From 183d075055c591dedead7ece972f1bdea611aa3b Mon Sep 17 00:00:00 2001 From: Yonghong Song Date: Sat, 21 Jan 2023 22:24:22 -0800 Subject: [PATCH] [BPF][Clang] Fix func argument pattern in bpf-stack-protector test Commit 56b038f887f3("[BPF][clang] Ignore stack protector options for BPF target") added a test for its corresponding functionality. Douglas Yung found that the test will fail with the release build buildbot due to different func argument patterns (from %msg to %0). This patch fixed the issue by using pattern [0-9a-z]+ which allows both %msg and %0. --- clang/test/CodeGen/bpf-stack-protector.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/clang/test/CodeGen/bpf-stack-protector.c b/clang/test/CodeGen/bpf-stack-protector.c index a005bb9..c17af89 100644 --- a/clang/test/CodeGen/bpf-stack-protector.c +++ b/clang/test/CodeGen/bpf-stack-protector.c @@ -24,7 +24,7 @@ char *strcpy(char *s1, const char *s2); // STRONG: warning: ignoring '-fstack-protector-strong' // COMMON-SAME: option as it is not currently supported for target 'bpf' -// COMMON: define {{.*}}void @test1(ptr noundef %msg) #[[A:.*]] { +// COMMON: define {{.*}}void @test1(ptr noundef %{{[0-9a-z]+}}) #[[A:.*]] { void test1(const char *msg) { char a[strlen(msg) + 1]; strcpy(a, msg); -- 2.7.4