Cover Letter Detail
Show a cover letter.
GET /api/1.1/covers/2220855/?format=api
{ "id": 2220855, "url": "http://patchwork.ozlabs.org/api/1.1/covers/2220855/?format=api", "web_url": "http://patchwork.ozlabs.org/project/gcc/cover/20260408091202.13538-1-muhammad.kamran@arm.com/", "project": { "id": 17, "url": "http://patchwork.ozlabs.org/api/1.1/projects/17/?format=api", "name": "GNU Compiler Collection", "link_name": "gcc", "list_id": "gcc-patches.gcc.gnu.org", "list_email": "gcc-patches@gcc.gnu.org", "web_url": null, "scm_url": null, "webscm_url": null }, "msgid": "<20260408091202.13538-1-muhammad.kamran@arm.com>", "date": "2026-04-08T09:12:00", "name": "[0/2] aarch64/testsuite: improve object-readelf and add LTO branch-protection tests", "submitter": { "id": 92852, "url": "http://patchwork.ozlabs.org/api/1.1/people/92852/?format=api", "name": "Muhammad Kamran", "email": "muhammad.kamran@arm.com" }, "mbox": "http://patchwork.ozlabs.org/project/gcc/cover/20260408091202.13538-1-muhammad.kamran@arm.com/mbox/", "series": [ { "id": 499105, "url": "http://patchwork.ozlabs.org/api/1.1/series/499105/?format=api", "web_url": "http://patchwork.ozlabs.org/project/gcc/list/?series=499105", "date": "2026-04-08T09:12:00", "name": "aarch64/testsuite: improve object-readelf and add LTO branch-protection tests", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/499105/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/2220855/comments/", "headers": { "Return-Path": "<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "gcc-patches@gcc.gnu.org" ], "Delivered-To": [ "patchwork-incoming@legolas.ozlabs.org", "gcc-patches@gcc.gnu.org" ], "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=TYhWXbSo;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=TYhWXbSo;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=2620:52:6:3111::32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)", "sourceware.org;\n\tdkim=pass (1024-bit key,\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=TYhWXbSo;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=TYhWXbSo", "sourceware.org;\n dmarc=pass (p=none dis=none) header.from=arm.com", "sourceware.org; spf=pass smtp.mailfrom=arm.com", "server2.sourceware.org;\n arc=pass smtp.remote-ip=52.101.69.35" ], "Received": [ "from vm01.sourceware.org (vm01.sourceware.org\n [IPv6:2620:52:6:3111::32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4frHS52srRz1xtJ\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 08 Apr 2026 19:13:56 +1000 (AEST)", "from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id 020BA4BA2E19\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 8 Apr 2026 09:13:54 +0000 (GMT)", "from AM0PR83CU005.outbound.protection.outlook.com\n (mail-westeuropeazon11010035.outbound.protection.outlook.com [52.101.69.35])\n by sourceware.org (Postfix) with ESMTPS id 33F0A4BA2E09\n for <gcc-patches@gcc.gnu.org>; Wed, 8 Apr 2026 09:13:23 +0000 (GMT)", "from DU7P190CA0006.EURP190.PROD.OUTLOOK.COM (2603:10a6:10:550::18)\n by DU0PR08MB8729.eurprd08.prod.outlook.com (2603:10a6:10:403::17) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9769.17; Wed, 