[{"id":3676506,"web_url":"http://patchwork.ozlabs.org/comment/3676506/","msgid":"<VI0PR08MB10392041DB28613CEDDD82B4FFF242@VI0PR08MB10392.eurprd08.prod.outlook.com>","list_archive_url":null,"date":"2026-04-13T07:27:53","subject":"RE: [PATCH 2/2] aarch64/testsuite: add LTO coverage for\n branch-protection notes and attributes","submitter":{"id":69689,"url":"http://patchwork.ozlabs.org/api/people/69689/","name":"Tamar Christina","email":"Tamar.Christina@arm.com"},"content":"> -----Original Message-----\n> From: Muhammad Kamran <muhammad.kamran@arm.com>\n> Sent: 08 April 2026 10:12\n> To: gcc-patches@gcc.gnu.org\n> Cc: Richard Earnshaw <Richard.Earnshaw@arm.com>; Tamar Christina\n> <Tamar.Christina@arm.com>; Kyrylo Tkachov <ktkachov@nvidia.com>; Alice\n> Carlotti <Alice.Carlotti@arm.com>; Alex Coplan <Alex.Coplan@arm.com>;\n> Andrew Pinski <andrew.pinski@oss.qualcomm.com>; Wilco Dijkstra\n> <Wilco.Dijkstra@arm.com>; Jakub Jelinek <jakub@redhat.com>; Rainer Orth\n> <ro@CeBiTec.Uni-Bielefeld.DE>; Mike Stump <mikestump@comcast.net>;\n> Muhammad Kamran <Muhammad.Kamran@arm.com>\n> Subject: [PATCH 2/2] aarch64/testsuite: add LTO coverage for branch-\n> protection notes and attributes\n> \n> Recent binutils (e.g. 2.46) switched AArch64 branch-protection emission\n> from .note.gnu.property to build attributes\n> (Tag_Feature_BTI, Tag_Feature_PAC, Tag_Feature_GCS) when GCC is\n> configured with such toolchains.\n> \n> PR target/124365 exposed an issue where -flto with\n> -mbranch-protection=standard caused loss of branch-protection metadata in\n> build\n> attributes. This was due to an LTO bug, now fixed upstream\n> (8b39ec70741b7fb9d059b6944f30a6743dea996a).\n> \n> Add tests to verify both forms in LTO builds, covering:\n> \t• older binutils behaviour (.note.gnu.property), and\n> \t• newer binutils behaviour (build attributes).\n> \n> This ensures branch-protection metadata is preserved across LTO for both\n> toolchain configurations.\n> \n> \tPR target/124365\n> \n> gcc/testsuite/ChangeLog:\n> \n> \t* gcc.target/aarch64/lto/lto.exp: New DejaGnu test driver for LTO\n> tests\n> \tfor aarch64. Copied from gcc/testsuite/gcc.target/arm/lto/lto.exp\n> with\n> \tminor changes.\n> \t* gcc.target/aarch64/lto/pr124365-build-attributes-1_0.c: New test\n> \tfor build attributes with branch protection.\n> \t* gcc.target/aarch64/lto/pr124365-build-attributes-1_1.c:\n> Companion\n> \tsource file for the LTO test.\n> \t* gcc.target/aarch64/lto/pr124365-build-attributes-2_0.c: New test\n> \tfor build attributes without branch protection.\n> \t* gcc.target/aarch64/lto/pr124365-build-attributes-2_1.c:\n> Companion\n> \tsource file for the LTO test with branch protection enabled.\n> \t* gcc.target/aarch64/lto/pr124365-gnu-property-1_0.c: New test for\n> \t`.note.gnu.property` with branch protection.\n> \t* gcc.target/aarch64/lto/pr124365-gnu-property-1_1.c: Companion\n> \tsource file for the LTO test.\n> \t* gcc.target/aarch64/lto/pr124365-gnu-property-2_0.c: New test for\n> \t`.note.gnu.property` without branch protection.\n> \t* gcc.target/aarch64/lto/pr124365-gnu-property-2_1.c: Companion\n> \tsource file for the LTO test with branch protection enabled.