about summary refs log tree commit diff homepage
diff options
context:
space:
mode:
-rw-r--r--test/Feature/ubsan/ubsan_alignment-assumption.c2
-rw-r--r--test/Feature/ubsan/ubsan_alignment-assumption_with_offset.c2
-rw-r--r--test/Feature/ubsan/ubsan_alignment-type-mismatch.c2
-rw-r--r--test/Feature/ubsan/ubsan_array_bounds.c2
-rw-r--r--test/Feature/ubsan/ubsan_bool.c2
-rw-r--r--test/Feature/ubsan/ubsan_builtin.c2
-rw-r--r--test/Feature/ubsan/ubsan_enum.cpp2
-rw-r--r--test/Feature/ubsan/ubsan_float_cast_overflow.c2
-rw-r--r--test/Feature/ubsan/ubsan_float_divide_by_zero.c2
-rw-r--r--test/Feature/ubsan/ubsan_implicit_integer_sign_change.c2
-rw-r--r--test/Feature/ubsan/ubsan_implicit_signed_integer_truncation.c2
-rw-r--r--test/Feature/ubsan/ubsan_implicit_unsigned_integer_truncation.c2
-rw-r--r--test/Feature/ubsan/ubsan_integer_divide_by_zero.c2
-rw-r--r--test/Feature/ubsan/ubsan_nonnull_attribute.c2
-rw-r--r--test/Feature/ubsan/ubsan_null.c2
-rw-r--r--test/Feature/ubsan/ubsan_nullability_arg.c2
-rw-r--r--test/Feature/ubsan/ubsan_nullability_assign.c2
-rw-r--r--test/Feature/ubsan/ubsan_nullability_return.c2
-rw-r--r--test/Feature/ubsan/ubsan_pointer_overflow-applying_nonzero_offset_to_nonnull_pointer.c2
-rw-r--r--test/Feature/ubsan/ubsan_pointer_overflow-applying_nonzero_offset_to_nonnull_pointer_10.c2
-rw-r--r--test/Feature/ubsan/ubsan_pointer_overflow-applying_nonzero_offset_to_null_pointer.c2
-rw-r--r--test/Feature/ubsan/ubsan_pointer_overflow-applying_zero_offset_to_null_pointer.c2
-rw-r--r--test/Feature/ubsan/ubsan_pointer_overflow-pointer_arithmetic.c2
-rw-r--r--test/Feature/ubsan/ubsan_return.cpp2
-rw-r--r--test/Feature/ubsan/ubsan_returns_nonnull_attribute.c2
-rw-r--r--test/Feature/ubsan/ubsan_shift_base.c2
-rw-r--r--test/Feature/ubsan/ubsan_shift_exponent.c2
-rw-r--r--test/Feature/ubsan/ubsan_signed_integer_overflow.c8
-rw-r--r--test/Feature/ubsan/ubsan_unreachable.c2
-rw-r--r--test/Feature/ubsan/ubsan_unsigned_integer_overflow.c8
-rw-r--r--test/Feature/ubsan/ubsan_unsigned_shift_base.c2
-rw-r--r--test/Feature/ubsan/ubsan_vla_bound.c2
32 files changed, 38 insertions, 38 deletions
diff --git a/test/Feature/ubsan/ubsan_alignment-assumption.c b/test/Feature/ubsan/ubsan_alignment-assumption.c
index 01c45360..1774b5e3 100644
--- a/test/Feature/ubsan/ubsan_alignment-assumption.c
+++ b/test/Feature/ubsan/ubsan_alignment-assumption.c
@@ -14,7 +14,7 @@ int main() {
 
   char *ptr = (char *)address;
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: alignment-assumption
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: alignment-assumption
   __builtin_assume_aligned(ptr, 0x8000);
 
