get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2218167/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2218167,
    "url": "http://patchwork.ozlabs.org/api/patches/2218167/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/gcc/patch/acvYsKyCnFROe-xu@arm.com/",
    "project": {
        "id": 17,
        "url": "http://patchwork.ozlabs.org/api/projects/17/?format=api",
        "name": "GNU Compiler Collection",
        "link_name": "gcc",
        "list_id": "gcc-patches.gcc.gnu.org",
        "list_email": "gcc-patches@gcc.gnu.org",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<acvYsKyCnFROe-xu@arm.com>",
    "list_archive_url": null,
    "date": "2026-03-31T14:22:40",
    "name": "[3/4] aarch64: Implement TARGET_STRONG_AFFECTS_TYPE_IDENTITY_P [PR122483]",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "686530cf49d1277a1f988dc8418370f6c6e71eb8",
    "submitter": {
        "id": 79039,
        "url": "http://patchwork.ozlabs.org/api/people/79039/?format=api",
        "name": "Alex Coplan",
        "email": "Alex.Coplan@arm.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/gcc/patch/acvYsKyCnFROe-xu@arm.com/mbox/",
    "series": [
        {
            "id": 498209,
            "url": "http://patchwork.ozlabs.org/api/series/498209/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/gcc/list/?series=498209",
            "date": "2026-03-31T14:20:57",
            "name": "aarch64, c-family: Stronger type checking for target attrs [PR122483]",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/498209/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2218167/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2218167/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "gcc-patches@gcc.gnu.org"
        ],
        "Delivered-To": [
            "patchwork-incoming@legolas.ozlabs.org",
            "gcc-patches@gcc.gnu.org"
        ],
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=RuMAEL6y;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=RuMAEL6y;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=38.145.34.32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)",
            "sourceware.org;\n\tdkim=pass (1024-bit key,\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=RuMAEL6y;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=RuMAEL6y",
            "sourceware.org;\n dmarc=pass (p=none dis=none) header.from=arm.com",
            "sourceware.org; spf=pass smtp.mailfrom=arm.com",
            "server2.sourceware.org;\n arc=pass smtp.remote-ip=52.101.72.49"
        ],
        "Received": [
            "from vm01.sourceware.org (vm01.sourceware.org [38.145.34.32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4flVkN6CXKz1y1q\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 01 Apr 2026 01:24:44 +1100 (AEDT)",
            "from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id C75D14B920AF\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 31 Mar 2026 14:24:41 +0000 (GMT)",
            "from AM0PR02CU008.outbound.protection.outlook.com\n (mail-westeuropeazon11013049.outbound.protection.outlook.com [52.101.72.49])\n by sourceware.org (Postfix) with ESMTPS id 6D5594B920AF\n for <gcc-patches@gcc.gnu.org>; Tue, 31 Mar 2026 14:23:54 +0000 (GMT)",
            "from AS4P189CA0032.EURP189.PROD.OUTLOOK.COM (2603:10a6:20b:5dd::18)\n by DU4PR08MB10933.eurprd08.prod.outlook.com (2603:10a6:10:575::17)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9745.28; Tue, 31 Mar\n 2026 14:23:47 +0000",