\n\nOK, once patch 1 is approved.\n\nThanks,\nTamar\n\n> ---\n>  gcc/testsuite/gcc.target/aarch64/lto/lto.exp  | 61 +++++++++++++++++++\n>  .../lto/pr124365-build-attributes-1_0.c       | 18 ++++++\n>  .../lto/pr124365-build-attributes-1_1.c       |  5 ++\n>  .../lto/pr124365-build-attributes-2_0.c       | 18 ++++++\n>  .../lto/pr124365-build-attributes-2_1.c       |  6 ++\n>  .../aarch64/lto/pr124365-gnu-property-1_0.c   | 16 +++++\n>  .../aarch64/lto/pr124365-gnu-property-1_1.c   |  5 ++\n>  .../aarch64/lto/pr124365-gnu-property-2_0.c   | 16 +++++\n>  .../aarch64/lto/pr124365-gnu-property-2_1.c   |  6 ++\n>  9 files changed, 151 insertions(+)\n>  create mode 100644 gcc/testsuite/gcc.target/aarch64/lto/lto.exp\n>  create mode 100644 gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-\n> attributes-1_0.c\n>  create mode 100644 gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-\n> attributes-1_1.c\n>  create mode 100644 gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-\n> attributes-2_0.c\n>  create mode 100644 gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-\n> attributes-2_1.c\n>  create mode 100644 gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-\n> property-1_0.c\n>  create mode 100644 gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-\n> property-1_1.c\n>  create mode 100644 gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-\n> property-2_0.c\n>  create mode 100644 gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-\n> property-2_1.c\n> \n> diff --git a/gcc/testsuite/gcc.target/aarch64/lto/lto.exp\n> b/gcc/testsuite/gcc.target/aarch64/lto/lto.exp\n> new file mode 100644\n> index 00000000000..0c72d343174\n> --- /dev/null\n> +++ b/gcc/testsuite/gcc.target/aarch64/lto/lto.exp\n> @@ -0,0 +1,61 @@\n> +# Copyright (C) 2009-2026 Free Software Foundation, Inc.\n> +\n> +# This program is free software; you can redistribute it and/or modify\n> +# it under the terms of the GNU General Public License as published by\n> +# the Free Software Foundation; either version 3 of the License, or\n> +# (at your option) any later version.\n> +#\n> +# This program is distributed in the hope that it will be useful,\n> +# but WITHOUT ANY WARRANTY; without even the implied warranty of\n> +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the\n> +# GNU General Public License for more details.\n> +#\n> +# You should have received a copy of the GNU General Public License\n> +# along with GCC; see the file COPYING3.  If not see\n> +# <http://www.gnu.org/licenses/>.\n> +\n> +# Exit immediately if this isn't an AArch64 target.\n> +if ![istarget aarch64*-*-*] then {\n> +  return\n> +}\n> +\n> +# Test link-time optimization across multiple files.\n> +#\n> +# Programs are broken into multiple files.  Each one is compiled\n> +# separately with LTO information.  The final executable is generated\n> +# by collecting all the generated object files using regular LTO or WHOPR.\n> +\n> +if $tracelevel then {\n> +    strace $tracelevel\n> +}\n> +\n> +# Load procedures from common libraries.