get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2194248/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2194248,
    "url": "http://patchwork.ozlabs.org/api/patches/2194248/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260207180632.1042754-2-brian.cain@oss.qualcomm.com/",
    "project": {
        "id": 14,
        "url": "http://patchwork.ozlabs.org/api/projects/14/?format=api",
        "name": "QEMU Development",
        "link_name": "qemu-devel",
        "list_id": "qemu-devel.nongnu.org",
        "list_email": "qemu-devel@nongnu.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260207180632.1042754-2-brian.cain@oss.qualcomm.com>",
    "list_archive_url": null,
    "date": "2026-02-07T18:06:29",
    "name": "[v2,1/4] target/hexagon: Fix invalid duplex decoding",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "6780412c77e14c099429b474fac9f890af497d87",
    "submitter": {
        "id": 89839,
        "url": "http://patchwork.ozlabs.org/api/people/89839/?format=api",
        "name": "Brian Cain",
        "email": "brian.cain@oss.qualcomm.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260207180632.1042754-2-brian.cain@oss.qualcomm.com/mbox/",
    "series": [
        {
            "id": 491391,
            "url": "http://patchwork.ozlabs.org/api/series/491391/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/list/?series=491391",
            "date": "2026-02-07T18:06:28",
            "name": "Handle some invalid encodings",
            "version": 2,
            "mbox": "http://patchwork.ozlabs.org/series/491391/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2194248/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2194248/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=qualcomm.com header.i=@qualcomm.com header.a=rsa-sha256\n header.s=qcppdkim1 header.b=TU0UyxSS;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=oss.qualcomm.com header.i=@oss.qualcomm.com\n header.a=rsa-sha256 header.s=google header.b=eVxXq1OV;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from lists.gnu.org (lists.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4f7f7y4Rbcz1xvr\n\tfor <incoming@patchwork.ozlabs.org>; Sun, 08 Feb 2026 05:07:58 +1100 (AEDT)",
            "from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1vomi5-0001UJ-4Y; Sat, 07 Feb 2026 13:07:09 -0500",
            "from eggs.gnu.org ([2001:470:142:3::10])\n by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <brian.cain@oss.qualcomm.com>)\n id 1vomhz-0001Tb-RY\n for qemu-devel@nongnu.org; Sat, 07 Feb 2026 13:07:04 -0500",
            "from mx0a-0031df01.pphosted.com ([205.220.168.131])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <brian.cain@oss.qualcomm.com>)\n id 1vomhr-0005L5-Dj\n for qemu-devel@nongnu.org; Sat, 07 Feb 2026 13:07:01 -0500",
            "from pps.filterd (m0279864.ppops.net [127.0.0.1])\n by mx0a-0031df01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 617BRhBw3292657\n for <qemu-devel@nongnu.org>; Sat, 7 Feb 2026 18:06:51 GMT",
