ -11,7 +11,7 @@ DWORD CALLBACK work_item(LPVOID) {
   stack_buffer[subscript] = 42;
   // CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]]
   // CHECK: WRITE of size 1 at [[ADDR]] thread T{{[0-9]+}}
-  // CHECK:   {{#0 .* work_item.*queue_user_work_item_report.cc}}:[[@LINE-3]]
+  // CHECK:   {{#0 .* work_item.*queue_user_work_item_report.cpp}}:[[@LINE-3]]
   SetEvent(done);
   return 0;
 }
@@ -8,10 +8,10 @@ int main() {
   buffer[-1] = 42;
 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*realloc_left_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*realloc_left_oob.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region
 // CHECK: allocated by thread T0 here:
 // CHECK-NEXT: {{#0 .* realloc }}
-// CHECK-NEXT: {{#1 .* main .*realloc_left_oob.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*realloc_left_oob.cpp}}:[[@LINE-8]]
   free(buffer);
 }
@@ -8,10 +8,10 @@ int main() {
   buffer[42] = 42;
 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*realloc_right_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*realloc_right_oob.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 0 bytes to the right of 42-byte region
 // CHECK: allocated by thread T0 here:
 // CHECK-NEXT: {{#0 .* realloc }}
-// CHECK-NEXT: {{#1 .* main .*realloc_right_oob.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*realloc_right_oob.cpp}}:[[@LINE-8]]
   free(buffer);
 }
@@ -9,12 +9,12 @@ int main() {
   buffer[0] = 42;
 // CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*realloc_uaf.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*realloc_uaf.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 0 bytes inside of 42-byte region
 // CHECK: freed by thread T0 here:
 // CHECK-NEXT: {{#0 .* free }}
-// CHECK-NEXT: {{#1 .* main .*realloc_uaf.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*realloc_uaf.cpp}}:[[@LINE-8]]
 // CHECK: previously allocated by thread T0 here:
 // CHECK-NEXT: {{#0 .* realloc }}
-// CHECK-NEXT: {{#1 .* main .*realloc_uaf.cc}}:[[@LINE-12]]
+// CHECK-NEXT: {{#1 .* main .*realloc_uaf.cpp}}:[[@LINE-12]]
 }
@@ -20,6 +20,6 @@ int main() {
   // CHECK: Hint: address points to the zero page.
   // CHECK: {{WARNING: .*DbgHelp}}
   // CHECK: {{WARNING: Failed to use and restart external symbolizer}}
-  // CHECK: {{#0 0x.* in main.*report_after_syminitialize.cc:}}[[@LINE-6]]
+  // CHECK: {{#0 0x.* in main.*report_after_syminitialize.cpp:}}[[@LINE-6]]
   // CHECK: AddressSanitizer can not provide additional info.
 }
@@ -24,6 +24,6 @@ extern "C" __declspec(dllexport) int test_function() { return 0; }
 // CHECK: =={{[0-9:]+}}==ASan shadow was supposed to be located in the [0x2fff0000-0x3fffffff] range.
 // CHECK: =={{[0-9:]+}}==Dumping process modules
 
-// CHECK-DAG: {{0x30000000-0x300.....}} {{.*}}\shadow_conflict_32.cc.tmp_dll.dll
-// CHECK-DAG: {{0x........-0x........}} {{.*}}\shadow_conflict_32.cc.tmp.exe
+// CHECK-DAG: {{0x30000000-0x300.....}} {{.*}}\shadow_conflict_32.cpp.tmp_dll.dll
+// CHECK-DAG: {{0x........-0x........}} {{.*}}\shadow_conflict_32.cpp.tmp.exe
 // CHECK-DAG: {{0x........-0x........}} {{.*}}\ntdll.dll
@@ -9,8 +9,8 @@ int main() {
   buffer[subscript] = 42;
 // CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*stack_array_left_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*stack_array_left_oob.cpp}}:[[@LINE-3]]
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:.*]] in frame
-// CHECK-NEXT: {{#0 .* main .*stack_array_left_oob.cc}}
+// CHECK-NEXT: {{#0 .* main .*stack_array_left_oob.cpp}}
 // CHECK: 'buffer'{{.*}} <== Memory access at offset [[OFFSET]] underflows this variable
 }
@@ -9,8 +9,8 @@ int main() {
   buffer[subscript] = 42;
 // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*stack_array_right_oob.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*stack_array_right_oob.cpp}}:[[@LINE-3]]
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:.*]] in frame
-// CHECK-NEXT: {{#0 .* main .*stack_array_right_oob.cc}}
+// CHECK-NEXT: {{#0 .* main .*stack_array_right_oob.cpp}}
 // CHECK: 'buffer'{{.*}} <== Memory access at offset [[OFFSET]] overflows this variable
 }
@@ -13,10 +13,10 @@ int main() {
   *x = 42;
 // CHECK: AddressSanitizer: stack-use-after-return
 // CHECK: WRITE of size 1 at {{.*}} thread T0
-// CHECK-NEXT: {{#0 0x.* in main .*stack_use_after_return.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 0x.* in main .*stack_use_after_return.cpp}}:[[@LINE-3]]
 //
 // CHECK: is located in stack of thread T0 at offset [[OFFSET:.*]] in frame
-// CHECK-NEXT: {{#0 0x.* in foo.*stack_use_after_return.cc}}
+// CHECK-NEXT: {{#0 0x.* in foo.*stack_use_after_return.cpp}}
 //
 // CHECK: 'stack_buffer'{{.*}} <== Memory access at offset [[OFFSET]] is inside this variable
 }
@@ -13,10 +13,10 @@ int main() {
   buffer[-1] = 42;
 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*symbols_path.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*symbols_path.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region
 // CHECK: allocated by thread T0 here:
 // CHECK-NEXT: {{#0 .* malloc}}
-// CHECK-NEXT: {{#1 .* main .*symbols_path.cc}}:[[@LINE-8]]
+// CHECK-NEXT: {{#1 .* main .*symbols_path.cpp}}:[[@LINE-8]]
   free(buffer);
 }
@@ -9,7 +9,7 @@ DWORD WINAPI thread_proc(void *) {
   stack_buffer[subscript] = 42;
 // CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T1
-// CHECK:   {{#0 .* thread_proc.*thread_stack_array_left_oob.cc}}:[[@LINE-3]]
+// CHECK:   {{#0 .* thread_proc.*thread_stack_array_left_oob.cpp}}:[[@LINE-3]]
 // CHECK: Address [[ADDR]] is located in stack of thread T1 at offset {{.*}} in frame
 // CHECK:   thread_proc
   return 0;
@@ -18,7 +18,7 @@ DWORD WINAPI thread_proc(void *) {
 int main() {
   HANDLE thr = CreateThread(NULL, 0, thread_proc, NULL, 0, NULL);
 // CHECK: Thread T1 created by T0 here:
-// CHECK:   {{#[01] .* main .*thread_stack_array_left_oob.cc}}:[[@LINE-2]]
+// CHECK:   {{#[01] .* main .*thread_stack_array_left_oob.cpp}}:[[@LINE-2]]
 