8 Apr\n 2026 09:13:17 +0000", "from DU6PEPF0000B61E.eurprd02.prod.outlook.com\n (2603:10a6:10:550:cafe::36) by DU7P190CA0006.outlook.office365.com\n (2603:10a6:10:550::18) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9769.37 via Frontend Transport; Wed,\n 8 Apr 2026 09:13:15 +0000", "from outbound-uk1.az.dlp.m.darktrace.com (4.158.2.129) by\n DU6PEPF0000B61E.mail.protection.outlook.com (10.167.8.133) with Microsoft\n SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9769.17\n via Frontend Transport; Wed, 8 Apr 2026 09:13:16 +0000", "from DU2PR04CA0334.eurprd04.prod.outlook.com (2603:10a6:10:2b4::24)\n by FRZPR08MB11192.eurprd08.prod.outlook.com (2603:10a6:d10:13c::10)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9769.17; Wed, 8 Apr\n 2026 09:12:13 +0000", "from DB3PEPF00008859.eurprd02.prod.outlook.com\n (2603:10a6:10:2b4:cafe::74) by DU2PR04CA0334.outlook.office365.com\n (2603:10a6:10:2b4::24) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9769.35 via Frontend Transport; Wed,\n 8 Apr 2026 09:12:13 +0000", "from nebula.arm.com (172.205.89.229) by\n DB3PEPF00008859.mail.protection.outlook.com (10.167.242.4) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.9769.17 via Frontend Transport; Wed, 8 Apr 2026 09:12:13 +0000", "from AZ-NEU-EX03.Arm.com (10.240.25.137) by AZ-NEU-EX04.Arm.com\n (10.240.25.138) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.29; Wed, 8 Apr\n 2026 09:12:10 +0000", "from ip-10-249-57-232.eu-west-1.compute.internal (10.249.57.232) by\n mail.arm.com (10.240.25.137) with Microsoft SMTP Server\n (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.29 via Frontend\n Transport; Wed, 8 Apr 2026 09:12:10 +0000" ], "DKIM-Filter": [ "OpenDKIM Filter v2.11.0 sourceware.org 020BA4BA2E19", "OpenDKIM Filter v2.11.0 sourceware.org 33F0A4BA2E09" ], "DMARC-Filter": "OpenDMARC Filter v1.4.2 sourceware.org 33F0A4BA2E09", "ARC-Filter": "OpenARC Filter v1.0.0 sourceware.org 33F0A4BA2E09", "ARC-Seal": [ "i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1775639603; cv=pass;\n b=ZB5EJnry4bEmADtEspipxJM54THWVLYwbon18CrAwduQVqPJYjEWdwfL0S77rg0ZM7dU1i7aV00SHnoB+X3CfoYpGG0+rM1CS2plCBvnyHdqu4igxNk+4aCCiaJtsAbRGE2WdfdquN0IQgekOEeKV3AqjiJouK4dcsX318245n8=", "i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;\n b=c5HBelk9kOGiCix9xd2Uiinrv46EHrKESQ///i9Ggpjs26rRveI7rweW4wW5QXjovbrc15FJHfJBTzMIJfKt/NDFHdh4AiM5iePb+wVAHn82H+5ANrESgdqFxW9ZP+fUenTzv9LQ4webW/RJscquBu4yoPgor6oetWpuhmyvLiX9HEfBz7sVXPpygzrRljF7WnlbRPxXFk53rqtZg0R26wfXGac9qIIq2CIJzktMMCTyaBA9H18nwObAB1aepn1mQTwRrDgVOvwSuMASrpT4IkiFKGutKR+BXOiPghpS08iYJkThy+IbeEYlerN1XKTRDOtLjWQ4YSDHYvYU8MiDTQ==", "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=koSOAjOaxaIomQVD2Tw+zF3B9ER7Bg6eSL6szg1LV3in2z4XsoeIuWeuPP2bMp3I2Sqwj1BmCkQ2LpH4EvjyVZFzpvOvu+KB/NOTllIGT/AT5TY7/f3PBdDzGQjMsgsbg1ik2bOMEzeWh8LJknAfvdvspMCjBatodj+cJUulP7Q5GapNbiJtPJE1CoeFGQzdcCXs704VAtIb2jWUp8mvr9AAf5P/C9WtIDcUKs8C+sqqc4DNGgsu+yR1SFZTI1qlTtaMIeTHt9/Q1qW/aok1N800/AlWOPDzdiMQXSOFC8CIwXK9xuORCHEMNJKdwH0ORup1IJCwdTeAUk/54UQMig==" ], "ARC-Message-Signature": [ "i=3; a=rsa-sha256; d=sourceware.org; s=key;\n