            "from mail-dy1-f200.google.com (mail-dy1-f200.google.com\n [74.125.82.200])\n by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 4c64hngh7y-1\n (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NOT)\n for <qemu-devel@nongnu.org>; Sat, 07 Feb 2026 18:06:51 +0000 (GMT)",
            "by mail-dy1-f200.google.com with SMTP id\n 5a478bee46e88-2b83787af4cso23342431eec.1\n for <qemu-devel@nongnu.org>; Sat, 07 Feb 2026 10:06:51 -0800 (PST)",
            "from hu-bcain-lv.qualcomm.com (Global_NAT1.qualcomm.com.\n [129.46.96.20]) by smtp.gmail.com with ESMTPSA id\n 5a478bee46e88-2b855c63152sm4002328eec.25.2026.02.07.10.06.49\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Sat, 07 Feb 2026 10:06:49 -0800 (PST)"
        ],
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; c=relaxed/relaxed; d=qualcomm.com; h=\n cc:content-transfer-encoding:content-type:date:from:in-reply-to\n :message-id:mime-version:references:subject:to; s=qcppdkim1; bh=\n U4PnucSErgQ1G1d8s/m4sKZugrEwnunGmTkw2hW8UbY=; b=TU0UyxSSE4tIEAWH\n fvRxcc2h0WoDqufFEHTDaecGN5oJgztZ2XDZrJxejb0/8GcT48rhdtQt2Z94uXOW\n pnjcbfSs6YicQ1sBOkqHUQYWtbnJ5jbaa0bj8BMy7uGKaJBKB/GKPYptOkIDEKyh\n owDVTwrKkkfGJR6EN1vZgpfwedT13UwGqZ/ZdJYj5xsbd5mHcI/POwPGT+tggAtl\n qwhjQQEWrDCaQfIPkU6DbKwXBly203HD0wCKHov2FGD1EZ6/RVuz10Yn6Tipkmge\n u68FCyjir39EM8UQ00h2Uz4Qf60uzuBLzw62o0xU9X0jUWBZiro/bWva+jaGlRL+\n CgIweg==",
            "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=oss.qualcomm.com; s=google; t=1770487611; x=1771092411; darn=nongnu.org;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=U4PnucSErgQ1G1d8s/m4sKZugrEwnunGmTkw2hW8UbY=;\n b=eVxXq1OVX+C4CBQ/esXqFnjns8xdTF+mBBNzLYD+OO9lQgyKJIbJQ2WC65g+oedcpv\n Ze9VEy+S52BtSyEMB5eIxvDW6W2FI7wWuxleJV6hoWOLYstcRwz1obuYlCrSNe1AnzkE\n 2J3NpLUoewp4rWZEafE874HGZD1uzMT3c1h7tg1ny/zy3wYT/MzJ21buCyXz6H0oQN1v\n vMVC2c88/vs7ctVA7TTg/37He1iNsYZQOhXw+0hb1H1hJTt320+jY8W21VYUZS3k04+o\n 1ldaLzpLn+fW6rCtvChsdJqiLvoJTkyY/SAqid/p3S1jYCTyh+J3TPgkBcnDuRt+QbvG\n DKzg=="
        ],
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20230601; t=1770487611; x=1771092411;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=U4PnucSErgQ1G1d8s/m4sKZugrEwnunGmTkw2hW8UbY=;\n b=O/flzkARmKFZ3AWhCBbxA8hOCyojFiQrCCIUYt5erjPs9T/iNrVFuqhfJsJqkXeJD+\n 9WhcgVMvbn3id4rHqBAsFU1+RQtfqX6L+ZPi5zrYIp5vKyJBE8EpVpYkyELi++DYrHmy\n vTkZhSPzf+gUocgVjg0gte5MgDviIWf1RpU7z/5AvGoYjuOj7WdecDPBmPXTnwnEi4x9\n 7G21yewgloDlGYu2atcnXSQZGuExQdeAr1LAdMB/DI21eyOFDkNWyu7YUtC+QdsUGEUA\n 7Kfk9ZniFDbssUHFTujMYsi3GlH8L2QhO0if+FA1c5fUwBtoMKY9cCpcsCOZ5SylV61q\n LBiQ==",
        "X-Gm-Message-State": "AOJu0YyRtX1KO2GqUeCjkfCSPlG25LWpSjOOUK3abke6p6UqF4J2KVMh\n Vi2lqIebDMz2MTp/MxCani9rs9iqsYtgZC9uru0WNeYAEUMkMCvMe4d6kJZXgBC6tJC6Hdu4iIV\n Dz8JQ2pbiXgWJKbLJELLNM/gowOPgiTM5JgCbOLskoC1Gvv3nV09IAoblH9MDFzwKEg==",