            "from AM3PEPF0000A796.eurprd04.prod.outlook.com\n (2603:10a6:20b:5dd:cafe::a9) by AS4P189CA0032.outlook.office365.com\n (2603:10a6:20b:5dd::18) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9745.28 via Frontend Transport; Tue,\n 31 Mar 2026 14:23:44 +0000",
            "from outbound-uk1.az.dlp.m.darktrace.com (4.158.2.129) by\n AM3PEPF0000A796.mail.protection.outlook.com (10.167.16.101) with Microsoft\n SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9745.21\n via Frontend Transport; Tue, 31 Mar 2026 14:23:47 +0000",
            "from PAWPR08MB8958.eurprd08.prod.outlook.com (2603:10a6:102:33e::15)\n by DBBPR08MB6299.eurprd08.prod.outlook.com (2603:10a6:10:20d::16)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9745.28; Tue, 31 Mar\n 2026 14:22:44 +0000",
            "from PAWPR08MB8958.eurprd08.prod.outlook.com\n ([fe80::c522:a3f1:1566:2377]) by PAWPR08MB8958.eurprd08.prod.outlook.com\n ([fe80::c522:a3f1:1566:2377%4]) with mapi id 15.20.9745.027; Tue, 31 Mar 2026\n 14:22:42 +0000"
        ],
        "DKIM-Filter": [
            "OpenDKIM Filter v2.11.0 sourceware.org C75D14B920AF",
            "OpenDKIM Filter v2.11.0 sourceware.org 6D5594B920AF"
        ],
        "DMARC-Filter": "OpenDMARC Filter v1.4.2 sourceware.org 6D5594B920AF",
        "ARC-Filter": "OpenARC Filter v1.0.0 sourceware.org 6D5594B920AF",
        "ARC-Seal": [
            "i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1774967034; cv=pass;\n b=nCu+jI7j1qPMD9XSt18Jms60nhIuvSEOQqX7HCHVY7wfdVKJ5J5aApa8V1ENA3NcSgUAdnmFdbS82Iaxdabmw4o30GOoo0vXeGQpq9eRtDjEViRVv6cmQmJEOLCC44DAMZ/MAS+NBrtbl3I0cAv7DZIeAmm79g2vXy2loAp8jck=",
            "i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;\n b=zThAFcTUVvOsTCB6WdAR75eQQBJD6gtSUrMgfd/Ie81ilvcxwxJFEBfCLtWvqD2fkEMp0l5/2VvB79QpqnNkyiowAdjXWOmzO6BmBFRAbmQp+xS0FBl9ZE1+XkGOL6HuzRybzbXk6C5tyU1t9Gd5yQwQpQZjuSjTpeNZqP1HcvTHcqrcSV083h7fOP9EnYLH7bd8Yy/SIFEZZF1EeDgtpY+zSAYM6UoZy4kNaTRO95w3tN3ScupshcXqSsgx+f61OvzAyDjRFhKjS+qScNI6hKCfuXzWizgulz46GZgAbY9xOro5ooebt4R0suBvHHhFIFaMPf4HJ2eI0hE1L9q/lw==",
            "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=EpvZMVMPrjHnwj4rVAECaDu2EZ6FRRuYcQrNZcA0hEPy3J/MRDlhRbbQ2zqN81SMgoPZH3VpgonzKb87vgUB1sVtddBwev/cmaiZbPUQdEcKnUaz8Y98tp/5sKfpHgaZeQVVfBRqEebWMW0QxNFdGfnrJH5QtCZWzae7xqHrwto1RvnU0ABIqZqY5oKzlAJU29z6n9E52R7+ppRQ+fPvO2H1Zupau5pbFWaRPBctyxqmYK6PuAXRq9ypTEGB6t3jHgqC0FMjq0DiTLFJfgKl18s9HAHQ5NmZ+9Hm4c5Dy9PbWQMsnI2NfItqwHcf6SFXPdd3t1lfcbfQGqDh516+iA=="
        ],
        "ARC-Message-Signature": [
            "i=3; a=rsa-sha256; d=sourceware.org; s=key;\n t=1774967034; c=relaxed/simple;\n bh=p/fu++xVjUNKlrqgp7Lkm0W0hJT7171fXQI5jp9gBH8=;\n h=DKIM-Signature:DKIM-Signature:Date:From:To:Subject:Message-ID:\n MIME-Version;\n b=fIHO0FrWdrHZUq7bpIhhqCXua4En/IGW1LXsM6xD5frxhPJvHXPf5GKiYYMTUbjyZwinTeygG7eSnNTW7wGv0XS0R1FMxmVYRbFRSK2XuBJq+uGCa9Qb0Z1ygkvD8idgJwVN/44TD+bWzQ7Cn9vX6S75ueoyNsYZUJP/iSxpjfs=",
            "i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=4UiYMgUoJopmIY3hcRIcYji//MKNjl02kPl/3GlK9zU=;\n b=MXPwCiuI0R8eyl8Ul08iROhMF3au8wBTZtMk3FxVV2okGccSMN5Zja6+Co3DDG83mrQskWrsKaEewWKZm6UQpjKQhF2h6/qXfRu/OANVAy8W9Jk1HbLPa66+0GvziPGeMiGZaH0gkNF55ny9duzSGsp35dOqgLR0looi6zYoAy7UnymiWvAHx/9ODww8CFa/xSD/zYBVacUiFHiPq/TUrCuHlv9rT3sdAbVITBtwYLX5tipkFVSgFBaWCzv/ZA5HTR4vI9gc+mz+Fid1e0vmHrXV4pflohFxAWw1fFb0KytNxkm3zxRu/NGsWMCbr1/CIRWOUa56mOaCEKYCXuM22Q==",
