[BPF][Clang] Fix func argument pattern in bpf-stack-protector test

Commit 56b038f887f3("[BPF][clang] Ignore stack protector options for BPF
target") added a test for its corresponding functionality.
Douglas Yung found that the test will fail with the release build
buildbot due to different func argument patterns (from %msg
to %0). This patch fixed the issue by using pattern [0-9a-z]+
which allows both %msg and %0.
This commit is contained in:
Yonghong Song 2023-01-21 22:24:22 -08:00
parent 17c06ce829
commit 183d075055

View File

@ -24,7 +24,7 @@ char *strcpy(char *s1, const char *s2);
// STRONG: warning: ignoring '-fstack-protector-strong'
// COMMON-SAME: option as it is not currently supported for target 'bpf'
// COMMON: define {{.*}}void @test1(ptr noundef %msg) #[[A:.*]] {
// COMMON: define {{.*}}void @test1(ptr noundef %{{[0-9a-z]+}}) #[[A:.*]] {
void test1(const char *msg) {
char a[strlen(msg) + 1];
strcpy(a, msg);