        "X-Gm-Gg": "AZuq6aLcmoDTj3bI207IN6naiksCGMzjfs1HnJ5UO9Ou+UVBc6lPJEmMU0IFxQO4DUr\n ec738Z1QnYhU6h6GIpJ6EQ3xX93sefPLmtkgtyWQXJTA7pTzl1A4MdKnDGL67XGeEjfd9mBphuf\n in7TkRn/9WI/wR0gYajzMTQR1J9lYa3mGgMnO9rWfXw2c3LKwqoM1Bq05ouZyt5lW00yUYphVl+\n Hn/4Q4GJXlbEAhp/OxMTCIMzQE3FC66ieJZkuhzMYd5w3IAPl9l+AzXX3nCrTHP/U38PgIftqI7\n vAIftcKSJQP6MmO3MsUdiQ3YLm92Fqw+gsHoQ1rRl8wbSwgrdCTHDaNjG+e/lpHddPG7zbs+lFk\n q8Vj/gbnLCPoh4bRXlgebwDIb318MvJPa3ehA5RozWq9XUPrUG+NXtbahrA==",
        "X-Received": [
            "by 2002:a05:7301:4198:b0:2ae:5020:afe1 with SMTP id\n 5a478bee46e88-2b85647d9d4mr3009401eec.14.1770487610560;\n Sat, 07 Feb 2026 10:06:50 -0800 (PST)",
            "by 2002:a05:7301:4198:b0:2ae:5020:afe1 with SMTP id\n 5a478bee46e88-2b85647d9d4mr3009391eec.14.1770487609928;\n Sat, 07 Feb 2026 10:06:49 -0800 (PST)"
        ],
        "From": "Brian Cain <brian.cain@oss.qualcomm.com>",
        "To": "qemu-devel@nongnu.org",
        "Cc": "brian.cain@oss.qualcomm.com, ltaylorsimpson@gmail.com, alex@alexrp.com,\n Brian Cain <bcain@quicinc.com>,\n Pierrick Bouvier <pierrick.bouvier@linaro.org>,\n Laurent Vivier <laurent@vivier.eu>",
        "Subject": "[PATCH v2 1/4] target/hexagon: Fix invalid duplex decoding",
        "Date": "Sat,  7 Feb 2026 10:06:29 -0800",
        "Message-Id": "<20260207180632.1042754-2-brian.cain@oss.qualcomm.com>",
        "X-Mailer": "git-send-email 2.34.1",
        "In-Reply-To": "<20260207180632.1042754-1-brian.cain@oss.qualcomm.com>",
        "References": "<20260207180632.1042754-1-brian.cain@oss.qualcomm.com>",
        "MIME-Version": "1.0",
        "Content-Type": "text/plain; charset=\"utf-8\"",
        "Content-Transfer-Encoding": "base64",
        "X-Proofpoint-GUID": "vgs2N1auDmj-Q6Co8vMyWjZapNk7KSqa",
        "X-Proofpoint-ORIG-GUID": "vgs2N1auDmj-Q6Co8vMyWjZapNk7KSqa",
        "X-Proofpoint-Spam-Details-Enc": "AW1haW4tMjYwMjA3MDE0OSBTYWx0ZWRfX3xuwY7cgp17a\n z6vV1dKjJcuUuEIIH5LzqwZwhb+SZcO+IDaQN1yupOO72bUsV+CvyBCPXccwAE7kknX6AmlzrwY\n HjMvCOALssCWXXLA1vTTsDDkotFqOnH58DOp2xZVBq2exqfmoP7Qfv0WriaUKTmLXLWwhXAnmU5\n 3sMvKcVcmKZ426Fq2Y5SE/H16wZ/ooAqOCWhRzqd8fwghInfkCPfyhsrpq1bJOf+e4JP0qh4ZNc\n AwNnmmODqsuzMk1TVE3dsflQO5TTEoXlNXG+364c0Ij2vAjRAUv0kn2eivGY9Nr/zPhohtm9zuF\n r5pP2cM9Htr/k5+O6gYv4jJ0Iyzqsxpr84dm1dSp/goQh0xwVt7ZsHgrxrp/suoIz/OjWNPvn1g\n DjveT5aZlYi44nuXI3A+iaCtXxhJOBNHnIzfuoSl28nRTvYczMTsEOR+6StKznp1oaXmSrUOgfL\n Zg5po2U1+ZKVrO7u4jw==",
        "X-Authority-Analysis": "v=2.4 cv=SNlPlevH c=1 sm=1 tr=0 ts=69877f3b cx=c_pps\n a=PfFC4Oe2JQzmKTvty2cRDw==:117 a=ouPCqIW2jiPt+lZRy3xVPw==:17\n a=IkcTkHD0fZMA:10 a=HzLeVaNsDn8A:10 a=s4-Qcg_JpJYA:10\n a=VkNPw1HP01LnGYTKEx00:22 a=Mpw57Om8IfrbqaoTuvik:22 a=GgsMoib0sEa3-_RKJdDe:22\n a=p0WdMEafAAAA:8 a=COk6AnOGAAAA:8 a=KKAkSRfTAAAA:8 a=OCWrEZw6VeUBrM89gJgA:9\n a=QEXdDO2ut3YA:10 a=6Ab_bkdmUrQuMsNx7PHu:22 a=TjNXssC_j7lpFel5tvFf:22\n a=cvBusfyB2V15izCimMoJ:22",
        "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-02-06_05,2026-02-05_03,2025-10-01_01",
        "X-Proofpoint-Spam-Details": "rule=outbound_notspam policy=outbound score=0\n bulkscore=0 clxscore=1015 priorityscore=1501 impostorscore=0 suspectscore=0\n adultscore=0 lowpriorityscore=0 spamscore=0 phishscore=0 malwarescore=0\n classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0\n reason=mlx scancount=1 engine=8.22.0-2601150000 definitions=main-2602070149",