\n> +load_lib standard.exp\n> +load_lib gcc.exp\n> +\n> +# Load the language-independent compatibility support procedures.\n> +load_lib lto.exp\n> +\n> +# If LTO has not been enabled, bail.\n> +if { ![check_effective_target_lto] } {\n> +    return\n> +}\n> +\n> +gcc_init\n> +lto_init no-mathlib\n> +\n> +# Define an identifier for use with this suite to avoid name conflicts\n> +# with other lto tests running at the same time.\n> +set sid \"c_lto\"\n> +\n> +# Main loop.\n> +foreach src [lsort [find $srcdir/$subdir *_0.c]] {\n> +    # If we're only testing specific files and this isn't one of them, skip it.\n> +    if ![runtest_file_p $runtests $src] then {\n> +\tcontinue\n> +    }\n> +\n> +    lto-execute $src $sid\n> +}\n> +\n> +lto_finish\n> diff --git a/gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-attributes-\n> 1_0.c b/gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-attributes-\n> 1_0.c\n> new file mode 100644\n> index 00000000000..c2819532f3f\n> --- /dev/null\n> +++ b/gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-attributes-1_0.c\n> @@ -0,0 +1,18 @@\n> +/* PR target/124365 */\n> +/* { dg-lto-do link } */\n> +/* { dg-skip-if \"\" { ! aarch64*-*-linux* } } */\n> +/* { dg-require-effective-target aarch64_gas_has_build_attributes } */\n> +/* { dg-require-effective-target mbranch_protection_ok } */\n> +/* { dg-lto-options { { -flto -O2 -mbranch-protection=standard } } } */\n> +/* { dg-extra-ld-options \"-nostdlib -nostartfiles -Wl,-e,main\" } */\n> +\n> +int foo ();\n> +int\n> +main (void)\n> +{\n> +  return foo ();\n> +}\n> +\n> +/* { dg-final { object-readelf-attributes {Tag_Feature_BTI:\\s+1\\s+\\(0x1\\)} } }\n> */\n> +/* { dg-final { object-readelf-attributes {Tag_Feature_PAC:\\s+1\\s+\\(0x1\\)} } }\n> */\n> +/* { dg-final { object-readelf-attributes {Tag_Feature_GCS:\\s+1\\s+\\(0x1\\)} } }\n> */\n> diff --git a/gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-attributes-\n> 1_1.c b/gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-attributes-\n> 1_1.c\n> new file mode 100644\n> index 00000000000..8f8b1830bac\n> --- /dev/null\n> +++ b/gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-attributes-1_1.c\n> @@ -0,0 +1,5 @@\n> +int\n> +foo ()\n> +{\n> +  return 0;\n> +}\n> diff --git a/gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-attributes-\n> 2_0.c b/gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-attributes-\n> 2_0.c\n> new file mode 100644\n> index 00000000000..091ecc83637\n> --- /dev/null\n> +++ b/gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-attributes-2_0.c\n> @@ -0,0 +1,18 @@\n> +/* PR target/124365 */\n> +/* { dg-lto-do link } */\n> +/* { dg-skip-if \"\" { ! aarch64*-*-linux* } } */\n> +/* { dg-require-effective-target aarch64_gas_has_build_attributes } */\n> +/* { dg-require-effective-target mbranch_protection_ok } */\n> +/* { dg-lto-options { { -flto -O2 -mbranch-protection=none } } } */\n> +/* { dg-extra-ld-options \"-nostdlib -nostartfiles -Wl,-e,main\" } */\n> +\n> +int foo ();\n> +int\n> +main (void)\n> +{\n> +  return foo ();\n> +}\n> +\n> +/* { dg-final { object-readelf-attributes {Tag_Feature_BTI:\\s+0\\s+\\(0x0\\)} } }\n> */\n> +/* { dg-final { object-readelf-attributes {Tag_Feature_PAC:\\s+0\\s+\\(0x0\\)} } }\n> */\n> +/* { dg-final { object-readelf-attributes {Tag_Feature_GCS:\\s+0\\s+\\(0x0\\)} } }\n> */\n> diff --git a/gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-attributes-\n> 2_1.c b/gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-attributes-\n> 2_1.c\n> new file mode 100644\n> index 00000000000..15f7c94dccb\n> --- /dev/null\n> +++ b/gcc/testsuite/gcc.target/aarch64/lto/pr124365-build-attributes-2_1.c\n> @@ -0,0 +1,6 @@\n> +/* { dg-options \"-O2 -flto -mbranch-protection=standard\" }  */\n> +int\n> +foo ()\n> +{\n> +  return 0;\n> +}\n> diff --git a/gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-property-\n> 1_0.c b/gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-property-1_0.c\n> new file mode 100644\n> index 00000000000..fca83daa0c8\n> --- /dev/null\n> +++ b/gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-property-1_0.c\n> @@ -0,0 +1,16 @@\n> +/* PR target/124365 */\n> +/* { dg-lto-do link } */\n> +/* { dg-skip-if \"\" { ! aarch64*-*-linux* } } */\n> +/* { dg-skip-if \"\" { aarch64_gas_has_build_attributes } } */\n> +/* { dg-require-effective-target mbranch_protection_ok } */\n> +/* { dg-lto-options { { -flto -O2 -mbranch-protection=standard } } } */\n> +/* { dg-extra-ld-options \"-nostdlib -nostartfiles -Wl,-e,main\" } */\n> +\n> +int foo ();\n> +int\n> +main (void)\n> +{\n> +  return 0;\n> +}\n> +\n> +/* { dg-final { object-readelf-notes {AArch64\n> feature:\\s+BTI,\\s+PAC,\\s+(GCS|<unknown:\\s+[0-9]+>)} } } */\n> diff --git a/gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-property-\n> 1_1.c b/gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-property-1_1.c\n> new file mode 100644\n> index 00000000000..8f8b1830bac\n> --- /dev/null\n> +++ b/gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-property-1_1.c\n> @@ -0,0 +1,5 @@\n> +int\n> +foo ()\n> +{\n> +  return 0;\n> +}\n> diff --git a/gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-property-\n> 2_0.c b/gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-property-2_0.c\n> new file mode 100644\n> index 00000000000..728ad8e1ea1\n> --- /dev/null\n> +++ b/gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-property-2_0.c\n> @@ -0,0 +1,16 @@\n> +/* PR target/124365 */\n> +/* { dg-lto-do link } */\n> +/* { dg-skip-if \"\" { ! aarch64*-*-linux* } } */\n> +/* { dg-skip-if \"\" { aarch64_gas_has_build_attributes } } */\n> +/* { dg-require-effective-target mbranch_protection_ok } */\n> +/* { dg-lto-options { { -flto -O2 -mbranch-protection=none } } } */\n> +/* { dg-extra-ld-options \"-nostdlib -nostartfiles -Wl,-e,main\" } */\n> +\n> +int foo ();\n> +int\n> +main (void)\n> +{\n> +  return 0;\n> +}\n> +\n> +/* { dg-final { object-readelf-notes-not {AArch64\n> feature:\\s+BTI\\s+PAC\\s+(GCS|<unknown:\\s+[0-9]+>)} } } */\n> diff --git a/gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-property-\n> 2_1.c b/gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-property-2_1.c\n> new file mode 100644\n> index 00000000000..15f7c94dccb\n> --- /dev/null\n> +++ b/gcc/testsuite/gcc.target/aarch64/lto/pr124365-gnu-property-2_1.c\n> @@ -0,0 +1,6 @@\n> +/* { dg-options \"-O2 -flto -mbranch-protection=standard\" }  */\n> +int\n> +foo ()\n> +{\n> +  return 0;\n> +}\n> --\n> 2.43.0","headers":{"Return-Path":"<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>","X-Original-To":["incoming@patchwork.ozlabs.org","gcc-patches@gcc.gnu.