get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2196961/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2196961,
    "url": "http://patchwork.ozlabs.org/api/patches/2196961/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/gcc/patch/patch-20331-tamar@arm.com/",
    "project": {
        "id": 17,
        "url": "http://patchwork.ozlabs.org/api/projects/17/?format=api",
        "name": "GNU Compiler Collection",
        "link_name": "gcc",
        "list_id": "gcc-patches.gcc.gnu.org",
        "list_email": "gcc-patches@gcc.gnu.org",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<patch-20331-tamar@arm.com>",
    "list_archive_url": null,
    "date": "2026-02-16T18:00:19",
    "name": "[RFC,vect] : Support running vect.exp in multiple different configuration",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "0e73911dac86b630272354d7d193a42f838cc1ac",
    "submitter": {
        "id": 69689,
        "url": "http://patchwork.ozlabs.org/api/people/69689/?format=api",
        "name": "Tamar Christina",
        "email": "Tamar.Christina@arm.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/gcc/patch/patch-20331-tamar@arm.com/mbox/",
    "series": [
        {
            "id": 492340,
            "url": "http://patchwork.ozlabs.org/api/series/492340/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/gcc/list/?series=492340",
            "date": "2026-02-16T18:00:19",
            "name": "[RFC,vect] : Support running vect.exp in multiple different configuration",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/492340/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2196961/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2196961/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "gcc-patches@gcc.gnu.org"
        ],
        "Delivered-To": [
            "patchwork-incoming@legolas.ozlabs.org",
            "gcc-patches@gcc.gnu.org"
        ],
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=rqNxR/Is;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=rqNxR/Is;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org\n (client-ip=2620:52:6:3111::32; helo=vm01.sourceware.org;\n envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org;\n receiver=patchwork.ozlabs.org)",
            "sourceware.org;\n\tdkim=pass (1024-bit key,\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=selector1 header.b=rqNxR/Is;\n\tdkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com\n header.a=rsa-sha256 header.s=selector1 header.b=rqNxR/Is",
            "sourceware.org;\n dmarc=pass (p=none dis=none) header.from=arm.com",
            "sourceware.org; spf=pass smtp.mailfrom=arm.com",
            "server2.sourceware.org;\n arc=pass smtp.remote-ip=52.101.69.18"
        ],
        "Received": [
            "from vm01.sourceware.org (vm01.sourceware.org\n [IPv6:2620:52:6:3111::32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fF9bD0lPXz1xtN\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 17 Feb 2026 05:02:16 +1100 (AEDT)",
            "from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id ECDA04BAD170\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 16 Feb 2026 18:02:13 +0000 (GMT)",