        "Received-SPF": "pass client-ip=205.220.168.131;\n envelope-from=brian.cain@oss.qualcomm.com; helo=mx0a-0031df01.pphosted.com",
        "X-Spam_score_int": "-27",
        "X-Spam_score": "-2.8",
        "X-Spam_bar": "--",
        "X-Spam_report": "(-2.8 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001,\n RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=ham autolearn_force=no",
        "X-Spam_action": "no action",
        "X-BeenThere": "qemu-devel@nongnu.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "qemu development <qemu-devel.nongnu.org>",
        "List-Unsubscribe": "<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>",
        "List-Archive": "<https://lists.nongnu.org/archive/html/qemu-devel>",
        "List-Post": "<mailto:qemu-devel@nongnu.org>",
        "List-Help": "<mailto:qemu-devel-request@nongnu.org?subject=help>",
        "List-Subscribe": "<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>",
        "Errors-To": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org",
        "Sender": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"
    },
    "content": "When decoding a duplex instruction, if the slot0 sub-instruction fails\nto decode after slot1 succeeds, QEMU was leaving the packet in a\npartially-decoded state. This allowed invalid duplex encodings (where\none sub-instruction doesn't match any valid pattern) to be executed\nincorrectly.\n\nFix by resetting the decoder state when slot0 fails, returning an empty\ninstruction that triggers an exception.\n\nAdd gen_exception_decode_fail() for raising exceptions when decode fails\nbefore ctx->next_PC is initialized. This keeps gen_exception_end_tb()\nsemantics unchanged (it continues to use ctx->next_PC for the exception\nPC after successful decode).\n\nResolves: https://gitlab.com/qemu-project/qemu/-/issues/3291\nSigned-off-by: Brian Cain <bcain@quicinc.com>\nReviewed-by: Pierrick Bouvier <pierrick.bouvier@linaro.org>\n---\n linux-user/hexagon/cpu_loop.c        |  4 ++\n target/hexagon/decode.c              | 13 ++++-\n target/hexagon/translate.c           | 18 ++++++-\n tests/tcg/hexagon/invalid-encoding.c | 81 ++++++++++++++++++++++++++++\n tests/tcg/hexagon/Makefile.target    |  1 +\n 5 files changed, 113 insertions(+), 4 deletions(-)\n create mode 100644 tests/tcg/hexagon/invalid-encoding.c",
    "diff": "diff --git a/linux-user/hexagon/cpu_loop.c b/linux-user/hexagon/cpu_loop.c\nindex 1941f4c9c1..c0e1098e3f 100644\n--- a/linux-user/hexagon/cpu_loop.c\n+++ b/linux-user/hexagon/cpu_loop.c\n@@ -64,6 +64,10 @@ void cpu_loop(CPUHexagonState *env)\n             force_sig_fault(TARGET_SIGBUS, TARGET_BUS_ADRALN,\n                             env->gpr[HEX_REG_R31]);\n             break;\n+        case HEX_CAUSE_INVALID_PACKET:\n+            