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","gcc-patches@gcc.gnu.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=CcG4sf2U;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=CcG4sf2U;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=38.145.34.32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)","sourceware.org;\n\tdkim=pass (1024-bit key,\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=CcG4sf2U;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=CcG4sf2U","sourceware.org;\n dmarc=pass (p=none dis=none) header.from=arm.com","sourceware.org; spf=pass smtp.mailfrom=arm.com","server2.sourceware.org;\n arc=pass smtp.remote-ip=52.101.83.0"],"Received":["from vm01.sourceware.org (vm01.sourceware.org [38.145.34.32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fvJvs4n3cz1yDF\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 13 Apr 2026 17:29:40 +1000 (AEST)","from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id 0681B4BA2E0A\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 13 Apr 2026 07:29:38 +0000 (GMT)","from GVXPR05CU001.outbound.protection.outlook.com\n (mail-swedencentralazon11013000.outbound.protection.outlook.com\n [52.101.83.0])\n by sourceware.org (Postfix) with ESMTPS id B6A284BA2E0A\n for <gcc-patches@gcc.gnu.org>; Mon, 13 Apr 2026 07:29:04 +0000 (GMT)","from AS9PR06CA0099.eurprd06.prod.outlook.com (2603:10a6:20b:465::34)\n by AM9PR08MB6161.eurprd08.prod.outlook.com (2603:10a6:20b:280::14)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9769.48; Mon, 13 Apr\n 2026 07:28:58 +0000","from AMS1EPF00000042.eurprd04.prod.outlook.com\n (2603:10a6:20b:465:cafe::18) by AS9PR06CA0099.outlook.office365.com\n (2603:10a6:20b:465::34) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9769.48 via Frontend Transport; Mon,\n 13 Apr 2026 07:28:58 +0000","from outbound-uk1.az.dlp.m.darktrace.com (4.158.2.129) by\n AMS1EPF00000042.mail.protection.outlook.com (10.167.16.39) with Microsoft\n SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9769.17\n via Frontend Transport; Mon, 13 Apr 2026 07:28:57 +0000","from VI0PR08MB10392.eurprd08.prod.outlook.com\n (2603:10a6:800:210::10) by VI0PR08MB11169.eurprd08.prod.outlook.com\n (2603:10a6:800:252::20) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9769.48; Mon, 13 Apr\n 2026 07:27:54 +0000","from VI0PR08MB10392.eurprd08.prod.outlook.com\n ([fe80::cd7c:e19a:2072:75cc]) by VI0PR08MB10392.eurprd08.prod.outlook.com\n ([fe80::cd7c:e19a:2072:75cc%4]) with mapi id 15.20.9769.046; Mon, 13 Apr 2026\n 07:27:54 +0000"],"DKIM-Filter":["OpenDKIM Filter v2.11.0 sourceware.org 0681B4BA2E0A","OpenDKIM Filter v2.11.0 sourceware.org B6A284BA2E0A"],"DMARC-Filter":"OpenDMARC Filter v1.4.2 sourceware.org