            "from AM0PR83CU005.outbound.protection.outlook.com\n (mail-westeuropeazon11010018.outbound.protection.outlook.com [52.101.69.18])\n by sourceware.org (Postfix) with ESMTPS id 74DAE4BAD155\n for <gcc-patches@gcc.gnu.org>; Mon, 16 Feb 2026 18:01:35 +0000 (GMT)",
            "from DU7P190CA0004.EURP190.PROD.OUTLOOK.COM (2603:10a6:10:550::33)\n by GVXPR08MB11227.eurprd08.prod.outlook.com (2603:10a6:150:289::6) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9611.16; Mon, 16 Feb\n 2026 18:01:26 +0000",
            "from DB1PEPF000509FB.eurprd03.prod.outlook.com\n (2603:10a6:10:550:cafe::b0) by DU7P190CA0004.outlook.office365.com\n (2603:10a6:10:550::33) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9611.16 via Frontend Transport; Mon,\n 16 Feb 2026 18:01:24 +0000",
            "from outbound-uk1.az.dlp.m.darktrace.com (4.158.2.129) by\n DB1PEPF000509FB.mail.protection.outlook.com (10.167.242.37) with Microsoft\n SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9632.12\n via Frontend Transport; Mon, 16 Feb 2026 18:01:25 +0000",
            "from VI0PR08MB10392.eurprd08.prod.outlook.com\n (2603:10a6:800:210::10) by VI0PR08MB11513.eurprd08.prod.outlook.com\n (2603:10a6:800:2fa::22) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9611.16; Mon, 16 Feb\n 2026 18:00:23 +0000",
            "from VI0PR08MB10392.eurprd08.prod.outlook.com\n ([fe80::cd7c:e19a:2072:75cc]) by VI0PR08MB10392.eurprd08.prod.outlook.com\n ([fe80::cd7c:e19a:2072:75cc%4]) with mapi id 15.20.9611.013; Mon, 16 Feb 2026\n 18:00:22 +0000"
        ],
        "DKIM-Filter": [
            "OpenDKIM Filter v2.11.0 sourceware.org ECDA04BAD170",
            "OpenDKIM Filter v2.11.0 sourceware.org 74DAE4BAD155"
        ],
        "DMARC-Filter": "OpenDMARC Filter v1.4.2 sourceware.org 74DAE4BAD155",
        "ARC-Filter": "OpenARC Filter v1.0.0 sourceware.org 74DAE4BAD155",
        "ARC-Seal": [
            "i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1771264895; cv=pass;\n b=vg3dyuQ/x205FibvtN/HT+O9mldhI9+adXq5606E/1X0KHmseJ39viAHO8xs/6N37rLPYE9mIhmB1sb2h58kb5AsJ6+aHu9/UBvpdIMJsDfeMApeF5nYHpAD+NS9t7vPDLScFXENEO2rbRVZGGwnhCt91EUl5Hr7CDdRuiqQl/4=",
            "i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;\n b=EtqcgO/ypBcXY0uaY4zO8ybfhFO0ZuYZSe3CTHVW5P6U1L3cShTbHcMn4rGriNksRU9r8BidSqvL4Qf38CNgA2r5a4XBtSoAULMXJta1pL0gdE1AH6uetRwqyYUetFw25u9zGRSTX6+cavjcydouK9DFHyqNL0QoZRGQm/pRUhR9pku0YNI6PnElIHuNU9GFRLBgZ4Ip+SFC2Hwc37hFNkT9NBUwvMbFyC1n2FDi2K7Ct7+z/d0+Ta8Z5ScU8pNoywGNUAQ6ulTZgdGjXibnzu9BTezgCh5kt3cDShgZEOx+t08FBEUjbcecuTNkgJyia+7LnDFx3e35D89PeGCVQw==",
            "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=bezfIqZYod25sVSiUJ5q2w5H2h4+ujLG8bEauj0z9q2up712+tF9WRzG5++qC308uuFip0zRt1D7tjC6tvbD4a2Ro9wHUEervqKvoo4uzXQzPyxTRPrDCrF6/NPw8Wtv+dPfY33GET46qdl5lXzCOt4HSEQwPn4HQs/3X8vH9wyf9prmLCtDdPVYh3IPr6FQwYajYIl9Jrq8Zcox+FAI7t+1MT/LU7PkMr28JKSSnUoAYK1nZd7UHyttQP3A/AZhJp+D8IKkt8tgRBjEkdkNYKiOqFOuoKVY1eQ5DgCt8p00H/atUgkmC/ikL5GychZ7weRyLiIRvuQIWDy5ysT6BQ=="
        ],
        "ARC-Message-Signature": [