t=1775639603; c=relaxed/simple;\n bh=CQH+XNBn+kTm71JTj7uFayOlL8bbzrJ1R8SA3aGSgg8=;\n h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID:\n MIME-Version;\n b=ZMVu4zNILdM+7VguAaTPTIfdlBe1gexpTO52HuPPMKWhCT5Lu0vG+p3vwz+/WSFCzkOhGrR4RxakhoJiGiLwzgl06GHvTzAiApPOQkqV6ZSO96RPre0qSbK026KhH0Y9ZBSx1bpa8I9R4nWhWdcOvzCf5vkoeXi+j3NO6xL9RHQ=", "i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=U9Zu7JqyCfjRf3RhgeVXc0t2/rASJLe8HrUpe8gmFXI=;\n b=HspsaHgoaZKM+RFYvK92DJo0IXXEoVaMqMb5d9ZMZUjYGoAr0vD/WnAeSL2QoG/QiauT/teWZW6NtLsTM1aibd0hFHhLr3BwzbwKSesuGbVrGq71eMu2O6sxubgBjgmTX6ee15Cb0xdUJIJDk22f0EUSxRVbvhnyqRysdYqbs9/BgKsxveKa2sDWjEd3Kgfb0CoZFjkdINOgiyDXEwJRrb8oNiUbNVVeZzgRlr3XH3vXiLBhx/P3P7dHlE/ftPvhnyoAQzV3l5zDbqHa/+sJ/LeIq9GHon7oSQuLxO0alDUC1+vn7APDkvX7nC7Cw+R0Az7Deb3y6utvt1VbtvCerg==", "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=U9Zu7JqyCfjRf3RhgeVXc0t2/rASJLe8HrUpe8gmFXI=;\n b=ueXlmwOal1xjgVRVv+QK/+blQTfnL/HZG6nC30hiT90JZbe9qQX7NZb8JkxMfnpZZcUFX8mNhLe8m8thRDlLYH6W8S5/Yky7ITseuhFm/l1F3SPS5htZg1B2yGRnFKCni3qIxiOcEwLLVvCv+oz8qyJc4n3unDxUOr3FgBYPkKh+ScSSP+KPptSLZvrkOecsy0k4LWXX5rXiAKjdq03v58L8BQPjQXFTUVYXl4aXOjuhbRKj0kGTOWN1G7XXgFKEHqBj6ZHpAlKCCdKG1MiYAixWMm6mdxccxE1AoH6fGcNsKC0ydpkZhVZHEQCbkZfJuNC/xXy3pRsXDizkuaVsWQ==" ], "ARC-Authentication-Results": [ "i=3; server2.sourceware.org", "i=2; mx.microsoft.com 1; spf=pass (sender ip is\n 4.158.2.129) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass\n (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass\n (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1\n spf=[1,1,smtp.mailfrom=arm.com] dmarc=[1,1,header.from=arm.com])", "i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 172.205.89.229) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com;\n dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;\n dkim=none (message not signed); arc=none (0)" ], "DKIM-Signature": [ "v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=U9Zu7JqyCfjRf3RhgeVXc0t2/rASJLe8HrUpe8gmFXI=;\n b=TYhWXbSoyEPvzySYX+A/qsqJKdxUXURip3sa3ONFdMhWJx+D8s4D7Bplhvq6HItFfhte803WQAFe484MhcdV6+kXVHPrtQsT2uxK7CRydYoOn33ykE0QgYL/TJdvnApiczYI70y0A2sB01Q+Jl9ouQ6qTNvUpnqJmC4h/XkhOt4=", "v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=U9Zu7JqyCfjRf3RhgeVXc0t2/rASJLe8HrUpe8gmFXI=;\n b=TYhWXbSoyEPvzySYX+A/qsqJKdxUXURip3sa3ONFdMhWJx+D8s4D7Bplhvq6HItFfhte803WQAFe484MhcdV6+kXVHPrtQsT2uxK7CRydYoOn33ykE0QgYL/TJdvnApiczYI70y0A2sB01Q+Jl9ouQ6qTNvUpnqJmC4h/XkhOt4=" ], "X-MS-Exchange-Authentication-Results": [ "spf=pass (sender IP is 4.158.2.129)\n smtp.mailfrom=arm.com; dkim=pass (signature was verified)\n header.d=arm.com;dmarc=pass action=none header.from=arm.com;", "spf=pass (sender IP is 172.205.89.229)\n smtp.mailfrom=arm.com; dkim=none (message not signed)\n header.d=none;dmarc=pass action=none header.from=arm.com;" ], "Received-SPF": [ "Pass (protection.outlook.com: domain of arm.com designates\n 4.158.2.129 as permitted sender) receiver=protection.outlook.com;\n client-ip=4.158.2.129; helo=outbound-uk1.az.dlp.m.darktrace.com; pr=C", "Pass (protection.outlook.com: domain of arm.com designates\n 172.205.89.229 as permitted