B6A284BA2E0A","ARC-Filter":"OpenARC Filter v1.0.0 sourceware.org B6A284BA2E0A","ARC-Seal":["i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1776065345; cv=pass;\n b=fayRvzBr6z0hyC3+AjPaMu67Er86NlGeGC4aIoMy+zSGmg0GP2N1c8LbZaqKVx7Q1TkNnX0TnMkuFG7qYJIG7z4qIziP2P7PQCjYRBBY83pBRzjURvx8RQgCvMc32Av/lXGoX4Z6+qw31djki9KZU97T0hgM1lCosUGXyQlrtSk=","i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;\n b=W9XEfX7jVUHdTsbjtJ7CCyyUxvKNDfXhYygBZzA8yODPVki9YCyrQhp2zJKfiXuwu0PnLRzvlIgb79DPS0q0c2BVda5c8lS/CAbD3LhtcySximJnNpRy2almDH7248ZG/ryzdED76wz+sM9vWXixLUjuvV3R5CF/aeVV7/kq3PVkXfTqKMPMj2ER0VgGxCgy6QQymMUwB3hZ6VaMqyQbNRk+Ut3mOMSvpbWCzdm6xH4KBSeGnDlMph+jWVNz1VsX8z2ybLAnB6MTPiIIbyjtX9ZMV1Rnx/SaV+8O5xwMNk2Zpb4OOEu//JFCJgyRnTCgh84CzK1I98MlupKRfD8ecQ==","i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=Ij9CWDWB06+cp7MdHSPzbPYqbvyrSQ7uaBcF8h3JFsQoFC/jnHkKJ+tr2sfMIKkkTEvjwJlUpqu1S/TChKD6RfsOV/KmwVY7tgKfXIXPa4m4PmKmLvOITZ3qPRLfnnVrtII/xy6uuaLzqjCwPn6hA+A25wfcOpN60z+X/utfgfIyv/CjYI+i9dSp8u2MvX1+tqOWkHYjwvWcjO3T/4UYCRXMGa91rk9BTWVZD9ENUwygeEeQiJKA4OAO6bHEUy5uMYyZ99dveMoIEkSnwsN0KThPEzx20T8Ot/YKNL4pmnSYtG2757jUi9m5HW9pRbDL/OeeF61Zba5/TAgTV/zaPA=="],"ARC-Message-Signature":["i=3; a=rsa-sha256; d=sourceware.org; s=key;\n t=1776065345; c=relaxed/simple;\n bh=XExGyNsKZJp54WlhnBO/abCLAryctiJ4/heff4J29HA=;\n h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID:\n MIME-Version;\n b=SMW9n0VwYiBkvlv0CU9sZej3z827x+GSUfZw9S6s2hhFL790eh43twYSwKR1fUDnNQRjFTVPwc+c1ZWHbbCXNgJneRq+0nxvWxbQ5fdIC5n9p/mgZTvQJnFrw/o7QBMmwUHkOtCh+88mNbHr/G7VHsRAiE8IaKP1dBHOazSgvhI=","i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=XExGyNsKZJp54WlhnBO/abCLAryctiJ4/heff4J29HA=;\n b=gJZvK4l9rHmUII0d4PFymZm+33UUI/TgWo+L0haZgzkmlwcQd7kH5VxuG/GciA/0Z8XRtScvdL76F6ldnyjgVxOeUdBUMZJJxSQ0rmCsx2ygJcK7Ka0D3ipBHp8/xX0riNhntbDG52rMAqmN/EroRnEnTYU3kRIqL6nhTWcdnaUj+y2YMM3YCYeR5Pz6bhG/hPBmGT4xBdO4Tvckr2t5TGm5iOHagzphwITLjgmGVRAaVTlMti5+YDxl36JHuwnXbOZDFnk3UyqxqiSEFKY+/dQdtOJljCglu77yCH0LhO6BtGra/gkOS6vSrW9ZXHLKvbjXCWGOKYD6wvKE2jGuvA==","i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=XExGyNsKZJp54WlhnBO/abCLAryctiJ4/heff4J29HA=;\n b=F090YKENLeOV4mBiwr67VmvEjI7NTv1mxhu7C9wPcwrixc7+EEg3ZAdUbnE2s57lHNLrBGXXLxPBcy2FDGqsA8bBpE0h3Lyp0fH/95z1wsMUh/dfjPkbQ0G15lFMvuQnqHQQQgeUq+O0tekZmobZ72AWsu5eHzZTxivY/J/9KMit6PrNQwo+3pNSDPeyCWaWCk4Lpz2/ZcGuOi3fUBZtiudxuBgSl/g5ki003yNuGB+FLCIV5Vu54Aw7emcbtwMH8lYeyaDxIUh8K4g3tKGVqB2eIrrA0mcdJSiOs12HXJtQCwUw5+NeXutH+XFTRd5YdIfJQruJLEfbxpQXIDnhuQ=="],"ARC-Authentication-Results":["i=3; server2.sourceware.org","i=2; mx.microsoft.com 1; spf=pass (sender ip is\n 4.158.2.129) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass\n (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass\n (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1\n spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com]\n dmarc=[1,1,header.from=arm.com])","i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass\n header.d=arm.com; arc=none"],"DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=XExGyNsKZJp54WlhnBO/abCLAryctiJ4/heff4J29HA=;\n