   // A failure to create a thread should fail the test!
   if (thr == 0) return 0;
@@ -9,7 +9,7 @@ DWORD WINAPI thread_proc(void *) {
   stack_buffer[subscript] = 42;
 // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T1
-// CHECK:   {{#0 .* thread_proc.*thread_stack_array_right_oob.cc}}:[[@LINE-3]]
+// CHECK:   {{#0 .* thread_proc.*thread_stack_array_right_oob.cpp}}:[[@LINE-3]]
 // CHECK: Address [[ADDR]] is located in stack of thread T1 at offset {{.*}} in frame
 // CHECK:   thread_proc
   return 0;
@@ -18,7 +18,7 @@ DWORD WINAPI thread_proc(void *) {
 int main(void) {
   HANDLE thr = CreateThread(NULL, 0, thread_proc, NULL, 0, NULL);
 // CHECK: Thread T1 created by T0 here:
-// CHECK:   {{#[01] .* main .*thread_stack_array_right_oob.cc}}:[[@LINE-2]]
+// CHECK:   {{#[01] .* main .*thread_stack_array_right_oob.cpp}}:[[@LINE-2]]
 
   // A failure to create a thread should fail the test!
   if (thr == 0) return 0;
@@ -20,6 +20,6 @@ int do_uaf(void) {
   free(x);
   return x[5];
   // CHECK: AddressSanitizer: heap-use-after-free
-  // CHECK: #0 {{0x[a-f0-9]+ \(.*[\\/]unsymbolized.cc.*.exe\+(0x40|0x14000)[a-f0-9]{4}\)}}
-  // CHECK: #1 {{0x[a-f0-9]+ \(.*[\\/]unsymbolized.cc.*.exe\+(0x40|0x14000)[a-f0-9]{4}\)}}
+  // CHECK: #0 {{0x[a-f0-9]+ \(.*[\\/]unsymbolized.cpp.*.exe\+(0x40|0x14000)[a-f0-9]{4}\)}}
+  // CHECK: #1 {{0x[a-f0-9]+ \(.*[\\/]unsymbolized.cpp.*.exe\+(0x40|0x14000)[a-f0-9]{4}\)}}
 }
@@ -11,13 +11,13 @@ int main() {
   stale[0] = 42;
 // CHECK: AddressSanitizer: heap-use-after-free on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
-// CHECK-NEXT: {{#0 .* main .*use_after_realloc.cc}}:[[@LINE-3]]
+// CHECK-NEXT: {{#0 .* main .*use_after_realloc.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 0 bytes inside of 32-byte region
 // CHECK: freed by thread T0 here:
 // CHECK-NEXT: {{#0 .* realloc }}
-// CHECK-NEXT: {{#1 .* main .*use_after_realloc.cc}}:[[@LINE-9]]
+// CHECK-NEXT: {{#1 .* main .*use_after_realloc.cpp}}:[[@LINE-9]]
 // CHECK: previously allocated by thread T0 here:
 // CHECK-NEXT: {{#0 .* realloc }}
-// CHECK-NEXT: {{#1 .* main .*use_after_realloc.cc}}:[[@LINE-14]]
+// CHECK-NEXT: {{#1 .* main .*use_after_realloc.cpp}}:[[@LINE-14]]
   free(buffer);
 }
@@ -17,7 +17,7 @@ int main(void) {
   c->extra_field = 42;
 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 4 at [[ADDR]] thread T0
-// CHECK:   {{#0 0x[0-9a-f]* in main .*wrong_downcast_on_heap.cc}}:[[@LINE-3]]
+// CHECK:   {{#0 0x[0-9a-f]* in main .*wrong_downcast_on_heap.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located 0 bytes to the right of 4-byte region
 // CHECK: allocated by thread T0 here:
 // CHECK:   #0 {{.*}} operator new
@@ -17,7 +17,7 @@ int main(void) {
   c->extra_field = 42;
 // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 4 at [[ADDR]] thread T0
-// CHECK-NEXT:  {{#0 0x[0-9a-f]* in main .*wrong_downcast_on_stack.cc}}:[[@LINE-3]]
+// CHECK-NEXT:  {{#0 0x[0-9a-f]* in main .*wrong_downcast_on_stack.cpp}}:[[@LINE-3]]
 // CHECK: [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:[0-9]+]] in frame
 // CHECK-NEXT:  {{#0 0x[0-9a-f]* in main }}
 // CHECK:  'p'{{.*}} <== Memory access at offset [[OFFSET]] overflows this variable
similarity index 73%
rename from compiler-rt/test/asan/TestCases/blacklist.cc
rename to compiler-rt/test/asan/TestCases/blacklist.cpp
index 7c31484..9508f6f 100644 (file)
@@ -2,15 +2,15 @@
 
 // RUN: echo "fun:*brokenFunction*" > %tmp
 // RUN: echo "global:*badGlobal*" >> %tmp
-// RUN: echo "src:*blacklist-extra.cc" >> %tmp
+// RUN: echo "src:*blacklist-extra.cpp" >> %tmp
 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O0 %s -o %t \
-// RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1
+// RUN: %p/Helpers/blacklist-extra.cpp && %run %t 2>&1
 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O1 %s -o %t \
-// RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1
+// RUN: %p/Helpers/blacklist-extra.cpp && %run %t 2>&1
 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O2 %s -o %t \
-// RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1
+// RUN: %p/Helpers/blacklist-extra.cpp && %run %t 2>&1
 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O3 %s -o %t \
-// RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1
+// RUN: %p/Helpers/blacklist-extra.cpp && %run %t 2>&1
 
 // badGlobal is accessed improperly, but we blacklisted it. Align
 // it to make sure memory past the end of badGlobal will be in
@@ -26,7 +26,7 @@ int brokenFunction(int argc) {
   return x[argc * 10];  // BOOM
 }
 
-// This function is defined in Helpers/blacklist-extra.cc, a source file which
+// This function is defined in Helpers/blacklist-extra.cpp, a source file which
 // is blacklisted by name
 int externalBrokenFunction(int x);
 
@@ -11,7 +11,7 @@ int main() {
   void *p = calloc(-1, 1000);
   // CHECK: {{ERROR: AddressSanitizer: calloc parameters overflow: count \* size \(.* \* 1000\) cannot be represented in type size_t}}
   // CHECK: {{#0 0x.* in .*calloc}}
-  // CHECK: {{#1 0x.* in main .*calloc-overflow.cc:}}[[@LINE-3]]
+  // CHECK: {{#1 0x.* in main .*calloc-overflow.cpp:}}[[@LINE-3]]
   // CHECK: SUMMARY: AddressSanitizer: calloc-overflow
 
   printf("calloc returned: %zu\n", (size_t)p);
@@ -19,12 +19,12 @@ int main(int argc, char **argv) {
   free(x + argc - 1);  // BOOM
   // CHECK: AddressSanitizer: attempting double-free{{.*}}in thread T0
   // CHECK: #0 0x{{.*}} in {{.*}}free
-  // CHECK: #1 0x{{.*}} in main {{.*}}double-free.cc:[[@LINE-3]]
+  // CHECK: #1 0x{{.*}} in main {{.*}}double-free.cpp:[[@LINE-3]]
   // CHECK: freed by thread T0 here:
   // MALLOC-CTX: #0 0x{{.*}} in {{.*}}free
-  // MALLOC-CTX: #1 0x{{.*}} in main {{.*}}double-free.cc:[[@LINE-7]]
+  // MALLOC-CTX: #1 0x{{.*}} in main {{.*}}double-free.cpp:[[@LINE-7]]
   // CHECK: allocated by thread T0 here:
-  // MALLOC-CTX: double-free.cc:[[@LINE-12]]
+  // MALLOC-CTX: double-free.cpp:[[@LINE-12]]
   // CHECK-RECOVER: AddressSanitizer: attempting double-free{{.*}}in thread T0
   // CHECK-RECOVER-NOT: AddressSanitizer CHECK failed:
   return res;
@@ -13,9 +13,9 @@ struct C {
 };
 