sender) receiver=protection.outlook.com;\n client-ip=172.205.89.229; helo=nebula.arm.com; pr=C" ], "From": "Muhammad Kamran <muhammad.kamran@arm.com>", "To": "<gcc-patches@gcc.gnu.org>", "CC": "Richard Earnshaw <richard.earnshaw@arm.com>, Tamar Christina\n <tamar.christina@arm.com>, Kyrylo Tkachov <ktkachov@nvidia.com>, \"Alice\n Carlotti\" <alice.carlotti@arm.com>, Alex Coplan <alex.coplan@arm.com>,\n \"Andrew Pinski\" <andrew.pinski@oss.qualcomm.com>, Wilco Dijkstra\n <wilco.dijkstra@arm.com>, Jakub Jelinek <jakub@redhat.com>, Rainer Orth\n <ro@CeBiTec.Uni-Bielefeld.DE>, Mike Stump <mikestump@comcast.net>, \"Muhammad\n Kamran\" <muhammad.kamran@arm.com>", "Subject": "[PATCH 0/2] aarch64/testsuite: improve object-readelf and add LTO\n branch-protection tests", "Date": "Wed, 8 Apr 2026 09:12:00 +0000", "Message-ID": "<20260408091202.13538-1-muhammad.kamran@arm.com>", "X-Mailer": "git-send-email 2.43.0", "MIME-Version": "1.0", "Content-Type": "text/plain; charset=\"UTF-8\"", "Content-Transfer-Encoding": "8bit", "X-EOPAttributedMessage": "1", "X-MS-TrafficTypeDiagnostic": "\n DB3PEPF00008859:EE_|FRZPR08MB11192:EE_|DU6PEPF0000B61E:EE_|DU0PR08MB8729:EE_", "X-MS-Office365-Filtering-Correlation-Id": "b11c2c01-7f65-4718-35e0-08de954f11fd", "x-checkrecipientrouted": "true", "NoDisclaimer": "true", "X-MS-Exchange-SenderADCheck": "1", "X-MS-Exchange-AntiSpam-Relay": "0", "X-Microsoft-Antispam-Untrusted": "BCL:0;\n ARA:13230040|82310400026|376014|36860700016|1800799024|18002099003|56012099003|13003099007;", "X-Microsoft-Antispam-Message-Info-Original": "\n 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", "X-Forefront-Antispam-Report-Untrusted": "CIP:172.205.89.229; CTRY:IE; LANG:en;\n SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent;\n CAT:NONE;\n SFS:(13230040)(82310400026)(376014)(36860700016)(1800799024)(18002099003)(56012099003)(13003099007);\n DIR:OUT; SFP:1101;", "X-Exchange-RoutingPolicyChecked": "\n gNLRXyxkPuOBLsQY+7BSvaCWION+oVrLsmHysmBwLClf9YT0ZZn6IQIcgUPjLX/QWP5aVV+H3Cfe7uZriGs9Tz1lb4igCP6VeXFXXWWMBsLkQfanbfndQMA04wpZrrG8CmqUldtWSIOftTsXjKqxWx4lvE1Pc+grjZs+4QEK3HhdSjkku8W4b7vjrM8M9H2urONvww//ADbeT9JXve5Gk3Nkgm/5Jyr8I/16rY332Y39z04z5OPwZuzgYhBo9oKPzcPBv3DtwVTc9EQblXWhBYZusXd0KNr3bn8kJyrB+4Xg/SBVtEpjyqq/DvKk8vv/9zLBZhLH5JFlC5fWiQZjRQ==", "X-MS-Exchange-Transport-CrossTenantHeadersStamped": [ "FRZPR08MB11192", "DU0PR08MB8729" ], "X-MS-Exchange-Transport-CrossTenantHeadersStripped": "\n DU6PEPF0000B61E.eurprd02.prod.outlook.com", "X-MS-PublicTrafficType": "Email", "X-MS-Office365-Filtering-Correlation-Id-Prvs": "\n 0e884b3b-0471-447c-a5e5-08de954eebf0", "X-Microsoft-Antispam": "BCL:0;\n ARA:13230040|82310400026|14060799003|36860700016|1800799024|376014|35042699022|13003099007|18002099003|56012099003;", "X-Microsoft-Antispam-Message-Info": "\n