   return 0;
diff --git a/test/Feature/ubsan/ubsan_alignment-assumption_with_offset.c b/test/Feature/ubsan/ubsan_alignment-assumption_with_offset.c
index 1eeb0de7..d6ea636d 100644
--- a/test/Feature/ubsan/ubsan_alignment-assumption_with_offset.c
+++ b/test/Feature/ubsan/ubsan_alignment-assumption_with_offset.c
@@ -14,7 +14,7 @@ int main() {
 
   char *ptr = (char *)address;
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: alignment-assumption
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: alignment-assumption
   __builtin_assume_aligned(ptr, 0x8000, 1);
 
   return 0;
diff --git a/test/Feature/ubsan/ubsan_alignment-type-mismatch.c b/test/Feature/ubsan/ubsan_alignment-type-mismatch.c
index 4fde8921..93ffd394 100644
--- a/test/Feature/ubsan/ubsan_alignment-type-mismatch.c
+++ b/test/Feature/ubsan/ubsan_alignment-type-mismatch.c
@@ -14,7 +14,7 @@ int main() {
   char c[] __attribute__((aligned(8))) = {0, 0, 0, 0, 1, 2, 3, 4, 5};
   int *p = (int *)&c[x];
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: misaligned-pointer-use
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: misaligned-pointer-use
   result = *p;
   return 0;
 }
diff --git a/test/Feature/ubsan/ubsan_array_bounds.c b/test/Feature/ubsan/ubsan_array_bounds.c
index ba4e7b5c..b8ed91f0 100644
--- a/test/Feature/ubsan/ubsan_array_bounds.c
+++ b/test/Feature/ubsan/ubsan_array_bounds.c
@@ -9,7 +9,7 @@
 unsigned int array_index(unsigned int n) {
   unsigned int a[4] = {0};
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: out-of-bounds-index
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: out-of-bounds-index
   return a[n];
 }
 
diff --git a/test/Feature/ubsan/ubsan_bool.c b/test/Feature/ubsan/ubsan_bool.c
index 6873299d..e7913a63 100644
--- a/test/Feature/ubsan/ubsan_bool.c
+++ b/test/Feature/ubsan/ubsan_bool.c
@@ -12,7 +12,7 @@ int main() {
 
   klee_make_symbolic(&x, sizeof(x), "x");
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: load invalid value
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: load invalid value
   result = *(_Bool *)&x;
 
   return 0;
diff --git a/test/Feature/ubsan/ubsan_builtin.c b/test/Feature/ubsan/ubsan_builtin.c
index cb04987e..9147ff76 100644
--- a/test/Feature/ubsan/ubsan_builtin.c
+++ b/test/Feature/ubsan/ubsan_builtin.c
@@ -11,7 +11,7 @@ int main() {
 
   klee_make_symbolic(&x, sizeof(x), "x");
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: invalid-builtin-use
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: invalid-builtin-use
   __builtin_ctz(x);
   return 0;
 }
diff --git a/test/Feature/ubsan/ubsan_enum.cpp b/test/Feature/ubsan/ubsan_enum.cpp
index fe01f978..462aa21c 100644
--- a/test/Feature/ubsan/ubsan_enum.cpp
+++ b/test/Feature/ubsan/ubsan_enum.cpp
@@ -17,7 +17,7 @@ int main() {
   for (unsigned char *p = (unsigned char *)&e; p != (unsigned char *)(&e + 1); ++p)
     *p = x;
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: load invalid value
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: load invalid value
   result = (int)e != -1;
 
   return 0;
diff --git a/test/Feature/ubsan/ubsan_float_cast_overflow.c b/test/Feature/ubsan/ubsan_float_cast_overflow.c
index 6f17c6fa..ad17c95c 100644
--- a/test/Feature/ubsan/ubsan_float_cast_overflow.c
+++ b/test/Feature/ubsan/ubsan_float_cast_overflow.c
@@ -14,7 +14,7 @@ int main() {
 
