Skip to content

checkasm for ppc64le trips on Asan

$ gcc --version
gcc (Gentoo 12.2.1_p20221008 p1) 12.2.1 20221008
checkasm: using random seed 4285787300
=================================================================
==4676==ERROR: AddressSanitizer: unknown-crash on address 0x7fffffffe364 at pc 0x0001000ea790 bp 0x7fffffffdf70 sp 0x7fffffffdf90
READ of size 16 at 0x7fffffffe364 thread T0
    #0 0x1000ea78c in filter_4xN ../src/ppc/cdef_tmpl.c:327
    #1 0x1000eae84 in dav1d_cdef_filter_4x8_vsx ../src/ppc/cdef_tmpl.c:466
    #2 0x10002a3a4 in check_cdef_filter ../tests/checkasm/cdef.c:90
    #3 0x10002ac60 in checkasm_check_cdef_8bpc ../tests/checkasm/cdef.c:141
    #4 0x1001a3a10 in check_cpu_flag ../tests/checkasm/checkasm.c:523
    #5 0x1001a3a10 in check_cpu_flag ../tests/checkasm/checkasm.c:509
    #6 0x100028e00 in main ../tests/checkasm/checkasm.c:673
    #7 0x7ffff74c4c20  (/lib64/libc.so.6+0x24c20)
    #8 0x7ffff74c4e6c in __libc_start_main (/lib64/libc.so.6+0x24e6c)

Address 0x7fffffffe364 is located in stack of thread T0 at offset 212 in frame
    #0 0x1000eadac in dav1d_cdef_filter_4x8_vsx ../src/ppc/cdef_tmpl.c:466

  This frame has 1 object(s):
    [32, 224) 'tmp_buf' (line 466) <== Memory access at offset 212 partially overflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
      (longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: unknown-crash ../src/ppc/cdef_tmpl.c:327 in filter_4xN
Shadow bytes around the buggy address:
  0x11fffffffc10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x11fffffffc20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x11fffffffc30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x11fffffffc40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x11fffffffc50: 00 00 f1 f1 f1 f1 00 00 00 00 00 00 00 00 00 00
=>0x11fffffffc60: 00 00 00 00 00 00 00 00 00 00 00 00[00]00 f3 f3
  0x11fffffffc70: f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00
  0x11fffffffc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x11fffffffc90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x11fffffffca0: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
  0x11fffffffcb0: 00 00 00 00 00 00 f2 f2 f2 f2 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07
  Heap left redzone:       fa
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
  Left alloca redzone:     ca
  Right alloca redzone:    cb
==4676==ABORTING

Might or might not be related to #412 (closed)

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information