ZCgR0v+Bo2jvTTDBLaUzBK2Z3f/ed8C4/rSTDOveo93BhKT+BUdZmfr/uoYOlQapci8P1uxkX21STvhyJI5wwJABFAYJOG0mIG4VS1me5AMjAruT2x+kf6/IWOxveJxZLjWy4V8RbtDh4OR6xGcYv/TxEucRJOyuROsut3ZhhT4qSk2xsLWkCBd6c0nuJkaSJQtwY8pvGcwmzrlZvc1leMrYXc88GpvFMpbKNOCMICyAXwYFnuHEfQ3+QXv8beHUIQVXBMUIJAw1RbsLzKY4iX1URyH24cOO9ZpWNP0+T9/4FVksIHl/uSRyzKwLE9RatkFBA1YaUVL3bGQRA1oldv7v3JVwe40j7GHp2S6DCThDJYWOs4ErY7r1Kv9XK2OyCq8MixFg7XFQZW+F+/G6p1mc8tBTmSXvwO1WgRFnolM2aCvbZ2ggNGY4IWw42i0FkeUEJUAC1Z5fv2MKZ5SuByHCvm0kS+/347hypDcMgN9eC68XdpBJv0AOAAtKvnemTJkjESwySxssv7kGx4OyhB8BXvp9TOUVqzGonfDoevWvPvoga576ofOW5cHG1755mm4XnDOqH1SwgEGe1e2D3hkpditu4TkcIAGdzNGYGNIaWK8b/qIJpRtfzdnuFN09sfZmgfp2avqGZ39jA7ZV9ygIH5m9t2+57ciLeaMK0W1T91uk+VmXTwxpUp2DA6rcVp4Xhyb10qsLms7PL9g9FxPfSBhpyee2o74R5pIOMPI3K9FHc1ECejt4BDPzA4/subHMScaPN/IupWAFwNx8Pw==", "X-Forefront-Antispam-Report": "CIP:4.158.2.129; CTRY:GB; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:outbound-uk1.az.dlp.m.darktrace.com;\n PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(82310400026)(14060799003)(36860700016)(1800799024)(376014)(35042699022)(13003099007)(18002099003)(56012099003);\n DIR:OUT; SFP:1101;", "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1", "X-MS-Exchange-AntiSpam-MessageData-0": "\n 3+m5uKwPWTNl9XMeA53zKIQSRRAx6JvqTt+7NX9VH100VTut0Q1Vh2W9xM+Pdl64Wgy2r/z6d6yNQ7jD1gvTiKG/EPz/n8lx+YGB6UI15PlF8hyCFrLXnlvEH0qPzdyflOoFP5XmoWtZzRAvU5v4KvxOyeDlLjZzOm16oljWwSE5iFdJJneha1aR1/Vb+XuwKNPoH26/P+NQKv2xwmdJLsZslLd4bSRVOt0MDHb/wYEBAPlIAm+iNBwwetcFnwh2G3KeefHwCHvOHLR4OfmPuW6SGw5qKFeLQUb8dGaOP6ajjdjVohy+eVXkg/RnNF3FfJzyWfiWT0dFNSD5Sqbn1lfm7QQhXngTVfvqVxl59ae7LJKeyfGofWG1Qwr9Ve0uzilTZ9QK44iqRYQ42WkFajKzP3kqSCw+OmW5biGO8QIhXAVIt3OIN0NY0Q7CdDH9", "X-OriginatorOrg": "arm.com", "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "08 Apr 2026 09:13:16.8913 (UTC)", "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n b11c2c01-7f65-4718-35e0-08de954f11fd", "X-MS-Exchange-CrossTenant-Id": "f34e5979-57d9-4aaa-ad4d-b122a662184d", "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "\n TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[4.158.2.129];\n Helo=[outbound-uk1.az.dlp.m.darktrace.com]", "X-MS-Exchange-CrossTenant-AuthSource": "\n DU6PEPF0000B61E.eurprd02.prod.outlook.com", "X-MS-Exchange-CrossTenant-AuthAs": "Anonymous", "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem", "X-BeenThere": "gcc-patches@gcc.gnu.org", "X-Mailman-Version": "2.1.30", "Precedence": "list", "List-Id": "Gcc-patches mailing list <gcc-patches.gcc.gnu.org>", "List-Unsubscribe": "<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>", "List-Archive": "<https://gcc.gnu.org/pipermail/gcc-patches/>", "List-Post": "<mailto:gcc-patches@gcc.gnu.org>", "List-Help": "<mailto:gcc-patches-request@gcc.gnu.org?subject=help>", "List-Subscribe": "<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>", "Errors-To": "gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org" }, "content": "When branch protection is enabled, every object file is marked with\ncompatibility tags. This tags can be either Build Attributes (BA) or GNU\nproperties, depending on the binutils version. When GCC is built with a version\nof binutils (2.46) that supports BAs, GCC defaults to using BAs for tagging.