checkasm for ppc64le trips on Asan
$ gcc --version
gcc (Gentoo 12.2.1_p20221008 p1) 12.2.1 20221008
checkasm: using random seed 4285787300
=================================================================
==4676==ERROR: AddressSanitizer: unknown-crash on address 0x7fffffffe364 at pc 0x0001000ea790 bp 0x7fffffffdf70 sp 0x7fffffffdf90
READ of size 16 at 0x7fffffffe364 thread T0
#0 0x1000ea78c in filter_4xN ../src/ppc/cdef_tmpl.c:327
#1 0x1000eae84 in dav1d_cdef_filter_4x8_vsx ../src/ppc/cdef_tmpl.c:466
#2 0x10002a3a4 in check_cdef_filter ../tests/checkasm/cdef.c:90
#3 0x10002ac60 in checkasm_check_cdef_8bpc ../tests/checkasm/cdef.c:141
#4 0x1001a3a10 in check_cpu_flag ../tests/checkasm/checkasm.c:523
#5 0x1001a3a10 in check_cpu_flag ../tests/checkasm/checkasm.c:509
#6 0x100028e00 in main ../tests/checkasm/checkasm.c:673
#7 0x7ffff74c4c20 (/lib64/libc.so.6+0x24c20)
#8 0x7ffff74c4e6c in __libc_start_main (/lib64/libc.so.6+0x24e6c)
Address 0x7fffffffe364 is located in stack of thread T0 at offset 212 in frame
#0 0x1000eadac in dav1d_cdef_filter_4x8_vsx ../src/ppc/cdef_tmpl.c:466
This frame has 1 object(s):
[32, 224) 'tmp_buf' (line 466) <== Memory access at offset 212 partially overflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
(longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: unknown-crash ../src/ppc/cdef_tmpl.c:327 in filter_4xN
Shadow bytes around the buggy address:
0x11fffffffc10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x11fffffffc20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x11fffffffc30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x11fffffffc40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x11fffffffc50: 00 00 f1 f1 f1 f1 00 00 00 00 00 00 00 00 00 00
=>0x11fffffffc60: 00 00 00 00 00 00 00 00 00 00 00 00[00]00 f3 f3
0x11fffffffc70: f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00
0x11fffffffc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x11fffffffc90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x11fffffffca0: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
0x11fffffffcb0: 00 00 00 00 00 00 f2 f2 f2 f2 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==4676==ABORTING
Might or might not be related to #412 (closed)