force_sig_fault(TARGET_SIGILL, TARGET_ILL_ILLOPC,\n+                            env->gpr[HEX_REG_PC]);\n+            break;\n         case EXCP_ATOMIC:\n             cpu_exec_step_atomic(cs);\n             break;\ndiff --git a/target/hexagon/decode.c b/target/hexagon/decode.c\nindex b5ece60450..69ba1ec96c 100644\n--- a/target/hexagon/decode.c\n+++ b/target/hexagon/decode.c\n@@ -509,8 +509,14 @@ decode_insns(DisasContext *ctx, Insn *insn, uint32_t encoding)\n                 insn->iclass = iclass_bits(encoding);\n                 return 2;\n             }\n+            /*\n+             * Slot0 decode failed after slot1 succeeded. This is an invalid\n+             * duplex encoding (both sub-instructions must be valid).\n+             */\n+            ctx->insn = --insn;\n         }\n-        g_assert_not_reached();\n+        /* Invalid duplex encoding - return 0 to signal failure */\n+        return 0;\n     }\n }\n \n@@ -674,7 +680,10 @@ int decode_packet(DisasContext *ctx, int max_words, const uint32_t *words,\n         encoding32 = words[words_read];\n         end_of_packet = is_packet_end(encoding32);\n         new_insns = decode_insns(ctx, insn, encoding32);\n-        g_assert(new_insns > 0);\n+        if (new_insns == 0) {\n+            /* Invalid instruction encoding */\n+            return 0;\n+        }\n         /*\n          * If we saw an extender, mark next word extended so immediate\n          * decode works\ndiff --git a/target/hexagon/translate.c b/target/hexagon/translate.c\nindex e88e19cc1a..7fe8b35351 100644\n--- a/target/hexagon/translate.c\n+++ b/target/hexagon/translate.c\n@@ -195,7 +195,21 @@ static void gen_exception_end_tb(DisasContext *ctx, int excp)\n     tcg_gen_movi_tl(hex_gpr[HEX_REG_PC], ctx->next_PC);\n     gen_exception_raw(excp);\n     ctx->base.is_jmp = DISAS_NORETURN;\n+}\n \n+/*\n+ * Generate exception for decode failures. Unlike gen_exception_end_tb,\n+ * this is used when decode fails before ctx->next_PC is initialized.\n+ */\n+static void gen_exception_decode_fail(DisasContext *ctx, int nwords, int excp)\n+{\n+    target_ulong fail_pc = ctx->base.pc_next + nwords * sizeof(uint32_t);\n+\n+    gen_exec_counters(ctx);\n+    tcg_gen_movi_tl(hex_gpr[HEX_REG_PC], fail_pc);\n+    gen_exception_raw(excp);\n+    ctx->base.is_jmp = DISAS_NORETURN;\n+    ctx->base.pc_next = fail_pc;\n }\n \n static int read_packet_words(CPUHexagonState *env, DisasContext *ctx,\n@@ -935,7 +949,7 @@ static void decode_and_translate_packet(CPUHexagonState *env, DisasContext *ctx)\n \n     nwords = read_packet_words(env, ctx, words);\n     if (!nwords) {\n-        gen_exception_end_tb(ctx, HEX_CAUSE_INVALID_PACKET);\n+        gen_exception_decode_fail(ctx, 0, HEX_CAUSE_INVALID_PACKET);\n         return;\n     }\n \n@@ -950,7 +964,7 @@ static void decode_and_translate_packet(CPUHexagonState *env, DisasContext *ctx)\n         gen_commit_packet(ctx);\n         ctx->base.pc_next += pkt.encod_pkt_size_in_bytes;\n     } else {\n-        gen_exception_end_tb(ctx, HEX_CAUSE_INVALID_PACKET);\n+        gen_exception_decode_fail(ctx, nwords, HEX_CAUSE_INVALID_PACKET);\n     }\n }\n \ndiff --git a/tests/tcg/hexagon/invalid-encoding.c b/tests/tcg/hexagon/invalid-encoding.c\nnew file mode 100644\nindex 0000000000..010a5eb741\n--- /dev/null\n+++ b/tests/tcg/hexagon/invalid-encoding.c\n@@ -0,0 +1,81 @@\n+/*\n+ * Test that invalid instruction encodings are properly rejected.