 int global[10];
-// GLOB: 0x{{.*}} is located 4 bytes to the right of global variable 'global' defined in '{{.*}}global-location.cc:[[@LINE-1]]:5' {{.*}} of size 40
+// GLOB: 0x{{.*}} is located 4 bytes to the right of global variable 'global' defined in '{{.*}}global-location.cpp:[[@LINE-1]]:5' {{.*}} of size 40
 int C::array[10];
-// CLASS_STATIC: 0x{{.*}} is located 4 bytes to the right of global variable 'C::array' defined in '{{.*}}global-location.cc:[[@LINE-1]]:8' {{.*}} of size 40
+// CLASS_STATIC: 0x{{.*}} is located 4 bytes to the right of global variable 'C::array' defined in '{{.*}}global-location.cpp:[[@LINE-1]]:8' {{.*}} of size 40
 
 int main(int argc, char **argv) {
   int one = argc - 1;
@@ -24,12 +24,12 @@ int main(int argc, char **argv) {
   case 'c': return C::array[one * 11];
   case 'f':
     static int array[10];
-    // FUNC_STATIC: 0x{{.*}} is located 4 bytes to the right of global variable 'array' defined in '{{.*}}global-location.cc:[[@LINE-1]]:16' {{.*}} of size 40
+    // FUNC_STATIC: 0x{{.*}} is located 4 bytes to the right of global variable 'array' defined in '{{.*}}global-location.cpp:[[@LINE-1]]:16' {{.*}} of size 40
     memset(array, 0, 10);
     return array[one * 11];
   case 'l':
     const char *str = "0123456789";
-    // LITERAL: 0x{{.*}} is located 0 bytes to the right of global variable {{.*}} defined in '{{.*}}global-location.cc:[[@LINE-1]]:23' {{.*}} of size 11
+    // LITERAL: 0x{{.*}} is located 0 bytes to the right of global variable {{.*}} defined in '{{.*}}global-location.cpp:[[@LINE-1]]:23' {{.*}} of size 11
     return str[one * 11];
   }
   return 0;
@@ -13,7 +13,7 @@ int main(int argc, char **argv) {
   memset(ZZZ, 0, 10);
   int res = YYY[argc * 10];  // BOOOM
   // CHECK: {{READ of size 1 at 0x.* thread T0}}
-  // CHECK: {{    #0 0x.* in main .*global-overflow.cc:}}[[@LINE-2]]
+  // CHECK: {{    #0 0x.* in main .*global-overflow.cpp:}}[[@LINE-2]]
   // CHECK: {{0x.* is located 0 bytes to the right of global variable}}
   // CHECK:   {{.*YYY.* of size 10}}
   res += XXX[argc] + ZZZ[argc];
diff --git a/compiler-rt/test/asan/TestCases/global-underflow.cc b/compiler-rt/test/asan/TestCases/global-underflow.cc
deleted file mode 100644 (file)
index 4a03513..0000000
+++ /dev/null
@@ -1,17 +0,0 @@
-// RUN: %clangxx_asan -O0 %s %p/Helpers/underflow.cc -o %t && not %run %t 2>&1 | FileCheck %s
-// RUN: %clangxx_asan -O1 %s %p/Helpers/underflow.cc -o %t && not %run %t 2>&1 | FileCheck %s
-// RUN: %clangxx_asan -O2 %s %p/Helpers/underflow.cc -o %t && not %run %t 2>&1 | FileCheck %s
-// RUN: %clangxx_asan -O3 %s %p/Helpers/underflow.cc -o %t && not %run %t 2>&1 | FileCheck %s
-
-int XXX[2] = {2, 3};
-extern int YYY[];
-#include <string.h>
-int main(int argc, char **argv) {
-  memset(XXX, 0, 2*sizeof(int));
-  // CHECK: {{READ of size 4 at 0x.* thread T0}}
-  // CHECK: {{    #0 0x.* in main .*global-underflow.cc:}}[[@LINE+3]]
-  // CHECK: {{0x.* is located 4 bytes to the left of global variable}}
-  // CHECK:   {{.*YYY.* of size 12}}
-  int res = YYY[-1];
-  return res;
-}
diff --git a/compiler-rt/test/asan/TestCases/global-underflow.cpp b/compiler-rt/test/asan/TestCases/global-underflow.cpp
new file mode 100644 (file)
index 0000000..81aac58
--- /dev/null
@@ -0,0 +1,17 @@
+// RUN: %clangxx_asan -O0 %s %p/Helpers/underflow.cpp -o %t && not %run %t 2>&1 | FileCheck %s
+// RUN: %clangxx_asan -O1 %s %p/Helpers/underflow.cpp -o %t && not %run %t 2>&1 | FileCheck %s
+// RUN: %clangxx_asan -O2 %s %p/Helpers/underflow.cpp -o %t && not %run %t 2>&1 | FileCheck %s
+// RUN: %clangxx_asan -O3 %s %p/Helpers/underflow.cpp -o %t && not %run %t 2>&1 | FileCheck %s
+
+int XXX[2] = {2, 3};
+extern int YYY[];
+#include <string.h>
+int main(int argc, char **argv) {
+  memset(XXX, 0, 2*sizeof(int));
+  // CHECK: {{READ of size 4 at 0x.* thread T0}}
+  // CHECK: {{    #0 0x.* in main .*global-underflow.cpp:}}[[@LINE+3]]
+  // CHECK: {{0x.* is located 4 bytes to the left of global variable}}
+  // CHECK:   {{.*YYY.* of size 12}}
+  int res = YYY[-1];
+  return res;
+}
@@ -14,7 +14,7 @@ int main(int argc, char **argv) {
   memset(x, 0, 10);
   int res = x[argc * 10];  // BOOOM
   // CHECK: {{READ of size 1 at 0x.* thread T0}}
-  // CHECK: {{    #0 0x.* in main .*heap-overflow.cc:}}[[@LINE-2]]
+  // CHECK: {{    #0 0x.* in main .*heap-overflow.cpp:}}[[@LINE-2]]
   // CHECK: {{0x.* is located 0 bytes to the right of 10-byte region}}
   // CHECK: {{allocated by thread T0 here:}}
 
@@ -64,7 +64,7 @@ int main(int argc, char **argv) {
   stale_stack[100]++;
   // CHECK: ERROR: AddressSanitizer: stack-use-after-return on address
   // CHECK: is located in stack of thread T0 at offset {{116|132}} in frame
-  // CHECK:  in LeakStack{{.*}}heavy_uar_test.cc:
+  // CHECK:  in LeakStack{{.*}}heavy_uar_test.cpp:
   // CHECK: [{{16|32}}, {{1040|1056}}) 'x'
   return 0;
 }
@@ -4,7 +4,7 @@
 // (3) destructor of A reads uninitialized global C from another module.
 // We do *not* want to report init-order bug in this case.
 