   //  klee_make_symbolic(&f, sizeof(f), "f");
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: float-cast-overflow
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: float-cast-overflow
   result = f + 0x80;
   return 0;
 }
diff --git a/test/Feature/ubsan/ubsan_float_divide_by_zero.c b/test/Feature/ubsan/ubsan_float_divide_by_zero.c
index 84857190..0156dbbd 100644
--- a/test/Feature/ubsan/ubsan_float_divide_by_zero.c
+++ b/test/Feature/ubsan/ubsan_float_divide_by_zero.c
@@ -14,6 +14,6 @@ int main() {
   //  klee_make_symbolic(&x, sizeof(x), "x");
   //  klee_assume(x != 0.0);
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: float-divide-by-zero
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: float-divide-by-zero
   volatile float result = x / 0;
 }
diff --git a/test/Feature/ubsan/ubsan_implicit_integer_sign_change.c b/test/Feature/ubsan/ubsan_implicit_integer_sign_change.c
index 36a48432..e5232081 100644
--- a/test/Feature/ubsan/ubsan_implicit_integer_sign_change.c
+++ b/test/Feature/ubsan/ubsan_implicit_integer_sign_change.c
@@ -7,7 +7,7 @@
 #include "klee/klee.h"
 
 signed int convert_unsigned_int_to_signed_int(unsigned int x) {
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: implicit-integer-sign-change
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: implicit-integer-sign-change
   return x;
 }
 
diff --git a/test/Feature/ubsan/ubsan_implicit_signed_integer_truncation.c b/test/Feature/ubsan/ubsan_implicit_signed_integer_truncation.c
index 95002907..727e6352 100644
--- a/test/Feature/ubsan/ubsan_implicit_signed_integer_truncation.c
+++ b/test/Feature/ubsan/ubsan_implicit_signed_integer_truncation.c
@@ -7,7 +7,7 @@
 #include "klee/klee.h"
 
 unsigned char convert_signed_int_to_unsigned_char(signed int x) {
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: implicit-signed-integer-truncation
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: implicit-signed-integer-truncation
   return x;
 }
 
diff --git a/test/Feature/ubsan/ubsan_implicit_unsigned_integer_truncation.c b/test/Feature/ubsan/ubsan_implicit_unsigned_integer_truncation.c
index 0db03cb0..d16dc7e8 100644
--- a/test/Feature/ubsan/ubsan_implicit_unsigned_integer_truncation.c
+++ b/test/Feature/ubsan/ubsan_implicit_unsigned_integer_truncation.c
@@ -7,7 +7,7 @@
 #include "klee/klee.h"
 
 unsigned char convert_unsigned_int_to_unsigned_char(unsigned int x) {
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: implicit-unsigned-integer-truncation
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: implicit-unsigned-integer-truncation
   return x;
 }
 
diff --git a/test/Feature/ubsan/ubsan_integer_divide_by_zero.c b/test/Feature/ubsan/ubsan_integer_divide_by_zero.c
index 09591e29..d2faca27 100644
--- a/test/Feature/ubsan/ubsan_integer_divide_by_zero.c
+++ b/test/Feature/ubsan/ubsan_integer_divide_by_zero.c
@@ -12,7 +12,7 @@ int main() {
 