            "i=3; a=rsa-sha256; d=sourceware.org; s=key;\n t=1771264895; c=relaxed/simple;\n bh=Ea7HAA7YSPAjU1X1hrHuvolE7HoCdszFETRp/GrwII0=;\n h=DKIM-Signature:DKIM-Signature:Date:From:To:Subject:Message-ID:\n MIME-Version;\n b=i7SYdlYid29ua7JqAdpjqm2416PTnt615Jw15YXTIQ+arKMlVCjq3c5wxm5YxRW9rhk41ICFxHd1RChqbxrPgEDVAezZoffSo/wjtdw37YeBDgk3Nkhu3EvlvLsbB6tqWVmmoH5tZ8md/quAOqmJtxSxH8ByfJoCK0mybLHQDgs=",
            "i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=DvWPA4lfEDZqTE54V1YUHRMjopF8vXX6hq8Nbel09Nw=;\n b=f/0gYau+0tRr1unkq2EgetBzeja3oVmJ78P4Ee/JFL+78LiNva6s9ghrwRek5udVlrDbLwAhzqD42goL2XMwewzSSynFkl0VZ8bTdT7FnBcUC/t8s3AwSSar3+CLLTngww4TUtKyys3bOL78u98NrzvG8ceBh1gbP+Hw/dSgJuC6RFiT5m2IVgRwoiHwisPsXlAgozIH7eVzCmYuyFBHpBUp7Aqfpjg3bI385xoNOIJWHXwQlJCU4IQnhYv1fONoYyf0dW3lK0FIB9z3Wltco25jtUEXH36bmMTa1RJ/OpLtN5jx4OdLc+pVCBgKHzv8J3IgADFY3nuNf0foCWeaCw==",
            "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=DvWPA4lfEDZqTE54V1YUHRMjopF8vXX6hq8Nbel09Nw=;\n b=bxe6+wQbvCK9XL3KvLYPI72Q5K9HzA2K/XXyPWr8j/7o3OasGrzXJPym8+M+RShL3DSqY1UQP8IAqWXEakX+wKfcavU+xCmTUjvn2RxzJBbYws249hmHu6CK9xKnABjCtGYXFffedyY6g5FhMnpaRe8ax0TknEUf1h4wR0LmS/zY1o+YT1xS6U18C2j0kdnoVhPEkHEH4W/189U3pCL0fmdiNNOuP37zxUEUKN0eliYysWKc37E7JLW/IHQBIfTrFiiTbcECkzSLUY5/vtuBxxeifOvdmq0o6CYw9R03ZqPicsref85knWWBI8JYF1I50MmRKi+JyTNlA5r/6rwmsg=="
        ],
        "ARC-Authentication-Results": [
            "i=3; server2.sourceware.org",
            "i=2; mx.microsoft.com 1; spf=pass (sender ip is\n 4.158.2.129) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass\n (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass\n (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1\n spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com]\n dmarc=[1,1,header.from=arm.com])",
            "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass\n header.d=arm.com; arc=none"
        ],
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=DvWPA4lfEDZqTE54V1YUHRMjopF8vXX6hq8Nbel09Nw=;\n b=rqNxR/Isrt2ZYG8FiC3Wvgjk0fkW2Olm+avmxO9zEpAPaP3MVux8jvT13BIJZ2wPQ/Hlb7gfhUXMgzY2MA4CWqObl0BzyYqUZrYVVD5hGLEk3PZT3+0rBbg3+kgzI4r1wqx+LyfPR2V9JAQcHUIGGwf1dpy7QKin8ZIYjAViqfU=",
            "v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=DvWPA4lfEDZqTE54V1YUHRMjopF8vXX6hq8Nbel09Nw=;\n b=rqNxR/Isrt2ZYG8FiC3Wvgjk0fkW2Olm+avmxO9zEpAPaP3MVux8jvT13BIJZ2wPQ/Hlb7gfhUXMgzY2MA4CWqObl0BzyYqUZrYVVD5hGLEk3PZT3+0rBbg3+kgzI4r1wqx+LyfPR2V9JAQcHUIGGwf1dpy7QKin8ZIYjAViqfU="
        ],
        "X-MS-Exchange-Authentication-Results": "spf=pass (sender IP is 4.158.2.129)\n smtp.mailfrom=arm.com; dkim=pass (signature was verified)\n header.d=arm.com;dmarc=pass action=none header.from=arm.com;",
        "Received-SPF": "Pass (protection.outlook.com: domain of arm.com designates\n 4.158.2.129 as permitted sender) receiver=protection.outlook.com;\n client-ip=4.158.2.129; helo=outbound-uk1.az.dlp.m.darktrace.com; pr=C",
        "Authentication-Results-Original": "dkim=none (message not signed)\n header.d=none;dmarc=none action=none header.from=arm.com;",
        "Date": "Mon, 16 Feb 2026 18:00:19 +0000",
        "From": "Tamar Christina <tamar.christina@arm.com>",
        "To": "gcc-patches@gcc.gnu.org",
        "Cc": "nd@arm.com, rguenther@suse.de, rdapp.gcc@gmail.com",
        "Subject": "[PATCH][RFC][vect]: Support running vect.exp in multiple different\n configuration",
        "Message-ID": "<patch-20331-tamar@arm.com>",