-// RUN: %clangxx_asan -O0 %s %p/Helpers/init-order-atexit-extra.cc -o %t
+// RUN: %clangxx_asan -O0 %s %p/Helpers/init-order-atexit-extra.cpp -o %t
 // RUN: %env_asan_opts=strict_init_order=true not %run %t 2>&1 | FileCheck %s
 
 #include <stdio.h>
@@ -1,15 +1,15 @@
 // Test for blacklist functionality of initialization-order checker.
 
-// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-blacklist-extra.cc\
-// RUN:   %p/Helpers/initialization-blacklist-extra2.cc \
+// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-blacklist-extra.cpp\
+// RUN:   %p/Helpers/initialization-blacklist-extra2.cpp \
 // RUN:   -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t
 // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
-// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-blacklist-extra.cc\
-// RUN:   %p/Helpers/initialization-blacklist-extra2.cc \
+// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-blacklist-extra.cpp\
+// RUN:   %p/Helpers/initialization-blacklist-extra2.cpp \
 // RUN:   -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t
 // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
-// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-blacklist-extra.cc\
-// RUN:   %p/Helpers/initialization-blacklist-extra2.cc \
+// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-blacklist-extra.cpp\
+// RUN:   %p/Helpers/initialization-blacklist-extra2.cpp \
 // RUN:   -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t
 // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
 
@@ -1,6 +1,6 @@
 // Test to make sure basic initialization order errors are caught.
 
-// RUN: %clangxx_asan %macos_min_target_10_11 -O0 %s %p/Helpers/initialization-bug-extra2.cc -o %t-INIT-ORDER-EXE
+// RUN: %clangxx_asan %macos_min_target_10_11 -O0 %s %p/Helpers/initialization-bug-extra2.cpp -o %t-INIT-ORDER-EXE
 // RUN: %env_asan_opts=check_initialization_order=true not %run %t-INIT-ORDER-EXE 2>&1 | FileCheck %s
 
 // Do not test with optimization -- the error may be optimized away.
@@ -4,13 +4,13 @@
 // constructor implies that it was initialized during constant initialization,
 // not dynamic initialization).
 
-// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-constexpr-extra.cc --std=c++11 -o %t
+// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-constexpr-extra.cpp --std=c++11 -o %t
 // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
-// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-constexpr-extra.cc --std=c++11 -o %t
+// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-constexpr-extra.cpp --std=c++11 -o %t
 // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
-// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-constexpr-extra.cc --std=c++11 -o %t
+// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-constexpr-extra.cpp --std=c++11 -o %t
 // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
-// RUN: %clangxx_asan -O3 %s %p/Helpers/initialization-constexpr-extra.cc --std=c++11 -o %t
+// RUN: %clangxx_asan -O3 %s %p/Helpers/initialization-constexpr-extra.cpp --std=c++11 -o %t
 // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
 
 class Integer {
@@ -1,13 +1,13 @@
 // A collection of various initializers which shouldn't trip up initialization
 // order checking.  If successful, this will just return 0.
 
-// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-nobug-extra.cc -o %t
+// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-nobug-extra.cpp -o %t
 // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
-// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-nobug-extra.cc -o %t
+// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-nobug-extra.cpp -o %t
 // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
-// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-nobug-extra.cc -o %t
+// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-nobug-extra.cpp -o %t
 // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
-// RUN: %clangxx_asan -O3 %s %p/Helpers/initialization-nobug-extra.cc -o %t
+// RUN: %clangxx_asan -O3 %s %p/Helpers/initialization-nobug-extra.cpp -o %t
 // RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
 
 // Simple access:
@@ -16,7 +16,7 @@ class Foo {
   }
   void set(int i, int val) { a[i] = val; }
 // CHECK: ERROR: AddressSanitizer: intra-object-overflow
-// CHECK: #0 {{.*}}Foo::set{{.*}}intra-object-overflow.cc:[[@LINE-2]]
+// CHECK: #0 {{.*}}Foo::set{{.*}}intra-object-overflow.cpp:[[@LINE-2]]
  private:
   int pre1, pre2;
   int a[11];
@@ -27,7 +27,7 @@ int main(int argc, char **argv) {
   int idx = argc == 2 ? atoi(argv[1]) : 0;
   Foo *foo = new Foo;
   foo->set(idx, 42);
-// CHECK: #1 {{.*}}main{{.*}}intra-object-overflow.cc:[[@LINE-1]]
+// CHECK: #1 {{.*}}main{{.*}}intra-object-overflow.cpp:[[@LINE-1]]
 // CHECK: is located 84 bytes inside of 128-byte region
   delete foo;
 }
@@ -14,9 +14,9 @@ int main(int argc, char **argv) {
   int res = x[argc];
   free(x + 5);  // BOOM
   // CHECK: AddressSanitizer: attempting free on address{{.*}}in thread T0
-  // CHECK: invalid-free.cc:[[@LINE-2]]
+  // CHECK: invalid-free.cpp:[[@LINE-2]]
   // CHECK: is located 5 bytes inside of 10-byte region
   // CHECK: allocated by thread T0 here:
-  // MALLOC-CTX: invalid-free.cc:[[@LINE-8]]
+  // MALLOC-CTX: invalid-free.cpp:[[@LINE-8]]
   return res;
 }
@@ -23,82 +23,82 @@ int main() {
   char *heap2 = (char *)malloc(42);
 
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
   foo(heap1, heap2);
   free(heap1);
   free(heap2);
 
   heap1 = (char *)malloc(1024);
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
   foo(heap1, heap1 + 1025);
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
   foo(heap1 + 1024, heap1 + 1025);
   free(heap1);
 
   heap1 = (char *)malloc(4096);
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
   foo(heap1, heap1 + 4097);
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
   foo(heap1, 0);
 
   // Global variables.
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
   foo(&global1[0], &global2[10]);
 
   char *p = &small_global[0];
   foo(p, p); // OK
   foo(p, p + 7); // OK
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
   foo(p, p + 8);
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
   foo(p - 1, p);
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
   foo(p, p - 1);
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
   foo(p - 1, p + 8);
 
   p = &large_global[0];
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
   foo(p - 1, p);
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
   foo(p, p - 1);
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
   foo(p, &global1[0]);
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
   foo(p, &small_global[0]);
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
   foo(p, 0);
 
   // Stack variables.
   char stack1, stack2;
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
   foo(&stack1, &stack2);
 
   // Mixtures.
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
   foo(heap1, &stack1);
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
   foo(heap1, &global1[0]);
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
   foo(&stack1, &global1[0]);
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-compare-errors.cpp:[[@LINE+1]]
   foo(&stack1, 0);
 
   free(heap1);
@@ -17,29 +17,29 @@ int main() {
   char *heap2 = (char *)malloc(42);
 
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cpp:[[@LINE+1]]
   foo(heap1, heap2);
 
   // Global variables.
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cpp:[[@LINE+1]]
   foo(&global1[0], &global2[10]);
 