   klee_make_symbolic(&x, sizeof(x), "x");
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: integer division overflow
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: integer division overflow
   result = x / 0;
   return 0;
 }
diff --git a/test/Feature/ubsan/ubsan_nonnull_attribute.c b/test/Feature/ubsan/ubsan_nonnull_attribute.c
index a98aeadd..fec89604 100644
--- a/test/Feature/ubsan/ubsan_nonnull_attribute.c
+++ b/test/Feature/ubsan/ubsan_nonnull_attribute.c
@@ -17,7 +17,7 @@ int main() {
   int local = 0;
   int *arg = null ? 0x0 : &local;
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: invalid-null-argument
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: invalid-null-argument
   result = func(arg);
   return 0;
 }
diff --git a/test/Feature/ubsan/ubsan_null.c b/test/Feature/ubsan/ubsan_null.c
index f5ad6fdf..754b31d3 100644
--- a/test/Feature/ubsan/ubsan_null.c
+++ b/test/Feature/ubsan/ubsan_null.c
@@ -15,7 +15,7 @@ int main() {
   int local = 0;
   int *arg = null ? 0x0 : &local;
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: null-pointer-use
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: null-pointer-use
   result = *arg;
   return 0;
 }
diff --git a/test/Feature/ubsan/ubsan_nullability_arg.c b/test/Feature/ubsan/ubsan_nullability_arg.c
index c7393649..74e881b6 100644
--- a/test/Feature/ubsan/ubsan_nullability_arg.c
+++ b/test/Feature/ubsan/ubsan_nullability_arg.c
@@ -15,7 +15,7 @@ int main() {
 
   int local = 0;
   int *arg = null ? 0x0 : &local;
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: invalid-null-argument
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: invalid-null-argument
   nonnull_arg(arg);
   return 0;
 }
diff --git a/test/Feature/ubsan/ubsan_nullability_assign.c b/test/Feature/ubsan/ubsan_nullability_assign.c
index eaf58a65..d1066e54 100644
--- a/test/Feature/ubsan/ubsan_nullability_assign.c
+++ b/test/Feature/ubsan/ubsan_nullability_assign.c
@@ -8,7 +8,7 @@
 
 void nonnull_assign(int *p) {
   volatile int *_Nonnull local;
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: null-pointer-use
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: null-pointer-use
   local = p;
 }
 
diff --git a/test/Feature/ubsan/ubsan_nullability_return.c b/test/Feature/ubsan/ubsan_nullability_return.c
index 25b2b5e0..3d432ab8 100644
--- a/test/Feature/ubsan/ubsan_nullability_return.c
+++ b/test/Feature/ubsan/ubsan_nullability_return.c
@@ -7,7 +7,7 @@
 #include "klee/klee.h"
 
 int *_Nonnull nonnull_retval(int *p) {
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: invalid-null-return
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: invalid-null-return
   return p;
 }
 
diff --git a/test/Feature/ubsan/ubsan_pointer_overflow-applying_nonzero_offset_to_nonnull_pointer.c b/test/Feature/ubsan/ubsan_pointer_overflow-applying_nonzero_offset_to_nonnull_pointer.c
index 007a8ee2..9a22f7b8 100644
--- a/test/Feature/ubsan/ubsan_pointer_overflow-applying_nonzero_offset_to_nonnull_pointer.c
+++ b/test/Feature/ubsan/ubsan_pointer_overflow-applying_nonzero_offset_to_nonnull_pointer.c
@@ -18,7 +18,7 @@ int main() {
 
   char *ptr = (char *)address;
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: pointer-overflow
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: pointer-overflow
   result = ptr + 1;
   return 0;
 }
diff --git a/test/Feature/ubsan/ubsan_pointer_overflow-applying_nonzero_offset_to_nonnull_pointer_10.c b/test/Feature/ubsan/ubsan_pointer_overflow-applying_nonzero_offset_to_nonnull_pointer_10.c
index 20286bcc..3a064375 100644
--- a/test/Feature/ubsan/ubsan_pointer_overflow-applying_nonzero_offset_to_nonnull_pointer_10.c
+++ b/test/Feature/ubsan/ubsan_pointer_overflow-applying_nonzero_offset_to_nonnull_pointer_10.c
@@ -18,7 +18,7 @@ int main() {
 
   char *ptr = (char *)address;
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: nullptr-after-nonzero-offset
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: nullptr-after-nonzero-offset
   result = ptr + 1;
   return 0;
 }
diff --git a/test/Feature/ubsan/ubsan_pointer_overflow-applying_nonzero_offset_to_null_pointer.c b/test/Feature/ubsan/ubsan_pointer_overflow-applying_nonzero_offset_to_null_pointer.c
index f36dca61..26c97f3b 100644
--- a/test/Feature/ubsan/ubsan_pointer_overflow-applying_nonzero_offset_to_null_pointer.c
+++ b/test/Feature/ubsan/ubsan_pointer_overflow-applying_nonzero_offset_to_null_pointer.c
@@ -18,7 +18,7 @@ int main() {
 
