| // Check the -msign-return-address= option, which has a required argument to | 
 | // select scope. | 
 | // RUN: %clang --target=aarch64 -c %s -### -msign-return-address=none                             2>&1 | \ | 
 | // RUN: FileCheck %s --check-prefix=RA-OFF --check-prefix=KEY --check-prefix=BTE-OFF --check-prefix=GCS-OFF --check-prefix=WARN | 
 |  | 
 | // RUN: %clang --target=aarch64 -c %s -### -msign-return-address=non-leaf                         2>&1 | \ | 
 | // RUN: FileCheck %s --check-prefix=RA-NON-LEAF --check-prefix=KEY-A --check-prefix=BTE-OFF --check-prefix=GCS-OFF --check-prefix=WARN | 
 |  | 
 | // RUN: %clang --target=aarch64 -c %s -### -msign-return-address=all                              2>&1 | \ | 
 | // RUN: FileCheck %s --check-prefix=RA-ALL      --check-prefix=KEY-A --check-prefix=BTE-OFF --check-prefix=GCS-OFF --check-prefix=WARN | 
 |  | 
 | // -mbranch-protection with standard | 
 | // RUN: %clang --target=aarch64 -c %s -### -mbranch-protection=standard                                2>&1 | \ | 
 | // RUN: FileCheck %s --check-prefix=RA-NON-LEAF --check-prefix=KEY-A --check-prefix=BTE-ON --check-prefix=GCS-ON --check-prefix=WARN | 
 |  | 
 | // If the -msign-return-address and -mbranch-protection are both used, the | 
 | // right-most one controls return address signing. | 
 | // RUN: %clang --target=aarch64 -c %s -### -msign-return-address=non-leaf -mbranch-protection=none     2>&1 | \ | 
 | // RUN: FileCheck %s --check-prefix=CONFLICT --check-prefix=WARN | 
 |  | 
 | // RUN: %clang --target=aarch64 -c %s -### -mbranch-protection=pac-ret -msign-return-address=none     2>&1 | \ | 
 | // RUN: FileCheck %s --check-prefix=CONFLICT --check-prefix=WARN | 
 |  | 
 | // RUN: not %clang --target=aarch64 -c %s -### -msign-return-address=foo     2>&1 | \ | 
 | // RUN: FileCheck %s --check-prefix=BAD-RA-PROTECTION --check-prefix=WARN | 
 |  | 
 | // RUN: not %clang --target=aarch64 -c %s -### -mbranch-protection=bar     2>&1 | \ | 
 | // RUN: FileCheck %s --check-prefix=BAD-BP-PROTECTION --check-prefix=WARN | 
 |  | 
 | // RUN: %clang --target=aarch64 -### -o /dev/null -mbranch-protection=standard /dev/null 2>&1 | \ | 
 | // RUN: FileCheck --allow-empty %s --check-prefix=LINKER-DRIVER | 
 |  | 
 | // WARN-NOT: warning: ignoring '-mbranch-protection=' option because the 'aarch64' architecture does not support it [-Wbranch-protection] | 
 |  | 
 | // RA-OFF: "-msign-return-address=none" | 
 | // RA-NON-LEAF: "-msign-return-address=non-leaf" | 
 | // RA-ALL: "-msign-return-address=all" | 
 |  | 
 | // KEY-A: "-msign-return-address-key=a_key" | 
 | // KEY-NOT: "-msign-return-address-key" | 
 |  | 
 | // BTE-OFF-NOT: "-mbranch-target-enforce" | 
 | // BTE-ON: "-mbranch-target-enforce" | 
 |  | 
 | // GCS-OFF-NOT: "-mguarded-control-stack" | 
 | // GCS-ON: "-mguarded-control-stack" | 
 |  | 
 | // CONFLICT: "-msign-return-address=none" | 
 |  | 
 | // BAD-RA-PROTECTION: unsupported argument 'foo' to option '-msign-return-address=' | 
 | // BAD-BP-PROTECTION: unsupported argument 'bar' to option '-mbranch-protection=' | 
 |  | 
 | // BAD-B-KEY-COMBINATION: unsupported argument 'b-key' to option '-mbranch-protection=' | 
 | // BAD-LEAF-COMBINATION: unsupported argument 'leaf' to option '-mbranch-protection=' | 
 |  | 
 | // Check that the linker driver doesn't warn about -mbranch-protection=standard | 
 | // as an unused option. | 
 | // LINKER-DRIVER-NOT: warning: argument unused during compilation: '-mbranch-protection=standard' |