\n+ *\n+ * Copyright (c) Qualcomm Technologies, Inc. and/or its subsidiaries.\n+ * SPDX-License-Identifier: GPL-2.0-or-later\n+ */\n+\n+#include <assert.h>\n+#include <signal.h>\n+#include <stdio.h>\n+#include <stdlib.h>\n+#include <string.h>\n+#include <unistd.h>\n+\n+static void *resume_pc;\n+\n+static void handle_sigill(int sig, siginfo_t *info, void *puc)\n+{\n+    ucontext_t *uc = (ucontext_t *)puc;\n+\n+    if (sig != SIGILL) {\n+        _exit(EXIT_FAILURE);\n+    }\n+\n+    uc->uc_mcontext.r0 = SIGILL;\n+    uc->uc_mcontext.pc = (unsigned long)resume_pc;\n+}\n+\n+/*\n+ * Each test function:\n+ *   - Sets r0 to something other than SIGILL\n+ *   - Stores the resume address into resume_pc\n+ *   - Executes the invalid encoding\n+ *   - The handler sets r0 = SIGILL and resumes after the faulting packet\n+ *   - Returns the value in r0\n+ */\n+\n+/*\n+ * Invalid duplex encoding (issue #3291):\n+ * - Word 0: 0x0fff6fff = immext(#0xfffbffc0), parse bits = 01\n+ * - Word 1: 0x600237b0 = duplex with:\n+ *     - slot0 = 0x17b0 (invalid S2 subinstruction encoding)\n+ *     - slot1 = 0x0002 (valid SA1_addi)\n+ *     - duplex iclass = 7 (S2 for slot0, A for slot1)\n+ *\n+ * Since slot0 doesn't decode to any valid S2 subinstruction, this packet\n+ * should be rejected and raise SIGILL.\n+ */\n+static int test_invalid_duplex(void)\n+{\n+    int sig;\n+\n+    asm volatile(\n+        \"r0 = #0\\n\"\n+        \"r1 = ##1f\\n\"\n+        \"memw(%1) = r1\\n\"\n+        \".word 0x0fff6fff\\n\"  /* immext(#0xfffbffc0), parse=01 */\n+        \".word 0x600237b0\\n\"  /* duplex: slot0=0x17b0 (invalid) */\n+        \"1:\\n\"\n+        \"%0 = r0\\n\"\n+        : \"=r\"(sig)\n+        : \"r\"(&resume_pc)\n+        : \"r0\", \"r1\", \"memory\");\n+\n+    return sig;\n+}\n+\n+int main()\n+{\n+    struct sigaction act;\n+\n+    memset(&act, 0, sizeof(act));\n+    act.sa_sigaction = handle_sigill;\n+    act.sa_flags = SA_SIGINFO;\n+    assert(sigaction(SIGILL, &act, NULL) == 0);\n+\n+    assert(test_invalid_duplex() == SIGILL);\n+\n+    puts(\"PASS\");\n+    return EXIT_SUCCESS;\n+}\ndiff --git a/tests/tcg/hexagon/Makefile.target b/tests/tcg/hexagon/Makefile.target\nindex e5182c01d8..16669e04a8 100644\n--- a/tests/tcg/hexagon/Makefile.target\n+++ b/tests/tcg/hexagon/Makefile.target\n@@ -51,6 +51,7 @@ HEX_TESTS += scatter_gather\n HEX_TESTS += hvx_misc\n HEX_TESTS += hvx_histogram\n HEX_TESTS += invalid-slots\n+HEX_TESTS += invalid-encoding\n HEX_TESTS += unaligned_pc\n \n run-and-check-exception = $(call run-test,$2,$3 2>$2.stderr; \\\n",
    "prefixes": [
        "v2",
        "1/4"
    ]
}