   // Stack variables.
   char stack1, stack2;
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cpp:[[@LINE+1]]
   foo(&stack1, &stack2);
 
   // Mixtures.
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cpp:[[@LINE+1]]
   foo(heap1, &stack1);
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cpp:[[@LINE+1]]
   foo(heap1, &global1[0]);
   // CHECK: ERROR: AddressSanitizer: invalid-pointer-pair
-  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cc:[[@LINE+1]]
+  // CHECK: #{{[0-9]+ .*}} in main {{.*}}invalid-pointer-pairs-subtract-errors.cpp:[[@LINE+1]]
   foo(&stack1, &global1[0]);
 
   free(heap1);
@@ -13,10 +13,10 @@ int f(char c, char *p, char *q) {
   // [[PTR1:0x[0-9a-f]+]] [[PTR2:0x[0-9a-f]+]]
   switch (c) {
   case 'g':
-    // CMP: #{{[0-9]+ .*}} in f({{char, char\*, char\*|char,char \*,char \*}}) {{.*}}invalid-pointer-pairs.cc:[[@LINE+1]]
+    // CMP: #{{[0-9]+ .*}} in f({{char, char\*, char\*|char,char \*,char \*}}) {{.*}}invalid-pointer-pairs.cpp:[[@LINE+1]]
     return p > q;
   case 's':
-    // SUB: #{{[0-9]+ .*}} in f({{char, char\*, char\*|char,char \*,char \*}}) {{.*}}invalid-pointer-pairs.cc:[[@LINE+1]]
+    // SUB: #{{[0-9]+ .*}} in f({{char, char\*, char\*|char,char \*,char \*}}) {{.*}}invalid-pointer-pairs.cpp:[[@LINE+1]]
     return p - q;
   case 'k': {
     // OK-NOT: ERROR
@@ -26,7 +26,7 @@ int f(char c, char *p, char *q) {
   case 'f': {
     char *p3 = p + 20;
     free(p);
-    // FREE: #{{[0-9]+ .*}} in f({{char, char\*, char\*|char,char \*,char \*}}) {{.*}}invalid-pointer-pairs.cc:[[@LINE+2]]
+    // FREE: #{{[0-9]+ .*}} in f({{char, char\*, char\*|char,char \*,char \*}}) {{.*}}invalid-pointer-pairs.cpp:[[@LINE+2]]
     // FREE: freed by thread
     return p < p3;
   }
@@ -24,8 +24,8 @@ static void LargeFunction(int *x, int zero) {
   x[zero + 103]++;  // we should report this exact line
   // atos incorrectly extracts the symbol name for the static functions on
   // Darwin.
-  // CHECK-Linux:  {{#0 0x.* in LargeFunction.*large_func_test.cc:}}[[@LINE-3]]
-  // CHECK-Darwin: {{#0 0x.* in .*LargeFunction.*large_func_test.cc}}:[[@LINE-4]]
+  // CHECK-Linux:  {{#0 0x.* in LargeFunction.*large_func_test.cpp:}}[[@LINE-3]]
+  // CHECK-Darwin: {{#0 0x.* in .*LargeFunction.*large_func_test.cpp}}:[[@LINE-4]]
 
   x[10]++;
   x[11]++;
@@ -42,11 +42,11 @@ static void LargeFunction(int *x, int zero) {
 int main(int argc, char **argv) {
   int *x = new int[100];
   LargeFunction(x, argc - 1);
-  // CHECK: {{    #1 0x.* in main .*large_func_test.cc:}}[[@LINE-1]]
+  // CHECK: {{    #1 0x.* in main .*large_func_test.cpp:}}[[@LINE-1]]
   // CHECK: {{0x.* is located 12 bytes to the right of 400-byte region}}
   // CHECK: {{allocated by thread T0 here:}}
   // CHECK-Linux: {{    #0 0x.* in operator new.*}}
   // CHECK-Darwin: {{    #0 0x.* in .*_Zna.*}}
-  // CHECK: {{    #1 0x.* in main .*large_func_test.cc:}}[[@LINE-7]]
+  // CHECK: {{    #1 0x.* in main .*large_func_test.cpp:}}[[@LINE-7]]
   delete[] x;
 }
@@ -18,7 +18,7 @@ int main() {
   void *p = malloc(kMaxAllowedMallocSizePlusOne);
   // CHECK: {{ERROR: AddressSanitizer: requested allocation size .* \(.* after adjustments for alignment, red zones etc\.\) exceeds maximum supported size}}
   // CHECK: {{#0 0x.* in .*malloc}}
-  // CHECK: {{#1 0x.* in main .*malloc-size-too-big.cc:}}[[@LINE-3]]
+  // CHECK: {{#1 0x.* in main .*malloc-size-too-big.cpp:}}[[@LINE-3]]
   // CHECK: SUMMARY: AddressSanitizer: allocation-size-too-big
 
   printf("malloc returned: %zu\n", (size_t)p);
@@ -22,6 +22,6 @@ int main() {
 
   // TWO: previously allocated by thread T{{.*}} here:
   // TWO-NEXT: #0 0x{{.*}}
-  // TWO-NEXT: #1 0x{{.*}} in main {{.*}}malloc_context_size.cc
+  // TWO-NEXT: #1 0x{{.*}} in main {{.*}}malloc_context_size.cpp
   // TWO: SUMMARY: AddressSanitizer: heap-use-after-free
 }
@@ -15,10 +15,10 @@ void NullDeref(int *ptr) {
   ptr[10]++;  // BOOM
   // atos on Mac cannot extract the symbol name correctly. Also, on FreeBSD 9.2
   // the demangling function rejects local names with 'L' in front of them.
-  // CHECK: {{    #0 0x.* in .*NullDeref.*null_deref.cc}}
+  // CHECK: {{    #0 0x.* in .*NullDeref.*null_deref.cpp}}
 }
 int main() {
   NullDeref((int*)0);
-  // CHECK: {{    #1 0x.* in main.*null_deref.cc}}
+  // CHECK: {{    #1 0x.* in main.*null_deref.cpp}}
   // CHECK: AddressSanitizer can not provide additional info.
 }
@@ -8,7 +8,7 @@ int main() {
   delete[] x;
   return x[0];
   // SOURCE: ERROR: AddressSanitizer: heap-use-after-free
-  // SOURCE: SUMMARY: AddressSanitizer: heap-use-after-free {{.*}}print_summary.cc:[[@LINE-2]]{{.*}} main
+  // SOURCE: SUMMARY: AddressSanitizer: heap-use-after-free {{.*}}print_summary.cpp:[[@LINE-2]]{{.*}} main
   // MODULE: ERROR: AddressSanitizer: heap-use-after-free
   // MODULE: SUMMARY: AddressSanitizer: heap-use-after-free ({{.*}}+0x{{.*}})
   // MISSING: ERROR: AddressSanitizer: heap-use-after-free
@@ -9,8 +9,8 @@ int main(int argc, char **argv) {
   memset(x, 0, 10);
   int res = x[argc * 10];  // BOOOM
   // CHECK: {{READ of size 1 at 0x.* thread T0}}
-  // CHECK: {{    #0 0x.* in main .*stack-buffer-overflow.cc:}}[[@LINE-2]]
+  // CHECK: {{    #0 0x.* in main .*stack-buffer-overflow.cpp:}}[[@LINE-2]]
   // CHECK: {{Address 0x.* is located in stack of thread T0 at offset}}
-  // CHECK-NEXT: in{{.*}}main{{.*}}stack-buffer-overflow.cc
+  // CHECK-NEXT: in{{.*}}main{{.*}}stack-buffer-overflow.cpp
   return res;
 }
@@ -43,8 +43,8 @@ __attribute__((noinline)) void bad_function() {
   // CHECK: strcat-param-overlap: memory ranges
   // CHECK: [{{0x.*,[ ]*0x.*}}) and [{{0x.*,[ ]*0x.*}}) overlap
   // CHECK: {{#0 0x.* in .*strcat}}
-  // CHECK: {{#1 0x.* in bad_function.*strcat-overlap.cc:}}[[@LINE+2]]
-  // CHECK: {{#2 0x.* in main .*strcat-overlap.cc:}}[[@LINE+5]]
+  // CHECK: {{#1 0x.* in bad_function.*strcat-overlap.cpp:}}[[@LINE+2]]
+  // CHECK: {{#2 0x.* in main .*strcat-overlap.cpp:}}[[@LINE+5]]
   strcat(buffer, buffer + 1); // BOOM
 }
 