   char *ptr = (char *)address;
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: nullptr-with-nonzero-offset
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: nullptr-with-nonzero-offset
   result = ptr + 1;
   return 0;
 }
diff --git a/test/Feature/ubsan/ubsan_pointer_overflow-applying_zero_offset_to_null_pointer.c b/test/Feature/ubsan/ubsan_pointer_overflow-applying_zero_offset_to_null_pointer.c
index b39b65e2..cd521572 100644
--- a/test/Feature/ubsan/ubsan_pointer_overflow-applying_zero_offset_to_null_pointer.c
+++ b/test/Feature/ubsan/ubsan_pointer_overflow-applying_zero_offset_to_null_pointer.c
@@ -18,7 +18,7 @@ int main() {
 
   char *ptr = (char *)address;
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: nullptr-with-offset
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: nullptr-with-offset
   result = ptr + 0;
   return 0;
 }
diff --git a/test/Feature/ubsan/ubsan_pointer_overflow-pointer_arithmetic.c b/test/Feature/ubsan/ubsan_pointer_overflow-pointer_arithmetic.c
index 123034b5..6d86a77e 100644
--- a/test/Feature/ubsan/ubsan_pointer_overflow-pointer_arithmetic.c
+++ b/test/Feature/ubsan/ubsan_pointer_overflow-pointer_arithmetic.c
@@ -17,7 +17,7 @@ int main() {
   klee_make_symbolic(&offset, sizeof(offset), "offset");
   klee_assume((size_t)(ptr) + offset != 0);
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: pointer-overflow
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: pointer-overflow
   result = ptr + offset;
 
   return 0;
diff --git a/test/Feature/ubsan/ubsan_return.cpp b/test/Feature/ubsan/ubsan_return.cpp
index 05f82098..ed5188bd 100644
--- a/test/Feature/ubsan/ubsan_return.cpp
+++ b/test/Feature/ubsan/ubsan_return.cpp
@@ -7,7 +7,7 @@
 #include "klee/klee.h"
 
 int no_return() {
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: missing-return
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: missing-return
 }
 
 int main() {
diff --git a/test/Feature/ubsan/ubsan_returns_nonnull_attribute.c b/test/Feature/ubsan/ubsan_returns_nonnull_attribute.c
index f2a1c6e4..a94ea790 100644
--- a/test/Feature/ubsan/ubsan_returns_nonnull_attribute.c
+++ b/test/Feature/ubsan/ubsan_returns_nonnull_attribute.c
@@ -7,7 +7,7 @@
 #include "klee/klee.h"
 
 __attribute__((returns_nonnull)) char *foo(char *a) {
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: invalid-null-return
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: invalid-null-return
   return a;
 }
 
diff --git a/test/Feature/ubsan/ubsan_shift_base.c b/test/Feature/ubsan/ubsan_shift_base.c
index 2da71582..755c26c3 100644
--- a/test/Feature/ubsan/ubsan_shift_base.c
+++ b/test/Feature/ubsan/ubsan_shift_base.c
@@ -13,7 +13,7 @@
 #include "klee/klee.h"
 
 int lsh_overflow(signed int a, signed int b) {
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: shift out of bounds
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: shift out of bounds
   return a << b;
 }
 
diff --git a/test/Feature/ubsan/ubsan_shift_exponent.c b/test/Feature/ubsan/ubsan_shift_exponent.c
index 548ebb66..1c133b01 100644
--- a/test/Feature/ubsan/ubsan_shift_exponent.c
+++ b/test/Feature/ubsan/ubsan_shift_exponent.c
@@ -7,7 +7,7 @@
 #include "klee/klee.h"
 