            "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=4UiYMgUoJopmIY3hcRIcYji//MKNjl02kPl/3GlK9zU=;\n b=w7Fc5PX01+pY4Jluc3Tqjm39jKXolglE2HVllgsvNgpcgg/eee9YrH7aV+3Uq23iD0+jfN3DDn2dbVih9HKcUx4MSsBKNmLTnhGDmAEKEyeYz70gmhq/Lg9peSXQcWEujE0pWbCpjrVV991h/qLf5Qbx02AsTbsuM2lCXxTi7epJtxmza4z+EBp++jipok1CHbz+PbqblyBsjiVNLqPQAWUmTGlDo7RXoCLNWNhznF5UoCP88FG10HO6Vle9dKVnWr3m+QwFP5PSIt1MUNGt7njeq3jZAlsjciw9CNZ7vXcAc+ldDnqUZ6BQ9lOevKucs5xwpWp5xGYcUHIX6DtO9A=="
        ],
        "ARC-Authentication-Results": [
            "i=3; server2.sourceware.org",
            "i=2; mx.microsoft.com 1; spf=pass (sender ip is\n 4.158.2.129) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass\n (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass\n (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1\n spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com]\n dmarc=[1,1,header.from=arm.com])",
            "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass\n header.d=arm.com; arc=none"
        ],
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=4UiYMgUoJopmIY3hcRIcYji//MKNjl02kPl/3GlK9zU=;\n b=RuMAEL6yc/StlaUnjXKC+08NJT7hfqWC+DLD9ywVmvM3cPRxfS7yDuVxJOqMX7mYcjCTPPZsAEyaNs3f+HGoZORTZVCe/snvvTsxtRSlSTIexCzvhFRShGW7neA4KA3YPWO9Ivg0rKn+tY1hWUtkltNSSx+IKI+wFWBzpWwLNeA=",
            "v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=4UiYMgUoJopmIY3hcRIcYji//MKNjl02kPl/3GlK9zU=;\n b=RuMAEL6yc/StlaUnjXKC+08NJT7hfqWC+DLD9ywVmvM3cPRxfS7yDuVxJOqMX7mYcjCTPPZsAEyaNs3f+HGoZORTZVCe/snvvTsxtRSlSTIexCzvhFRShGW7neA4KA3YPWO9Ivg0rKn+tY1hWUtkltNSSx+IKI+wFWBzpWwLNeA="
        ],
        "X-MS-Exchange-Authentication-Results": "spf=pass (sender IP is 4.158.2.129)\n smtp.mailfrom=arm.com; dkim=pass (signature was verified)\n header.d=arm.com;dmarc=pass action=none header.from=arm.com;",
        "Received-SPF": "Pass (protection.outlook.com: domain of arm.com designates\n 4.158.2.129 as permitted sender) receiver=protection.outlook.com;\n client-ip=4.158.2.129; helo=outbound-uk1.az.dlp.m.darktrace.com; pr=C",
        "Authentication-Results-Original": "dkim=none (message not signed)\n header.d=none;dmarc=none action=none header.from=arm.com;",
        "Date": "Tue, 31 Mar 2026 15:22:40 +0100",
        "From": "Alex Coplan <alex.coplan@arm.com>",
        "To": "gcc-patches@gcc.gnu.org",
        "Cc": "Alice Carlotti <alice.carlotti@arm.com>,\n Richard Sandiford <rdsandiford@googlemail.com>,\n Richard Earnshaw <richard.earnshaw@arm.com>,\n Tamar Christina <tamar.christina@arm.com>,\n Kyrylo Tkachov <ktkachov@nvidia.com>,\n Andrew Pinski <andrew.pinski@oss.qualcomm.com>,\n Wilco Dijkstra <wilco.dijkstra@arm.com>",
        "Subject": "[PATCH 3/4] aarch64: Implement TARGET_STRONG_AFFECTS_TYPE_IDENTITY_P\n [PR122483]",
        "Message-ID": "<acvYsKyCnFROe-xu@arm.com>",
        "Content-Type": "multipart/mixed; boundary=\"kDmhqpuOAOvJLSWW\"",
        "Content-Disposition": "inline",
        "Content-Transfer-Encoding": "8bit",
        "X-ClientProxiedBy": "PA7P264CA0444.FRAP264.PROD.OUTLOOK.COM\n (2603:10a6:102:37d::20) To PAWPR08MB8958.eurprd08.prod.outlook.com\n (2603:10a6:102:33e::15)",
        "MIME-Version": "1.0",
        "X-MS-TrafficTypeDiagnostic": "\n PAWPR08MB8958:EE_|DBBPR08MB6299:EE_|AM3PEPF0000A796:EE_|DU4PR08MB10933:EE_",
        "X-MS-Office365-Filtering-Correlation-Id": "8ac5ad4d-4206-4a98-ffc0-08de8f311f6e",
        "x-checkrecipientrouted": "true",