@@ -37,8 +37,8 @@ __attribute__((noinline)) void bad_function() {
   // CHECK: strcpy-param-overlap: memory ranges
   // CHECK: [{{0x.*,[ ]*0x.*}}) and [{{0x.*,[ ]*0x.*}}) overlap
   // CHECK: {{#0 0x.* in .*strcpy}}
-  // CHECK: {{#1 0x.* in bad_function.*strcpy-overlap.cc:}}[[@LINE+2]]
-  // CHECK: {{#2 0x.* in main .*strcpy-overlap.cc:}}[[@LINE+5]]
+  // CHECK: {{#1 0x.* in bad_function.*strcpy-overlap.cpp:}}[[@LINE+2]]
+  // CHECK: {{#2 0x.* in main .*strcpy-overlap.cpp:}}[[@LINE+5]]
   strcpy(buffer, buffer + 1); // BOOM
 }
 
@@ -21,11 +21,11 @@ int main(int argc, char **argv) {
   char *copy = strdup(kString);
   int x = copy[4 + argc];  // BOOM
   // CHECK: AddressSanitizer: heap-buffer-overflow
-  // CHECK: #0 {{.*}}main {{.*}}strdup_oob_test.cc:[[@LINE-2]]
+  // CHECK: #0 {{.*}}main {{.*}}strdup_oob_test.cpp:[[@LINE-2]]
   // CHECK-LABEL: allocated by thread T{{.*}} here:
   // CHECK: #{{[01]}} {{.*}}strdup
-  // CHECK: #{{.*}}main {{.*}}strdup_oob_test.cc:[[@LINE-6]]
+  // CHECK: #{{.*}}main {{.*}}strdup_oob_test.cpp:[[@LINE-6]]
   // CHECK-LABEL: SUMMARY
-  // CHECK: strdup_oob_test.cc:[[@LINE-7]]
+  // CHECK: strdup_oob_test.cpp:[[@LINE-7]]
   return x;
 }
@@ -37,8 +37,8 @@ __attribute__((noinline)) void bad_function() {
   // CHECK: strncat-param-overlap: memory ranges
   // CHECK: [{{0x.*,[ ]*0x.*}}) and [{{0x.*,[ ]*0x.*}}) overlap
   // CHECK: {{#0 0x.* in .*strncat}}
-  // CHECK: {{#1 0x.* in bad_function.*strncat-overlap.cc:}}[[@LINE+2]]
-  // CHECK: {{#2 0x.* in main .*strncat-overlap.cc:}}[[@LINE+5]]
+  // CHECK: {{#1 0x.* in bad_function.*strncat-overlap.cpp:}}[[@LINE+2]]
+  // CHECK: {{#2 0x.* in main .*strncat-overlap.cpp:}}[[@LINE+5]]
   strncat(buffer, buffer + 1, 3); // BOOM
 }
 
@@ -16,14 +16,14 @@ int main(int argc, char **argv) {
   // CHECK: {{WRITE of size 10 at 0x.* thread T0}}
   // CHECK-Linux: {{    #0 0x.* in .*strncpy}}
   // CHECK-Darwin: {{    #0 0x.* in wrap_strncpy}}
-  // CHECK: {{    #1 0x.* in main .*strncpy-overflow.cc:}}[[@LINE-4]]
+  // CHECK: {{    #1 0x.* in main .*strncpy-overflow.cpp:}}[[@LINE-4]]
   // CHECK: {{0x.* is located 0 bytes to the right of 9-byte region}}
   // CHECK: {{allocated by thread T0 here:}}
 
   // CHECK-Linux: {{    #0 0x.* in .*malloc}}
-  // CHECK-Linux: {{    #1 0x.* in main .*strncpy-overflow.cc:}}[[@LINE-10]]
+  // CHECK-Linux: {{    #1 0x.* in main .*strncpy-overflow.cpp:}}[[@LINE-10]]
 
   // CHECK-Darwin: {{    #0 0x.* in wrap_malloc.*}}
-  // CHECK-Darwin: {{    #1 0x.* in main .*strncpy-overflow.cc:}}[[@LINE-13]]
+  // CHECK-Darwin: {{    #1 0x.* in main .*strncpy-overflow.cpp:}}[[@LINE-13]]
   return short_buffer[8];
 }
@@ -37,8 +37,8 @@ __attribute__((noinline)) void bad_function() {
   // CHECK: strncpy-param-overlap: memory ranges
   // CHECK: [{{0x.*,[ ]*0x.*}}) and [{{0x.*,[ ]*0x.*}}) overlap
   // CHECK: {{#0 0x.* in .*strncpy}}
-  // CHECK: {{#1 0x.* in bad_function.*strncpy-overlap.cc:}}[[@LINE+2]]
-  // CHECK: {{#2 0x.* in main .*strncpy-overlap.cc:}}[[@LINE+5]]
+  // CHECK: {{#1 0x.* in bad_function.*strncpy-overlap.cpp:}}[[@LINE+2]]
+  // CHECK: {{#2 0x.* in main .*strncpy-overlap.cpp:}}[[@LINE+5]]
   strncpy(buffer, buffer + 1, 5); // BOOM
 }
 