 int rsh_inbounds(signed int a, signed int b) {
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: shift out of bounds
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: shift out of bounds
   return a >> b;
 }
 
diff --git a/test/Feature/ubsan/ubsan_signed_integer_overflow.c b/test/Feature/ubsan/ubsan_signed_integer_overflow.c
index df798e79..60b24dfa 100644
--- a/test/Feature/ubsan/ubsan_signed_integer_overflow.c
+++ b/test/Feature/ubsan/ubsan_signed_integer_overflow.c
@@ -14,16 +14,16 @@ int main() {
   klee_make_symbolic(&x, sizeof(x), "x");
   klee_make_symbolic(&y, sizeof(y), "y");
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: signed-integer-overflow
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: signed-integer-overflow
   result = x + y;
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: signed-integer-overflow
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: signed-integer-overflow
   result = x - y;
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: signed-integer-overflow
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: signed-integer-overflow
   result = x * y;
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: signed-integer-overflow
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: signed-integer-overflow
   result = -x;
 
   return 0;
diff --git a/test/Feature/ubsan/ubsan_unreachable.c b/test/Feature/ubsan/ubsan_unreachable.c
index bfc7f6ad..a7feaab7 100644
--- a/test/Feature/ubsan/ubsan_unreachable.c
+++ b/test/Feature/ubsan/ubsan_unreachable.c
@@ -7,7 +7,7 @@
 #include "klee/klee.h"
 
 void _Noreturn f() {
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: unreachable-call
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: unreachable-call
   __builtin_unreachable();
 }
 
diff --git a/test/Feature/ubsan/ubsan_unsigned_integer_overflow.c b/test/Feature/ubsan/ubsan_unsigned_integer_overflow.c
index a11c8d07..8ec66130 100644
--- a/test/Feature/ubsan/ubsan_unsigned_integer_overflow.c
+++ b/test/Feature/ubsan/ubsan_unsigned_integer_overflow.c
@@ -14,16 +14,16 @@ int main() {
   klee_make_symbolic(&x, sizeof(x), "x");
   klee_make_symbolic(&y, sizeof(y), "y");
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: unsigned-integer-overflow
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: unsigned-integer-overflow
   result = x + y;
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: unsigned-integer-overflow
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: unsigned-integer-overflow
   result = x - y;
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: unsigned-integer-overflow
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: unsigned-integer-overflow
   result = x * y;
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: unsigned-integer-overflow
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: unsigned-integer-overflow
   result = -x;
 
   return 0;
diff --git a/test/Feature/ubsan/ubsan_unsigned_shift_base.c b/test/Feature/ubsan/ubsan_unsigned_shift_base.c
index 92c61353..932c8208 100644
--- a/test/Feature/ubsan/ubsan_unsigned_shift_base.c
+++ b/test/Feature/ubsan/ubsan_unsigned_shift_base.c
@@ -9,7 +9,7 @@
 #include "klee/klee.h"
 
 int lsh_overflow(unsigned int a, unsigned int b) {
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: shift out of bounds
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: shift out of bounds
   return a << b;
 }
 
diff --git a/test/Feature/ubsan/ubsan_vla_bound.c b/test/Feature/ubsan/ubsan_vla_bound.c
index a057c62c..00ba1a1c 100644
--- a/test/Feature/ubsan/ubsan_vla_bound.c
+++ b/test/Feature/ubsan/ubsan_vla_bound.c
@@ -13,7 +13,7 @@ int main() {
 
   x = klee_range(-10, 10, "x");
 
-  // CHECK: runtime/Sanitizer/ubsan/ubsan_handlers.cpp:35: non-positive-vla-index
+  // CHECK: KLEE: ERROR: {{.*}}runtime/Sanitizer/ubsan/ubsan_handlers.cpp:34: non-positive-vla-index
   int arr[x];
   result = arr[0];
   return 0;