b=CcG4sf2U4aqAfOYs4dK98/u+t2im1q7waZnVUY8YsA/76p3h/6YNDUtFfqzjqk1mqim7JUVDePEIvZFr4RHfXbHnznzHe/b2zmIw05aujFJmgBNN/OtPx07r3yVTw667V7AhgdNOWvpTk7J+EcTd8lEqHl3CI0VN+eS2Q5q8D24=","v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=XExGyNsKZJp54WlhnBO/abCLAryctiJ4/heff4J29HA=;\n b=CcG4sf2U4aqAfOYs4dK98/u+t2im1q7waZnVUY8YsA/76p3h/6YNDUtFfqzjqk1mqim7JUVDePEIvZFr4RHfXbHnznzHe/b2zmIw05aujFJmgBNN/OtPx07r3yVTw667V7AhgdNOWvpTk7J+EcTd8lEqHl3CI0VN+eS2Q5q8D24="],"X-MS-Exchange-Authentication-Results":"spf=pass (sender IP is 4.158.2.129)\n smtp.mailfrom=arm.com; dkim=pass (signature was verified)\n header.d=arm.com;dmarc=pass action=none header.from=arm.com;","Received-SPF":"Pass (protection.outlook.com: domain of arm.com designates\n 4.158.2.129 as permitted sender) receiver=protection.outlook.com;\n client-ip=4.158.2.129; helo=outbound-uk1.az.dlp.m.darktrace.com; pr=C","From":"Tamar Christina <Tamar.Christina@arm.com>","To":"Muhammad Kamran <Muhammad.Kamran@arm.com>, \"gcc-patches@gcc.gnu.org\"\n <gcc-patches@gcc.gnu.org>","CC":"Richard Earnshaw <Richard.Earnshaw@arm.com>, Kyrylo Tkachov\n <ktkachov@nvidia.com>, Alice Carlotti <Alice.Carlotti@arm.com>, Alex Coplan\n <Alex.Coplan@arm.com>, Andrew Pinski <andrew.pinski@oss.qualcomm.com>, Wilco\n Dijkstra <Wilco.Dijkstra@arm.com>, Jakub Jelinek <jakub@redhat.com>, Rainer\n Orth <ro@CeBiTec.Uni-Bielefeld.DE>, Mike Stump <mikestump@comcast.net>,\n Muhammad Kamran <Muhammad.Kamran@arm.com>","Subject":"RE: [PATCH 2/2] aarch64/testsuite: add LTO coverage for\n branch-protection notes and attributes","Thread-Topic":"[PATCH 2/2] aarch64/testsuite: add LTO coverage for\n branch-protection notes and attributes","Thread-Index":"AQHcxzfU+EhsVsWccUWpdpzPwv5IErXcnh3A","Date":"Mon, 13 Apr 2026 07:27:53 +0000","Message-ID":"\n <VI0PR08MB10392041DB28613CEDDD82B4FFF242@VI0PR08MB10392.eurprd08.prod.outlook.com>","References":"<20260408091202.13538-1-muhammad.kamran@arm.com>\n <20260408091202.13538-3-muhammad.kamran@arm.com>","In-Reply-To":"<20260408091202.13538-3-muhammad.kamran@arm.com>","Accept-Language":"en-US","Content-Language":"en-US","X-MS-Has-Attach":"","X-MS-TNEF-Correlator":"","Authentication-Results-Original":"dkim=none (message not signed)\n header.d=none;dmarc=none action=none header.from=arm.com;","x-ms-traffictypediagnostic":"\n VI0PR08MB10392:EE_|VI0PR08MB11169:EE_|AMS1EPF00000042:EE_|AM9PR08MB6161:EE_","X-MS-Office365-Filtering-Correlation-Id":"4ff675ab-6a8f-41d2-36db-08de992e5355","x-checkrecipientrouted":"true","nodisclaimer":"true","X-MS-Exchange-SenderADCheck":"1","X-MS-Exchange-AntiSpam-Relay":"0","X-Microsoft-Antispam-Untrusted":"BCL:0;\n ARA:13230040|366016|1800799024|376014|56012099003|18002099003|22082099003|38070700021;","X-Microsoft-Antispam-Message-Info-Original":"\n 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","X-Forefront-Antispam-Report-Untrusted":"CIP:255.255.255.255; CTRY:; LANG:en;\n SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI0PR08MB10392.eurprd08.prod.outlook.com;\n PTR:; CAT:NONE;\n SFS:(13230040)(366016)(1800799024)(376014)(56012099003)(18002099003)(22082099003)(38070700021);\n