        "Content-Type": "multipart/mixed; boundary=\"xf/6yV1rtzHLbVFg\"",
        "Content-Disposition": "inline",
        "X-ClientProxiedBy": "LO4P123CA0222.GBRP123.PROD.OUTLOOK.COM\n (2603:10a6:600:1a6::11) To VI0PR08MB10392.eurprd08.prod.outlook.com\n (2603:10a6:800:210::10)",
        "MIME-Version": "1.0",
        "X-MS-TrafficTypeDiagnostic": "\n VI0PR08MB10392:EE_|VI0PR08MB11513:EE_|DB1PEPF000509FB:EE_|GVXPR08MB11227:EE_",
        "X-MS-Office365-Filtering-Correlation-Id": "25944568-138c-458f-cf23-08de6d8566f5",
        "x-checkrecipientrouted": "true",
        "NoDisclaimer": "true",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam-Untrusted": "BCL:0;\n ARA:13230040|1800799024|6049299003|366016|376014|4053099003;",
        "X-Microsoft-Antispam-Message-Info-Original": "\n 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",
        "X-Forefront-Antispam-Report-Untrusted": "CIP:255.255.255.255; CTRY:; LANG:en;\n SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI0PR08MB10392.eurprd08.prod.outlook.com;\n PTR:; CAT:NONE;\n SFS:(13230040)(1800799024)(6049299003)(366016)(376014)(4053099003); DIR:OUT;\n SFP:1101;",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": [
            "VI0PR08MB11513",
            "GVXPR08MB11227"
        ],
        "X-EOPAttributedMessage": "0",
        "X-MS-Exchange-Transport-CrossTenantHeadersStripped": "\n DB1PEPF000509FB.eurprd03.prod.outlook.com",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id-Prvs": "\n 5023d101-4ef1-46fc-304b-08de6d8540ef",
        "X-Microsoft-Antispam": "BCL:0;\n ARA:13230040|1800799024|82310400026|35042699022|36860700013|6049299003|376014|14060799003|4053099003;",
        "X-Microsoft-Antispam-Message-Info": "=?utf-8?q?hUvt7CT7eKDKETxWvhue6xG4Lvb8+UE?=\n\t=?utf-8?q?qWixzrhppHcCo06TsIKwRr4KsVtJtUW0D7cYHCF8Bfn7rvqXjQpkfQ3vd4YGgnwIX?=\n\t=?utf-8?q?6nZZRIF4nHo14OUAAcURyuWkbkaV8cHUdNwLJZ2ySY9/gS2h7OZj65OvJYySmklA0?=\n\t=?utf-8?q?aAi6iFMqXq54IM6mhS9biVN6LAf1IiHjDkvl3AT6mDrC7TmzDYzZ1Slc9Br2dhuDD?=\n\t=?utf-8?q?9jLSCzV5duzzA9Sy5+ROEZURMIeJg7yT/ZGq9sChBl60UT62JfcpIUjCF/tWwfniM?=\n\t=?utf-8?q?uuoi/lF725GR2+cRCdaCC0foo2+Hl1vmnXqcdE/mONsOCrcCFe5AG0SvQGIqXeBmM?=\n\t=?utf-8?q?UeCSigyHvHF8eJacdf/IKWn1ri+fZwQbMP1X4FiB0Ymk15O0nTQTCJ3HkcugbBtbl?=\n\t=?utf-8?q?jUHDTCdmLOevT7QthJpB0DQOf+efv/D14dtmCFITJiY4TjAhJaxakhkAgfDtbI7Nw?=\n\t=?utf-8?q?YGrZAi7uT9znuwVrF9RXLKQya/31wF4yyrAEQAqu3yFLIXvRVuqlICl6sD9Wr7wBP?=\n\t=?utf-8?q?LBEzDGdnWFHxtFm+VAp3ZolAUoYp/cECFjJSHw1j3IUCCF7qlJOfAeM1gvgh7jMwo?=\n\t=?utf-8?q?rx95dGzCImhuDWYR3qnjmzXaOqRNSdotmd5p+gxW2E7gzFO2cUp4JUxpt80P8vWjh?=\n\t=?utf-8?q?APgy/gtOhw4UJWdH51HIUXCryosHht6lqxk+NNYSAA2psx5miuvZJEzrDMmVFzIyD?=\n\t=?utf-8?q?wI/GpnB5msv/tc3uMdr/p51JTtbX0Z3XRq6xTTjV97HWkS6G67i/yJySQELtO0l9y?=\n\t=?utf-8?q?fCeH4cvkaIMPPx2ljPZ+hPU5U+zDDmnCUiIq9SBPoiX8T5vY+7K3ujhlXBcfdV9PZ?=\n\t=?utf-8?q?WxDkXz4NUvGZK/j1BksVyK+34E6DZvEVGgGgnsxNWdugis37eNL/WyK3SOuw62iRI?=\n\t=?utf-8?q?54PUrxu2swW2CsJyNXLc25q6DfydniiCzaobyC4t2BzXhXWk3kXIdp4Fh7FT/JMG4?=\n\t=?utf-8?q?SGLzJxsuv4GkVu1p1Kgm0OVddTQLy55qFXhQ6bb8RpWFyuz8YvKwpTU8zEQ3NOSO5?=\n\t=?utf-8?q?HX3f/+OF0NaZ0fXaK3Z3lT84RYuhN6BHdaBmOiETECLTcqyZnKFahyUFHqCrTKRme?=\n\t=?utf-8?q?RVZV5Twv5GVbvUQ5bSn+cMRR3mZ2vp7eofsJ7LYlgat236lFguNvweC5UAXyXBvr/?