@@ -23,29 +23,29 @@ int main(int argc, char **argv) {
   switch (argv[1][0]) {
     case 'A': res = __sanitizer_unaligned_load16(x + 15); break;
 //  CHECK-A ERROR: AddressSanitizer: heap-buffer-overflow on address
-//  CHECK-A: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-2]]
+//  CHECK-A: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-2]]
 //  CHECK-A: is located 0 bytes to the right of 16-byte region
     case 'B': res = __sanitizer_unaligned_load32(x + 14); break;
-//  CHECK-B: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]]
+//  CHECK-B: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]]
     case 'C': res = __sanitizer_unaligned_load32(x + 13); break;
-//  CHECK-C: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]]
+//  CHECK-C: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]]
     case 'D': res = __sanitizer_unaligned_load64(x + 15); break;
-//  CHECK-D: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]]
+//  CHECK-D: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]]
     case 'E': res = __sanitizer_unaligned_load64(x + 9); break;
-//  CHECK-E: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]]
+//  CHECK-E: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]]
 
     case 'K': __sanitizer_unaligned_store16(x + 15, 0); break;
 //  CHECK-K ERROR: AddressSanitizer: heap-buffer-overflow on address
-//  CHECK-K: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-2]]
+//  CHECK-K: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-2]]
 //  CHECK-K: is located 0 bytes to the right of 16-byte region
     case 'L': __sanitizer_unaligned_store32(x + 15, 0); break;
-//  CHECK-L: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]]
+//  CHECK-L: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]]
     case 'M': __sanitizer_unaligned_store32(x + 13, 0); break;
-//  CHECK-M: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]]
+//  CHECK-M: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]]
     case 'N': __sanitizer_unaligned_store64(x + 10, 0); break;
-//  CHECK-N: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]]
+//  CHECK-N: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]]
     case 'O': __sanitizer_unaligned_store64(x + 14, 0); break;
-//  CHECK-O: main{{.*}}unaligned_loads_and_stores.cc:[[@LINE-1]]
+//  CHECK-O: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]]
   }
   delete x;
   return res;
@@ -12,17 +12,17 @@ int main() {
   // CHECK: {{.*ERROR: AddressSanitizer: heap-use-after-free on address}}
   // CHECK:   {{0x.* at pc 0x.* bp 0x.* sp 0x.*}}
   // CHECK: {{READ of size 1 at 0x.* thread T0}}
-  // CHECK: {{    #0 0x.* in main .*use-after-delete.cc:}}[[@LINE-4]]
+  // CHECK: {{    #0 0x.* in main .*use-after-delete.cpp:}}[[@LINE-4]]
   // CHECK: {{0x.* is located 5 bytes inside of 10-byte region .0x.*,0x.*}}
   // CHECK: {{freed by thread T0 here:}}
 
   // CHECK-Linux: {{    #0 0x.* in operator delete\[\]}}
-  // CHECK-Linux: {{    #1 0x.* in main .*use-after-delete.cc:}}[[@LINE-10]]
+  // CHECK-Linux: {{    #1 0x.* in main .*use-after-delete.cpp:}}[[@LINE-10]]
 
   // CHECK: {{previously allocated by thread T0 here:}}
 
   // CHECK-Linux: {{    #0 0x.* in operator new\[\]}}
-  // CHECK-Linux: {{    #1 0x.* in main .*use-after-delete.cc:}}[[@LINE-16]]
+  // CHECK-Linux: {{    #1 0x.* in main .*use-after-delete.cpp:}}[[@LINE-16]]
 
   // CHECK: Shadow byte legend (one shadow byte represents {{[0-9]+}} application bytes):
   // CHECK: Global redzone:
@@ -15,21 +15,21 @@ int main() {
   // CHECK: {{.*ERROR: AddressSanitizer: heap-use-after-free on address}}
   // CHECK:   {{0x.* at pc 0x.* bp 0x.* sp 0x.*}}
   // CHECK: {{WRITE of size 1 at 0x.* thread T0}}
-  // CHECK: {{    #0 0x.* in main .*use-after-free-right.cc:}}[[@LINE-4]]
+  // CHECK: {{    #0 0x.* in main .*use-after-free-right.cpp:}}[[@LINE-4]]
   // CHECK: {{0x.* is located 0 bytes inside of 1-byte region .0x.*,0x.*}}
   // CHECK: {{freed by thread T0 here:}}
 
   // CHECK-Linux: {{    #0 0x.* in .*free}}
-  // CHECK-Linux: {{    #1 0x.* in main .*use-after-free-right.cc:}}[[@LINE-10]]
+  // CHECK-Linux: {{    #1 0x.* in main .*use-after-free-right.cpp:}}[[@LINE-10]]
 
   // CHECK-Darwin: {{    #0 0x.* in wrap_free}}
-  // CHECK-Darwin: {{    #1 0x.* in main .*use-after-free-right.cc:}}[[@LINE-13]]
+  // CHECK-Darwin: {{    #1 0x.* in main .*use-after-free-right.cpp:}}[[@LINE-13]]
 
   // CHECK: {{previously allocated by thread T0 here:}}
 
   // CHECK-Linux: {{    #0 0x.* in .*malloc}}
-  // CHECK-Linux: {{    #1 0x.* in main .*use-after-free-right.cc:}}[[@LINE-19]]
+  // CHECK-Linux: {{    #1 0x.* in main .*use-after-free-right.cpp:}}[[@LINE-19]]
 
   // CHECK-Darwin: {{    #0 0x.* in wrap_malloc.*}}
-  // CHECK-Darwin: {{    #1 0x.* in main .*use-after-free-right.cc:}}[[@LINE-22]]
+  // CHECK-Darwin: {{    #1 0x.* in main .*use-after-free-right.cpp:}}[[@LINE-22]]
 }
@@ -12,23 +12,23 @@ int main() {
   // CHECK: {{.*ERROR: AddressSanitizer: heap-use-after-free on address}}
   // CHECK:   {{0x.* at pc 0x.* bp 0x.* sp 0x.*}}
   // CHECK: {{READ of size 1 at 0x.* thread T0}}
-  // CHECK: {{    #0 0x.* in main .*use-after-free.cc:}}[[@LINE-4]]
+  // CHECK: {{    #0 0x.* in main .*use-after-free.cpp:}}[[@LINE-4]]
   // CHECK: {{0x.* is located 5 bytes inside of 10-byte region .0x.*,0x.*}}
   // CHECK: {{freed by thread T0 here:}}
 
   // CHECK-Linux: {{    #0 0x.* in .*free}}
-  // CHECK-Linux: {{    #1 0x.* in main .*use-after-free.cc:}}[[@LINE-10]]
+  // CHECK-Linux: {{    #1 0x.* in main .*use-after-free.cpp:}}[[@LINE-10]]
 
   // CHECK-Darwin: {{    #0 0x.* in wrap_free}}
-  // CHECK-Darwin: {{    #1 0x.* in main .*use-after-free.cc:}}[[@LINE-13]]
+  // CHECK-Darwin: {{    #1 0x.* in main .*use-after-free.cpp:}}[[@LINE-13]]
 
   // CHECK: {{previously allocated by thread T0 here:}}
 
   // CHECK-Linux: {{    #0 0x.* in .*malloc}}
-  // CHECK-Linux: {{    #1 0x.* in main .*use-after-free.cc:}}[[@LINE-19]]
+  // CHECK-Linux: {{    #1 0x.* in main .*use-after-free.cpp:}}[[@LINE-19]]
 