DIR:OUT; SFP:1101;","Content-Type":"text/plain; charset=\"utf-8\"","Content-Transfer-Encoding":"base64","MIME-Version":"1.0","X-Exchange-RoutingPolicyChecked":"\n kHwUhMf/dgPBNMCKh3L0rZ8S388UHUShmNQhX/gfsXvTsYBDNI8/P2ithgRShVojNKZNJmf4nvmJLljQvpAJkCSmgYQ9trrEA+4ukEXzBh9BJd3JW8J14RCk1jzFsoQ6tu8/F4XRHxMGyjfnGkuf+HKP9xKyFCS7v0bubYHRkcJ6ItArkHQH9mz+W6iQldAHj+Tn7zK9RtCkK9r5Ux/rCb4hWaMAZ++WHHzwfaly3eTCzZjmf3+qoIdXPBtcRpOHtgqYgU8axx24V+fM+DW9ckD4vlY6KZNEeBBFRtVWbIBSZK+saFzoqTDgiKhOv/+zqSdIzP0FW8sxDPRdB9chfw==","X-MS-Exchange-Transport-CrossTenantHeadersStamped":["VI0PR08MB11169","AM9PR08MB6161"],"X-EOPAttributedMessage":"0","X-MS-Exchange-Transport-CrossTenantHeadersStripped":"\n AMS1EPF00000042.eurprd04.prod.outlook.com","X-MS-PublicTrafficType":"Email","X-MS-Office365-Filtering-Correlation-Id-Prvs":"\n f346b401-d467-4898-19f5-08de992e2d39","X-Microsoft-Antispam":"BCL:0;\n ARA:13230040|1800799024|82310400026|35042699022|36860700016|376014|14060799003|56012099003|18002099003|22082099003|13003099007;","X-Microsoft-Antispam-Message-Info":"\n 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","X-Forefront-Antispam-Report":"CIP:4.158.2.129; CTRY:GB; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:outbound-uk1.az.dlp.m.darktrace.com;\n PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(1800799024)(82310400026)(35042699022)(36860700016)(376014)(14060799003)(56012099003)(18002099003)(22082099003)(13003099007);\n DIR:OUT; SFP:1101;","X-MS-Exchange-AntiSpam-MessageData-ChunkCount":"1","X-MS-Exchange-AntiSpam-MessageData-0":"\n uKi7r5S4I2/rMgXHgP8pTmF4A6esAURm2bA0f2AAMpBXR+qrPC4AeDFZYxTfdsP9FgpwPt5Ps2wcbs3WNzKo7HW8nfEBqdMdzRM5p3lMsLo7PkN45Gmb8gcNCy63Z6ExPgyVomBHMZqeMZaQr4Ieh+7aFK9nH8ZJt29vprPX9xLBeQkDF7tyrD9IjnrSyfMEMh7pRBYLjpMRQTcaSoqiT69Oajqe2JRHt2DLtkp9YUuc6L3i+4m8KtkXMf9SCTu38rQ8fTULURzx7BpNAahotYx9f7kxTbsc87HVAHgvj0/WErfvKl3nPQ5rqDlLZzvaSj0I3zeSUk+oGhQKlnY/pj2xCA+vVshVrmHDfLcP/LELCCxIU18cgJ53GtNOOSmddFDL8JmLO5fylQqUVkKfJBNSi2SJcWJUdfBBXkIBGzIrS+70e7pSkS7ONHArm+PQ","X-OriginatorOrg":"arm.com","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"13 Apr 2026 07:28:57.7733 (UTC)","X-MS-Exchange-CrossTenant-Network-Message-Id":"\n 4ff675ab-6a8f-41d2-36db-08de992e5355","X-MS-Exchange-CrossTenant-Id":"f34e5979-57d9-4aaa-ad4d-b122a662184d","X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp":"\n TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[4.158.2.129];\n Helo=[outbound-uk1.az.dlp.m.darktrace.com]","X-MS-Exchange-CrossTenant-AuthSource":"\n AMS1EPF00000042.eurprd04.prod.outlook.com","X-MS-Exchange-CrossTenant-AuthAs":"Anonymous","X-MS-Exchange-CrossTenant-FromEntityHeader":"HybridOnPrem","X-BeenThere":"gcc-patches@gcc.gnu.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Gcc-patches mailing list <gcc-patches.gcc.gnu.org>","List-Unsubscribe":"<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>","List-Archive":"<https://gcc.gnu.org/pipermail/gcc-patches/>","List-Post":"<mailto:gcc-patches@gcc.gnu.org>","List-Help":"<mailto:gcc-patches-request@gcc.gnu.org?subject=help>","List-Subscribe":"<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>","Errors-To":"gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"}}]