=\n\t=?utf-8?q?pDsmFiD03ywU7Uyfpcv8jB7kTaskxzxKd8n1jKJO9F6vG5g2duI54kaeeSttEyHJf?=\n\t=?utf-8?q?EKj7oF7MZns9hpCJVkAqjn8MbMxJN+L8l1yY1UIcsHsp8JKpVL+aw1ajzTAq3KUXB?=\n\t=?utf-8?q?qMe7fmq8rxeU15aQSfLHIpTBS9UNwHsSEQKbst20KIQHUGZkRzVyeTmUS0p+VBZQb?=\n\t=?utf-8?q?j2bk11uwylEtyiv28LLB6pzU78Aqncgp1R02UtV0Fu+gbMHPW932Rh2RcXJkdPb8w?=\n\t=?utf-8?q?I80cfUG4zQSAhaQ8Qv/pjFFFDII9jtda7FMzQnuq3TqGKgGm5jT5j3ZGzCg0gklul?=\n\t=?utf-8?q?d/DENL2JN8Wd4eivZ0PzASCFUPeJ/FYxwhptPWUKo02g05ZX7U0IUN0Oq1EoBEO0V?=\n\t=?utf-8?q?5qxCrfXZOco+CkQ1qPC4zGYucT+NJYQ0f+fayBUnJ48/pryJ1uUJXTNqMtD+FMk0K?=\n\t=?utf-8?q?0AlZgWFUOzXuu98HGZU/f2n6PpOErA=3D=3D?=",
        "X-Forefront-Antispam-Report": "CIP:4.158.2.129; CTRY:GB; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:outbound-uk1.az.dlp.m.darktrace.com;\n PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(1800799024)(82310400026)(35042699022)(36860700013)(6049299003)(376014)(14060799003)(4053099003);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n HPeB5X7i5v78nxSRfw4gH7H9xAdd1E/R0gPcskkGfYY4hZ9L5u+4HslUteqsrUQkGo4isbvssm61bBr5KG0cQbdKknUuK36YNTmuY1Igv02kLAtDiLi6WRBcVzvMbgJb51dzRFRrvKjTu6ipkqcugwllL6HUFXPp+42+C25+p4vsvqUVL5FooiEATgebGjUHhr4i8JCHdGpfj3/BKTt27/J1HfKrDiv3JXMaJGgaE8smmxfdIrAMxRKPmafvtKl0Yysqpkjw55ix/lSNvI9fMpSifVdwDM38OvRbkzczhQLc7kIa/zwm1hTBr/Nsoh+izRMt/1bMAsG2J94WYhRLsyCvAPxW75oOCybF0AbRUcL5rnb0x+bC61DzQmZMBh8zr7z8auPqEb3tUG2JJMQo/Xlcvfaa05XynGgH3gu4/93dJnut/x0y37Ug0dezxoUY",
        "X-OriginatorOrg": "arm.com",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "16 Feb 2026 18:01:25.7569 (UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 25944568-138c-458f-cf23-08de6d8566f5",
        "X-MS-Exchange-CrossTenant-Id": "f34e5979-57d9-4aaa-ad4d-b122a662184d",
        "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "\n TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[4.158.2.129];\n Helo=[outbound-uk1.az.dlp.m.darktrace.com]",
        "X-MS-Exchange-CrossTenant-AuthSource": "\n DB1PEPF000509FB.eurprd03.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Anonymous",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem",
        "X-BeenThere": "gcc-patches@gcc.gnu.org",
        "X-Mailman-Version": "2.1.30",
        "Precedence": "list",
        "List-Id": "Gcc-patches mailing list <gcc-patches.gcc.gnu.org>",
        "List-Unsubscribe": "<https://gcc.gnu.org/mailman/options/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=unsubscribe>",
        "List-Archive": "<https://gcc.gnu.org/pipermail/gcc-patches/>",
        "List-Post": "<mailto:gcc-patches@gcc.gnu.org>",
        "List-Help": "<mailto:gcc-patches-request@gcc.gnu.org?subject=help>",
        "List-Subscribe": "<https://gcc.gnu.org/mailman/listinfo/gcc-patches>,\n <mailto:gcc-patches-request@gcc.gnu.org?subject=subscribe>",
        "Errors-To": "gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org"
    },