        "NoDisclaimer": "true",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam-Untrusted": "BCL:0;\n ARA:13230040|1800799024|6049299003|376014|366016|56012099003|18002099003|4053099003;",
        "X-Microsoft-Antispam-Message-Info-Original": "\n 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",
        "X-Forefront-Antispam-Report-Untrusted": "CIP:255.255.255.255; CTRY:; LANG:en;\n SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PAWPR08MB8958.eurprd08.prod.outlook.com;\n PTR:; CAT:NONE;\n SFS:(13230040)(1800799024)(6049299003)(376014)(366016)(56012099003)(18002099003)(4053099003);\n DIR:OUT; SFP:1101;",
        "X-Exchange-RoutingPolicyChecked": "\n SM8rjg0JbHFS4IDlu4bXyorKyl6VkzEAl5cBTxrmxBfBmlH+5Ned6eT6IXGQdeNj8QgUgnoUiM9D8/obYJsFfQxcyNT0JpBXMwhJ9T5FJuVlvDmlkKAz+EtWkI48cdIrf7GrNbsQxKf4+uI8S1LILqVJFgw4QOrgUPxISwE+hgkcjTi9tIIQ+xoAKa6c2twsiKGAovIgJ1jd0EtdLNukfqWR5jUIRwRF+TTReL8+GESsmmmChgrwiZ5ZImaQuocE47DEIUEh68PJQQ4Ek+wXy80mPtYYDFc8edyRrxEUfQS7Ku9Cn6lIY3hS/KT7VIetMJfZPLyIONA/tq7JSL4EJw==",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": [
            "DBBPR08MB6299",
            "DU4PR08MB10933"
        ],
        "X-EOPAttributedMessage": "0",
        "X-MS-Exchange-Transport-CrossTenantHeadersStripped": "\n AM3PEPF0000A796.eurprd04.prod.outlook.com",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id-Prvs": "\n 08ec97d0-72df-45ee-4b3c-08de8f30f8a2",
        "X-Microsoft-Antispam": "BCL:0;\n ARA:13230040|82310400026|6049299003|1800799024|36860700016|376014|14060799003|35042699022|13003099007|4053099003|56012099003|18002099003;",
        "X-Microsoft-Antispam-Message-Info": "\n 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",
        "X-Forefront-Antispam-Report": "CIP:4.158.2.129; CTRY:GB; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:outbound-uk1.az.dlp.m.darktrace.com;\n PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(82310400026)(6049299003)(1800799024)(36860700016)(376014)(14060799003)(35042699022)(13003099007)(4053099003)(56012099003)(18002099003);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n DFYGLVSe+e1S9qE3IEssx8GYONi/h1uLhoP4wugGBOE7xm85bKY7RDgk8gXMs353MMETcei1UKQukvMhE57QVquOFpIjzCT42RvT1+piAKpF8e+VTTd8XQrZ0rpkph97Mg7KRhiT4e8fNcDoNr6Altbb4jgFvO8zG02m7wZgjiC/+ZItp1uOCXbCQ0kLWQVcBVNS9QLF7/LkCLUoQasSRwCoxZZRU7mXEJI546n8E39Z3zjEX2rzVK48g/lZ0ftt9xYe0uQV8jw2vvBZr+Y6DNbpX6vIzMV6V9mFzLdIDnmtOwM4+dTV7ICKioVnnWpngrKfLrS1r+1yoJnroymkZ5a4XShDnww7qXuUgfdw6DJG6GxWlzFRizP4Q0BmtZ0V/F0/XleCf+qu8ndC4AooFa5QzUdwUWGSSitNemnqZRDLTLMkC2CprWnlTDP3LDrn",
        "X-OriginatorOrg": "arm.com",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "31 Mar 2026 14:23:47.5710 (UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 8ac5ad4d-4206-4a98-ffc0-08de8f311f6e",
        "X-MS-Exchange-CrossTenant-Id": "f34e5979-57d9-4aaa-ad4d-b122a662184d",
        "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "\n TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[4.158.2.129];\n Helo=[outbound-uk1.az.dlp.m.darktrace.com]",
        "X-MS-Exchange-CrossTenant-AuthSource": "\n AM3PEPF0000A796.eurprd04.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Anonymous",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem",
        "X-BeenThere": "gcc-patches@gcc.gnu.org",
        "X-Mailman-Version": "2.1.30",
        "Precedence": "list",
        "List-Id": "Gcc-patches mailing list <gcc-patches.gcc.gnu.org>",
        "List-Unsubscribe": "<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>",