\n\nAn issue [1] was recently identified when branch protection and LTO are used\ntogether. LTO relies on utilities in libiberty to copy the tag sections from the\ninput objects to the output one. However, only the GNU properties section was\ncopied, while the BAs section was ignored. This issue went unnoticed during the\nBA testing phase due to the lack of test coverage for this use case. It was\nsubsequently fixed by [2], but without adding any corresponding test cases.\n\nThis series adds the missing LTO tests for branch protection, focusing on robust\nchecks that handle both metadata formats, depending on whether GCC was built\nwith an older or a BA-enabled version of binutils. It also improves the\nobject-readelf testsuite helper used by these tests.\n\n\tPR target/124365\n\nSeries overview\n\n\t* Generalize object-readelf to accept option, regex and is-negative and\n\tadd wrappers to check attributes, notes (and respective negative\n\tchecks).\n\t* Add LTO test for build attributes with branch protection enabled.\n\t* Add LTO test for build attributes with mixed TUs (one without branch\n\tprotection, one with it).\n\t* Add LTO test for .note.gnu.property with branch protection enabled.\n\t* Add LTO test for .note.gnu.property with mixed TUs (one without branch\n\tprotection, one with it).\n\t* This should keep coverage for both old/new binutils configurations and\n\tprevent regressions in the fixed LTO behavior.\n\nRegression tested on aarch64-linux-gnu and arm-linux-gnueabihf with no\nregressions.\n\n[1]: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=124365\n[2]: 8b39ec70741b7fb9d059b6944f30a6743dea996a\n\nMuhammad Kamran (2):\n testsuite: Extend object-readelf beyond attributes\n aarch64/testsuite: add LTO coverage for branch-protection notes and\n attributes\n\n gcc/doc/sourcebuild.texi | 23 ++++++\n gcc/testsuite/gcc.dg-selftests/dg-final.exp | 5 +-\n gcc/testsuite/gcc.target/aarch64/lto/lto.exp | 61 +++++++++++++++\n .../lto/pr124365-build-attributes-1_0.c | 18 +++++\n .../lto/pr124365-build-attributes-1_1.c | 5 ++\n .../lto/pr124365-build-attributes-2_0.c | 18 +++++\n .../lto/pr124365-build-attributes-2_1.c | 6 ++\n .../aarch64/lto/pr124365-gnu-property-1_0.c | 16 ++++\n .../aarch64/lto/pr124365-gnu-property-1_1.c | 5 ++\n .../aarch64/lto/pr124365-gnu-property-2_0.c | 16 ++++\n .../aarch64/lto/pr124365-gnu-property-2_1.c | 6 ++\n .../gcc.target/arm/lto/pr61123-enum-size_0.c | 2 +-\n gcc/testsuite/lib/lto.exp | 77 ++++++++++---------\n 13 files changed, 219 insertions(+), 39 deletions(-)\n create mode 100644 gcc/testsuite/gcc.target/aarch64/lto/lto.exp\n create mode 100644 gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-attributes-1_0.c\n create mode 100644 gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-attributes-1_1.c\n create mode 100644 gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-attributes-2_0.c\n create mode 100644 gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-attributes-2_1.c\n create mode 100644 gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-property-1_0.c\n create mode 100644 gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-property-1_1.c\n create mode 100644 gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-property-2_0.c\n create mode 100644 gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-property-2_1.c" }