   // CHECK-Darwin: {{    #0 0x.* in wrap_malloc.*}}
-  // CHECK-Darwin: {{    #1 0x.* in main .*use-after-free.cc:}}[[@LINE-22]]
+  // CHECK-Darwin: {{    #1 0x.* in main .*use-after-free.cpp:}}[[@LINE-22]]
   // CHECK: Shadow byte legend (one shadow byte represents {{[0-9]+}} application bytes):
   // CHECK: Global redzone:
   // CHECK: ASan internal:
@@ -14,7 +14,7 @@ int main(int argc, char **argv) {
   __asan_poison_memory_region(x, 16);
   int res = x[argc * 10];  // BOOOM
   // CHECK: ERROR: AddressSanitizer: use-after-poison
-  // CHECK: main{{.*}}use-after-poison.cc:[[@LINE-2]]
+  // CHECK: main{{.*}}use-after-poison.cpp:[[@LINE-2]]
   delete [] x;
   return res;
 }
@@ -10,7 +10,7 @@ int main() {
     f = [&x]() {
       return x;  // BOOM
       // CHECK: ERROR: AddressSanitizer: stack-use-after-scope
-      // CHECK: #0 0x{{.*}} in {{.*}}use-after-scope-capture.cc:[[@LINE-2]]
+      // CHECK: #0 0x{{.*}} in {{.*}}use-after-scope-capture.cpp:[[@LINE-2]]
     };
   }
   return f();  // BOOM
@@ -8,7 +8,7 @@ struct IntHolder {
   ~IntHolder() {
     printf("Value: %d\n", *val_);  // BOOM
     // CHECK: ERROR: AddressSanitizer: stack-use-after-scope
-    // CHECK:  #0 0x{{.*}} in IntHolder::~IntHolder{{.*}}.cc:[[@LINE-2]]
+    // CHECK:  #0 0x{{.*}} in IntHolder::~IntHolder{{.*}}.cpp:[[@LINE-2]]
   }
   void set(int *val) { val_ = val; }
   int *get() { return val_; }
@@ -11,5 +11,5 @@ int main() {
   }
   return *p;  // BOOM
   // CHECK: ERROR: AddressSanitizer: stack-use-after-scope
-  // CHECK:  #0 0x{{.*}} in main {{.*}}.cc:[[@LINE-2]]
+  // CHECK:  #0 0x{{.*}} in main {{.*}}.cpp:[[@LINE-2]]
 }
@@ -20,7 +20,7 @@ int main(int argc, char *argv[]) {
   // CHECK: ERROR: AddressSanitizer: stack-use-after-scope
   // CHECK: READ of size 4 at 0x{{.*}} thread T0
   // CHECK:   #0 0x{{.*}} in main
-  // CHECK:      {{.*}}use-after-scope-inlined.cc:[[@LINE-4]]
+  // CHECK:      {{.*}}use-after-scope-inlined.cpp:[[@LINE-4]]
   // CHECK: Address 0x{{.*}} is located in stack of thread T0 at offset [[OFFSET:[^ ]*]] in frame
   // CHECK:      {{.*}} in main
   // CHECK:   This frame has
@@ -11,7 +11,7 @@ int main() {
   }
   return *p;  // BOOM
   // CHECK: ERROR: AddressSanitizer: stack-use-after-scope
-  // CHECK:  #0 0x{{.*}} in main {{.*}}use-after-scope-loop-bug.cc:[[@LINE-2]]
+  // CHECK:  #0 0x{{.*}} in main {{.*}}use-after-scope-loop-bug.cpp:[[@LINE-2]]
   // CHECK: Address 0x{{.*}} is located in stack of thread T{{.*}} at offset [[OFFSET:[^ ]+]] in frame
   // {{\[}}[[OFFSET]], {{[0-9]+}}) 'x'
 }
@@ -12,7 +12,7 @@ int main() {
   }
   return *p;  // BOOM
   // CHECK: ERROR: AddressSanitizer: stack-use-after-scope
-  // CHECK:  #0 0x{{.*}} in main {{.*}}use-after-scope-loop-removed.cc:[[@LINE-2]]
+  // CHECK:  #0 0x{{.*}} in main {{.*}}use-after-scope-loop-removed.cpp:[[@LINE-2]]
   // CHECK: Address 0x{{.*}} is located in stack of thread T{{.*}} at offset [[OFFSET:[^ ]+]] in frame
   // {{\[}}[[OFFSET]], {{[0-9]+}}) 'x'
 }
@@ -10,5 +10,5 @@ int main() {
   }
   return **p;  // BOOM
   // CHECK: ERROR: AddressSanitizer: stack-use-after-scope
-  // CHECK: #0 0x{{.*}} in main {{.*}}.cc:[[@LINE-2]]
+  // CHECK: #0 0x{{.*}} in main {{.*}}.cpp:[[@LINE-2]]
 }
@@ -16,6 +16,6 @@ int main(int argc, char *argv[]) {
   save({argc});
   int x = saved->val;  // BOOM
   // CHECK: ERROR: AddressSanitizer: stack-use-after-scope
-  // CHECK:  #0 0x{{.*}} in main {{.*}}use-after-scope-temp.cc:[[@LINE-2]]
+  // CHECK:  #0 0x{{.*}} in main {{.*}}use-after-scope-temp.cpp:[[@LINE-2]]
   return x;
 }
@@ -15,6 +15,6 @@ int main(int argc, char *argv[]) {
   saved = &IntHolder().Self();
   int x = saved->val;  // BOOM
   // CHECK: ERROR: AddressSanitizer: stack-use-after-scope
-  // CHECK:  #0 0x{{.*}} in main {{.*}}use-after-scope-temp2.cc:[[@LINE-2]]
+  // CHECK:  #0 0x{{.*}} in main {{.*}}use-after-scope-temp2.cpp:[[@LINE-2]]
   return x;
 }
@@ -41,7 +41,7 @@ template <class T> __attribute__((noinline)) void test() {
 
   ptr.Access();
   // CHECK: ERROR: AddressSanitizer: stack-use-after-scope
-  // CHECK:  #{{[0-9]+}} 0x{{.*}} in {{(void )?test.*\((void)?\) .*}}use-after-scope-types.cc
+  // CHECK:  #{{[0-9]+}} 0x{{.*}} in {{(void )?test.*\((void)?\) .*}}use-after-scope-types.cpp
   // CHECK: Address 0x{{.*}} is located in stack of thread T{{.*}} at offset [[OFFSET:[^ ]+]] in frame
   // {{\[}}[[OFFSET]], {{[0-9]+}}) 'x'
 }
@@ -14,7 +14,7 @@ int main() {
   }
   *p = 5;  // BOOM
   // CHECK: ERROR: AddressSanitizer: stack-use-after-scope
-  // CHECK:  #0 0x{{.*}} in main {{.*}}use-after-scope.cc:[[@LINE-2]]
+  // CHECK:  #0 0x{{.*}} in main {{.*}}use-after-scope.cpp:[[@LINE-2]]
   // CHECK: Address 0x{{.*}} is located in stack of thread T{{.*}} at offset [[OFFSET:[^ ]+]] in frame
   // {{\[}}[[OFFSET]], {{[0-9]+}}) 'x'
   return 0;
index af0721a..2a8d931 100644 (file)
@@ -254,7 +254,7 @@ if config.host_os == 'Darwin':
       config.available_features.add('osx-autointerception')
       config.available_features.add('osx-ld64-live_support')
     else:
-      # The ASAN initialization-bug.cc test should XFAIL on OS X systems
+      # The ASAN initialization-bug.cpp test should XFAIL on OS X systems
       # older than El Capitan. By marking the test as being unsupported with
       # this "feature", we can pass the test on newer OS X versions and other
       # platforms.