)]}'
{
  "commit": "d43fef7cd52fc6c689ee919b2e97fff920a4c18c",
  "tree": "e98984e9caf006ad675ee120edbee573a645dc95",
  "parents": [
    "b98ce18c5b3f0c28bd64b27b6494f176404da4e4"
  ],
  "author": {
    "name": "David Benjamin",
    "email": "davidben@google.com",
    "time": "Wed Jul 12 20:48:55 2023 -0400"
  },
  "committer": {
    "name": "Boringssl LUCI CQ",
    "email": "boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com",
    "time": "Thu Jul 13 01:26:16 2023 +0000"
  },
  "message": "Fix aarch64 build with GCC\n\nGCC does not have __has_feature, so writing #if __has_feature(foo),\nwithout a guard, will cause GCC to error. This is tripping the gRPC\nupdate.\n\nPrior to https://boringssl-review.googlesource.com/c/boringssl/+/60765,\nthis worked because the preamble to every assembly file would define the\nmissing __has_feature macro as part of detecting MSan. Now we pick up\nthe logic in \u003copenssl/base.h\u003e, which tries not to stomp over symbols we\ndon\u0027t own. This had the side effect of removing the __has_feature\npolyfill.\n\nThough \"public\", \u003copenssl/asm_base.h\u003e is not really a public header, so\nwe could put the __has_feature polyfill in there. But we already have a\npattern for detecting sanitizers in \u003copenssl/target.h\u003e, so just switch\nto that one.\n\nChange-Id: I747b4513f1b2f189d2df629149f22fd0fa490257\nReviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/61565\nCommit-Queue: Adam Langley \u003cagl@google.com\u003e\nAuto-Submit: David Benjamin \u003cdavidben@google.com\u003e\nReviewed-by: Adam Langley \u003cagl@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "c3a3653afa5bb59cd1583d420d49c8bc8cae5290",
      "old_mode": 33261,
      "old_path": "crypto/chacha/asm/chacha-armv8.pl",
      "new_id": "a519b5f2077769d72351f51c1b45ac53d4191633",
      "new_mode": 33261,
      "new_path": "crypto/chacha/asm/chacha-armv8.pl"
    },
    {
      "type": "modify",
      "old_id": "856b819b40312077b7c12951c41198c3dc3cf102",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/sha/asm/sha1-armv8.pl",
      "new_id": "0a7a2fcd983be5f9f7543303a3f51dc61d99dcfc",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/sha/asm/sha1-armv8.pl"
    },
    {
      "type": "modify",
      "old_id": "8cb312facc9a0b89da4e0377c996b791cbf57bce",
      "old_mode": 33188,
      "old_path": "crypto/fipsmodule/sha/asm/sha512-armv8.pl",
      "new_id": "0235be331d6ee35bfab5d1c35154158dfc2eb08a",
      "new_mode": 33188,
      "new_path": "crypto/fipsmodule/sha/asm/sha512-armv8.pl"
    },
    {
      "type": "modify",
      "old_id": "c972e83c68f985eeac813d8ff5f402c51b09ede9",
      "old_mode": 33188,
      "old_path": "include/openssl/target.h",
      "new_id": "4e126525d139f45b934a6ea8a1baf5ea5a7d65e9",
      "new_mode": 33188,
      "new_path": "include/openssl/target.h"
    }
  ]
}