        "List-Archive": "<https://gcc.gnu.org/pipermail/gcc-patches/>",
        "List-Post": "<mailto:gcc-patches@gcc.gnu.org>",
        "List-Help": "<mailto:gcc-patches-request@gcc.gnu.org?subject=help>",
        "List-Subscribe": "<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>",
        "Errors-To": "gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"
    },
    "content": "This implements the hook added by the previous patch on aarch64, thereby\nfixing this P1 regression.\n\nAt first I thought we might only want this behaviour for e.g. the\n[[arm::streaming]] attribute, but thinking about it more it seems the\nmost consistent/defensible approach is to reject code such as:\n\n  void f(void) A;\n  void f(void);\n\nfor any attribute A that affects the PCS/ABI of f, which on aarch64 is\nthose that have affects_type_identity set.\n\nBootstrapped/regtested as a series on aarch64-linux-gnu (with and\nwithout the final C++ patch), OK for trunk?\n\nThanks,\nAlex\n\ngcc/ChangeLog:\n\n\tPR target/122483\n\t* config/aarch64/aarch64.cc (aarch64_strong_affects_type_identity_p): New.\n\t(TARGET_STRONG_AFFECTS_TYPE_IDENTITY_P): New.\n\ngcc/testsuite/ChangeLog:\n\n\tPR target/122483\n\t* gcc.target/aarch64/pr122483.c: New test.\n---\n gcc/config/aarch64/aarch64.cc               | 21 +++++++++++++++++++++\n gcc/testsuite/gcc.target/aarch64/pr122483.c |  8 ++++++++\n 2 files changed, 29 insertions(+)\n create mode 100644 gcc/testsuite/gcc.target/aarch64/pr122483.c",
    "diff": "diff --git a/gcc/config/aarch64/aarch64.cc b/gcc/config/aarch64/aarch64.cc\nindex 197d4f27269..34b0be4f443 100644\n--- a/gcc/config/aarch64/aarch64.cc\n+++ b/gcc/config/aarch64/aarch64.cc\n@@ -31086,6 +31086,23 @@ aarch64_merge_decl_attributes (tree olddecl, tree newdecl)\n   return merge_attributes (old_attrs, new_attrs);\n }\n \n+/* Implement TARGET_STRONG_AFFECTS_TYPE_IDENTITY_P.  This prevents the\n+   front-end from merging two declarations such as:\n+\n+   void f(void) A;\n+   void f(void);\n+\n+   for any attribute A which has affects_type_identity set.  On AArch64,\n+   affects_type_identity on function type attributes is set when the presence\n+   of the attribute affects the ABI of the function, as with e.g.\n+   [[arm::streaming]] or __attribute__((aarch64_vector_pcs)).  */\n+\n+static bool\n+aarch64_strong_affects_type_identity_p ()\n+{\n+  return true;\n+}\n+\n /* Implement TARGET_GET_MULTILIB_ABI_NAME */\n \n static const char *\n@@ -33959,6 +33976,10 @@ aarch64_libgcc_floating_mode_supported_p\n #undef TARGET_MERGE_DECL_ATTRIBUTES\n #define TARGET_MERGE_DECL_ATTRIBUTES aarch64_merge_decl_attributes\n \n+#undef TARGET_STRONG_AFFECTS_TYPE_IDENTITY_P\n+#define TARGET_STRONG_AFFECTS_TYPE_IDENTITY_P \\\n+  aarch64_strong_affects_type_identity_p\n+\n #undef TARGET_GET_MULTILIB_ABI_NAME\n #define TARGET_GET_MULTILIB_ABI_NAME aarch64_get_multilib_abi_name\n \ndiff --git a/gcc/testsuite/gcc.target/aarch64/pr122483.c b/gcc/testsuite/gcc.target/aarch64/pr122483.c\nnew file mode 100644\nindex 00000000000..d039aa28750\n--- /dev/null\n+++ b/gcc/testsuite/gcc.target/aarch64/pr122483.c\n@@ -0,0 +1,8 @@\n+/* { dg-do compile } */\n+/* This test defends the behaviour for the non-SME cases of PR122483.  */\n+\n+void f1(void) __attribute__((aarch64_vector_pcs));\n+void f1(void); /* { dg-error \"conflicting types\" } */\n+\n+void f2(void) __attribute__((preserve_none));\n+void f2(void); /* { dg-error \"conflicting types\" } */\n",
    "prefixes": [
        "3/4"
    ]
}