    "content": "This is a proof of concept addressing some of the issues Richi pointed out before.\n\nIn particular the extra vect options are now taken part of the cache key as well\nso we re-evaluate all the different effective targets tests for them while running\nunder vect.exp.\n\nThe attached patch produces\n\nProcessing option:  dg-add-options 1 vect_early_break\ncheck_cached_effective_target_index vect_early_break: returning 0 -ftree-vectorize -fno-tree-loop-distribute-patterns -fno-vect-cost-model -fno-common -O2 -fdump-tree-vect-details vect_early_break\nProcessing option:  dg-add-options 1 vect_early_break\ncheck_cached_effective_target_index vect_early_break: returning 0 -march=armv8-a+sve -ftree-vectorize -fno-tree-loop-distribute-patterns -fno-vect-cost-model -fno-common -O2 -fdump-tree-vect-details vect_early_break\n\ndoes this do what you wanted Richi?\n\n---\n\n\n--",
    "diff": "diff --git a/gcc/testsuite/gcc.dg/vect/vect.exp b/gcc/testsuite/gcc.dg/vect/vect.exp\nindex edc0ce5bef9e9bcef469ccccdc56a20f2d9b9b67..46ea050c05c95cea50d0f030b67cc45847fabb54 100644\n--- a/gcc/testsuite/gcc.dg/vect/vect.exp\n+++ b/gcc/testsuite/gcc.dg/vect/vect.exp\n@@ -87,7 +87,36 @@ set VECT_ADDITIONAL_FLAGS [list \"\"]\n if { [check_effective_target_lto] } {\n     lappend VECT_ADDITIONAL_FLAGS \"-flto -ffat-lto-objects\"\n }\n+\n+# Set target specific vect torture options\n+if { [istarget aarch64*-*-*] } {\n+  set TORTURE_OPTIONS [list \\\n+      {-march=armv8-a} \\\n+      {-march=armv8-a+sve} \\\n+      {-march=armv8-a+sve -msve-vector-bits=128} \\\n+      {-march=armv8-a+sve -msve-vector-bits=256} \\\n+      {-march=armv9-a} \\\n+  ]\n+}\n+\n+# Allow TORTURE_OPTIONS to add extra flag sets on top of the existing ones.\n+if {[info exists TORTURE_OPTIONS]} {\n+    set base_vect_additional_flags $VECT_ADDITIONAL_FLAGS\n+    set VECT_ADDITIONAL_FLAGS [list]\n+    foreach base_flags $base_vect_additional_flags {\n+       lappend VECT_ADDITIONAL_FLAGS $base_flags\n+       foreach torture_flags $TORTURE_OPTIONS {\n+           if {$base_flags eq \"\"} {\n+               lappend VECT_ADDITIONAL_FLAGS $torture_flags\n+           } else {\n+               lappend VECT_ADDITIONAL_FLAGS [concat $base_flags $torture_flags]\n+           }\n+       }\n+    }\n+}\n+\n foreach flags $VECT_ADDITIONAL_FLAGS {\n+    set ::vect_torture_flags [concat $flags $DEFAULT_VECTCFLAGS]\n     et-dg-runtest dg-runtest [lsort \\\n \t[glob -nocomplain $srcdir/$subdir/pr*.\\[cS\\]]] \\\n \t$flags $DEFAULT_VECTCFLAGS\ndiff --git a/gcc/testsuite/lib/target-supports.exp b/gcc/testsuite/lib/target-supports.exp\nindex c87918275569b603ae6820fcf784f9c95641e658..089081b3a64d5d69e660064c70bf17482aac77bc 100644\n--- a/gcc/testsuite/lib/target-supports.exp\n+++ b/gcc/testsuite/lib/target-supports.exp\n@@ -139,8 +139,14 @@ proc current_target_name { } {\n \n proc check_cached_effective_target { prop args } {\n     global et_cache\n+    global vect_torture_flags\n+    if {![info exists vect_torture_flags]} {\n+\tset vect_torture_flags \"\"\n+    }\n \n-    set target [current_target_name]\n+    # Make the cache key depend on the actual target name plus any vect torture\n+    # flags in effect.\n+    set target \"[current_target_name] $vect_torture_flags\"\n     if {![info exists et_cache($prop,$target)]} {\n \tverbose \"check_cached_effective_target $prop: checking $target\" 2\n \tif {[string is true -strict $args] || [string is false -strict $args]} {\n\n",
    "prefixes": [
        "RFC",
        "vect"
    ]
}