_gp_disp __cxa_finalize __stack_chk_guard __stack_chk_fail _ZN11__sanitizer11CheckFailedEPKciS1_yy __sanitizer_malloc_hook __sanitizer_free_hook __sanitizer_get_estimated_allocated_size __sanitizer_get_ownership __sanitizer_get_allocated_size __asan_stack_malloc_0 __asan_option_detect_stack_use_after_return __asan_stack_free_0 __asan_stack_malloc_1 __asan_stack_free_1 __asan_stack_malloc_2 __asan_stack_free_2 __asan_stack_malloc_3 __asan_stack_free_3 __asan_stack_malloc_4 __asan_stack_free_4 __asan_stack_malloc_5 __asan_stack_free_5 __asan_stack_malloc_6 __asan_stack_free_6 __asan_stack_malloc_7 __asan_stack_free_7 __asan_stack_malloc_8 __asan_stack_free_8 __asan_stack_malloc_9 __asan_stack_free_9 __asan_stack_malloc_10 __asan_stack_free_10 __asan_get_current_fake_stack __asan_addr_is_in_fake_stack __asan_alloca_poison __asan_allocas_unpoison __asan_default_options __asan_register_globals __asan_region_is_poisoned __asan_unregister_globals __asan_before_dynamic_init __asan_after_dynamic_init __interceptor_strcmp __sanitizer_weak_hook_strcmp __interceptor_strncmp __sanitizer_weak_hook_strncmp __interceptor_strcasecmp __interceptor_strncasecmp __interceptor_strstr __interceptor_strcasestr __interceptor_strspn __interceptor_strcspn __interceptor_strpbrk __interceptor_memcmp __sanitizer_weak_hook_memcmp __interceptor_memchr __interceptor_memrchr __interceptor_frexp __interceptor_frexpf __interceptor_frexpl __interceptor_read __interceptor_pread __interceptor_readv __interceptor_write __interceptor_pwrite __interceptor_writev __interceptor_prctl __interceptor_time __interceptor_localtime __interceptor_localtime_r __interceptor_gmtime __interceptor_gmtime_r __interceptor_ctime __interceptor_ctime_r __interceptor_asctime __interceptor_asctime_r __interceptor_mktime __interceptor_strptime __interceptor_vscanf __interceptor_vsscanf __interceptor_vfscanf __interceptor_scanf __interceptor_fscanf __interceptor_sscanf __interceptor_vprintf __interceptor_vfprintf __interceptor_vsnprintf __interceptor_vsprintf __interceptor_vasprintf __interceptor_printf __interceptor_fprintf __interceptor_sprintf __interceptor_snprintf __interceptor_asprintf __interceptor_ioctl __interceptor_getpwnam __interceptor_getpwuid __interceptor_getgrnam __interceptor_getgrgid __interceptor_clock_getres __interceptor_clock_gettime __interceptor_clock_settime __interceptor_getitimer __interceptor_setitimer __interceptor_wait __interceptor_waitid __interceptor_waitpid __interceptor_wait3 __interceptor___wait4 __interceptor_inet_ntop __interceptor_inet_pton __interceptor_inet_aton __interceptor_pthread_getschedparam __interceptor_getaddrinfo __interceptor_getnameinfo __interceptor_getsockname __interceptor_gethostbyname __interceptor_gethostbyaddr __interceptor_gethostent __interceptor_gethostbyname2 __interceptor_gethostbyname_r __interceptor_getsockopt __interceptor_accept __interceptor_modf __interceptor_modff __interceptor_modfl __interceptor_recvmsg __interceptor_getpeername __interceptor_sysinfo __interceptor_opendir __interceptor_readdir __interceptor_readdir_r __interceptor_setlocale __interceptor_getcwd __interceptor_strtoimax __interceptor_strtoumax __interceptor_mbstowcs __interceptor_mbsrtowcs __interceptor_wcstombs __interceptor_wcsrtombs __interceptor_realpath __interceptor_malloc __interceptor_free __interceptor_strerror __interceptor_strerror_r __interceptor_getgroups __interceptor_poll __interceptor_sigwait __interceptor_sigpending __interceptor_sigprocmask __interceptor__exit __interceptor_pthread_mutex_lock __interceptor_pthread_mutex_unlock __interceptor_getmntent __interceptor_initgroups __interceptor_ether_ntoa __interceptor_ether_aton __interceptor_pthread_attr_getdetachstate __interceptor_pthread_attr_getguardsize __interceptor_pthread_attr_getschedparam __interceptor_pthread_attr_getschedpolicy __interceptor_pthread_attr_getscope __interceptor_pthread_attr_getstacksize __interceptor_pthread_attr_getstack __interceptor_pthread_mutexattr_getpshared __interceptor_pthread_mutexattr_gettype __interceptor_pthread_rwlockattr_getpshared __interceptor_pthread_condattr_getpshared __interceptor_tmpnam __interceptor_tempnam __interceptor_sincos __interceptor_sincosf __interceptor_sincosl __interceptor_remquo __interceptor_remquof __interceptor_remquol __interceptor_lgamma signgam __interceptor_lgammaf __interceptor_lgammal __interceptor_lgamma_r __interceptor_lgammaf_r __interceptor_times __interceptor_listxattr __interceptor_llistxattr __interceptor_flistxattr __interceptor_getxattr __interceptor_lgetxattr __interceptor_fgetxattr __interceptor_getresuid __interceptor_getresgid __interceptor_ftime __interceptor_fopen __interceptor_fdopen __interceptor_freopen __interceptor_fflush __interceptor_fclose __interceptor_mlock __interceptor_munlock __interceptor_mlockall __interceptor_munlockall __interceptor_sem_init __interceptor_sem_destroy __interceptor_sem_wait __interceptor_sem_trywait __interceptor_sem_timedwait __interceptor_sem_post __interceptor_sem_getvalue __interceptor_pthread_setcancelstate __interceptor_pthread_setcanceltype __interceptor_mincore __interceptor_process_vm_readv __interceptor_process_vm_writev __interceptor_ctermid __sanitizer_syscall_pre_impl_recvmsg __sanitizer_syscall_post_impl_recvmsg __sanitizer_syscall_pre_impl_recvmmsg __sanitizer_syscall_post_impl_recvmmsg __sanitizer_syscall_pre_impl_read __sanitizer_syscall_post_impl_read __sanitizer_syscall_pre_impl_time __sanitizer_syscall_post_impl_time __sanitizer_syscall_pre_impl_stime __sanitizer_syscall_post_impl_stime __sanitizer_syscall_pre_impl_gettimeofday __sanitizer_syscall_post_impl_gettimeofday __sanitizer_syscall_pre_impl_settimeofday __sanitizer_syscall_post_impl_settimeofday __sanitizer_syscall_pre_impl_times __sanitizer_syscall_post_impl_times __sanitizer_syscall_pre_impl_gettid __sanitizer_syscall_post_impl_gettid __sanitizer_syscall_pre_impl_nanosleep __sanitizer_syscall_post_impl_nanosleep __sanitizer_syscall_pre_impl_alarm __sanitizer_syscall_post_impl_alarm __sanitizer_syscall_pre_impl_getpid __sanitizer_syscall_post_impl_getpid __sanitizer_syscall_pre_impl_getppid __sanitizer_syscall_post_impl_getppid __sanitizer_syscall_pre_impl_getuid __sanitizer_syscall_post_impl_getuid __sanitizer_syscall_pre_impl_geteuid __sanitizer_syscall_post_impl_geteuid __sanitizer_syscall_pre_impl_getgid __sanitizer_syscall_post_impl_getgid __sanitizer_syscall_pre_impl_getegid __sanitizer_syscall_post_impl_getegid __sanitizer_syscall_pre_impl_getresuid __sanitizer_syscall_post_impl_getresuid __sanitizer_syscall_pre_impl_getresgid __sanitizer_syscall_post_impl_getresgid __sanitizer_syscall_pre_impl_getpgid __sanitizer_syscall_post_impl_getpgid __sanitizer_syscall_pre_impl_getpgrp __sanitizer_syscall_post_impl_getpgrp __sanitizer_syscall_pre_impl_getsid __sanitizer_syscall_post_impl_getsid __sanitizer_syscall_pre_impl_getgroups __sanitizer_syscall_post_impl_getgroups __sanitizer_syscall_pre_impl_setregid __sanitizer_syscall_post_impl_setregid __sanitizer_syscall_pre_impl_setgid __sanitizer_syscall_post_impl_setgid __sanitizer_syscall_pre_impl_setreuid __sanitizer_syscall_post_impl_setreuid __sanitizer_syscall_pre_impl_setuid __sanitizer_syscall_post_impl_setuid __sanitizer_syscall_pre_impl_setresuid __sanitizer_syscall_post_impl_setresuid __sanitizer_syscall_pre_impl_setresgid __sanitizer_syscall_post_impl_setresgid __sanitizer_syscall_pre_impl_setfsuid __sanitizer_syscall_post_impl_setfsuid __sanitizer_syscall_pre_impl_setfsgid __sanitizer_syscall_post_impl_setfsgid __sanitizer_syscall_pre_impl_setpgid __sanitizer_syscall_post_impl_setpgid __sanitizer_syscall_pre_impl_setsid __sanitizer_syscall_post_impl_setsid __sanitizer_syscall_pre_impl_setgroups __sanitizer_syscall_post_impl_setgroups __sanitizer_syscall_pre_impl_acct __sanitizer_syscall_post_impl_acct __sanitizer_syscall_pre_impl_capget __sanitizer_syscall_post_impl_capget __sanitizer_syscall_pre_impl_capset __sanitizer_syscall_post_impl_capset __sanitizer_syscall_pre_impl_personality __sanitizer_syscall_post_impl_personality __sanitizer_syscall_pre_impl_sigpending __sanitizer_syscall_post_impl_sigpending __sanitizer_syscall_pre_impl_sigprocmask __sanitizer_syscall_post_impl_sigprocmask __sanitizer_syscall_pre_impl_getitimer __sanitizer_syscall_post_impl_getitimer __sanitizer_syscall_pre_impl_setitimer __sanitizer_syscall_post_impl_setitimer __sanitizer_syscall_pre_impl_timer_create __sanitizer_syscall_post_impl_timer_create __sanitizer_syscall_pre_impl_timer_gettime __sanitizer_syscall_post_impl_timer_gettime __sanitizer_syscall_pre_impl_timer_getoverrun __sanitizer_syscall_post_impl_timer_getoverrun __sanitizer_syscall_pre_impl_timer_settime __sanitizer_syscall_post_impl_timer_settime __sanitizer_syscall_pre_impl_timer_delete __sanitizer_syscall_post_impl_timer_delete __sanitizer_syscall_pre_impl_clock_settime __sanitizer_syscall_post_impl_clock_settime __sanitizer_syscall_pre_impl_clock_gettime __sanitizer_syscall_post_impl_clock_gettime __sanitizer_syscall_pre_impl_clock_getres __sanitizer_syscall_post_impl_clock_getres __sanitizer_syscall_pre_impl_clock_nanosleep __sanitizer_syscall_post_impl_clock_nanosleep __sanitizer_syscall_pre_impl_nice __sanitizer_syscall_post_impl_nice __sanitizer_syscall_pre_impl_sched_setscheduler __sanitizer_syscall_post_impl_sched_setscheduler __sanitizer_syscall_pre_impl_sched_setparam __sanitizer_syscall_post_impl_sched_setparam __sanitizer_syscall_pre_impl_sched_getscheduler __sanitizer_syscall_post_impl_sched_getscheduler __sanitizer_syscall_pre_impl_sched_getparam __sanitizer_syscall_post_impl_sched_getparam __sanitizer_syscall_pre_impl_sched_setaffinity __sanitizer_syscall_post_impl_sched_setaffinity __sanitizer_syscall_pre_impl_sched_getaffinity __sanitizer_syscall_post_impl_sched_getaffinity __sanitizer_syscall_pre_impl_sched_yield __sanitizer_syscall_post_impl_sched_yield __sanitizer_syscall_pre_impl_sched_get_priority_max __sanitizer_syscall_post_impl_sched_get_priority_max __sanitizer_syscall_pre_impl_sched_get_priority_min __sanitizer_syscall_post_impl_sched_get_priority_min __sanitizer_syscall_pre_impl_sched_rr_get_interval __sanitizer_syscall_post_impl_sched_rr_get_interval __sanitizer_syscall_pre_impl_setpriority __sanitizer_syscall_post_impl_setpriority __sanitizer_syscall_pre_impl_getpriority __sanitizer_syscall_post_impl_getpriority __sanitizer_syscall_pre_impl_shutdown __sanitizer_syscall_post_impl_shutdown __sanitizer_syscall_pre_impl_reboot __sanitizer_syscall_post_impl_reboot __sanitizer_syscall_pre_impl_restart_syscall __sanitizer_syscall_post_impl_restart_syscall __sanitizer_syscall_pre_impl_kexec_load __sanitizer_syscall_post_impl_kexec_load __sanitizer_syscall_pre_impl_exit __sanitizer_syscall_post_impl_exit __sanitizer_syscall_pre_impl_exit_group __sanitizer_syscall_post_impl_exit_group __sanitizer_syscall_pre_impl_wait4 __sanitizer_syscall_post_impl_wait4 __sanitizer_syscall_pre_impl_waitid __sanitizer_syscall_post_impl_waitid __sanitizer_syscall_pre_impl_waitpid __sanitizer_syscall_post_impl_waitpid __sanitizer_syscall_pre_impl_set_tid_address __sanitizer_syscall_post_impl_set_tid_address __sanitizer_syscall_pre_impl_init_module __sanitizer_syscall_post_impl_init_module __sanitizer_syscall_pre_impl_delete_module __sanitizer_syscall_post_impl_delete_module __sanitizer_syscall_pre_impl_rt_sigprocmask __sanitizer_syscall_post_impl_rt_sigprocmask __sanitizer_syscall_pre_impl_rt_sigpending __sanitizer_syscall_post_impl_rt_sigpending __sanitizer_syscall_pre_impl_rt_sigtimedwait __sanitizer_syscall_post_impl_rt_sigtimedwait __sanitizer_syscall_pre_impl_rt_tgsigqueueinfo __sanitizer_syscall_post_impl_rt_tgsigqueueinfo __sanitizer_syscall_pre_impl_kill __sanitizer_syscall_post_impl_kill __sanitizer_syscall_pre_impl_tgkill __sanitizer_syscall_post_impl_tgkill __sanitizer_syscall_pre_impl_tkill __sanitizer_syscall_post_impl_tkill __sanitizer_syscall_pre_impl_rt_sigqueueinfo __sanitizer_syscall_post_impl_rt_sigqueueinfo __sanitizer_syscall_pre_impl_sgetmask __sanitizer_syscall_post_impl_sgetmask __sanitizer_syscall_pre_impl_ssetmask __sanitizer_syscall_post_impl_ssetmask __sanitizer_syscall_pre_impl_signal __sanitizer_syscall_post_impl_signal __sanitizer_syscall_pre_impl_pause __sanitizer_syscall_post_impl_pause __sanitizer_syscall_pre_impl_sync __sanitizer_syscall_post_impl_sync __sanitizer_syscall_pre_impl_fsync __sanitizer_syscall_post_impl_fsync __sanitizer_syscall_pre_impl_fdatasync __sanitizer_syscall_post_impl_fdatasync __sanitizer_syscall_pre_impl_bdflush __sanitizer_syscall_post_impl_bdflush __sanitizer_syscall_pre_impl_mount __sanitizer_syscall_post_impl_mount __sanitizer_syscall_pre_impl_umount __sanitizer_syscall_post_impl_umount __sanitizer_syscall_pre_impl_oldumount __sanitizer_syscall_post_impl_oldumount __sanitizer_syscall_pre_impl_truncate __sanitizer_syscall_post_impl_truncate __sanitizer_syscall_pre_impl_ftruncate __sanitizer_syscall_post_impl_ftruncate __sanitizer_syscall_pre_impl_stat __sanitizer_syscall_post_impl_stat __sanitizer_syscall_pre_impl_lstat __sanitizer_syscall_post_impl_lstat __sanitizer_syscall_pre_impl_fstat __sanitizer_syscall_post_impl_fstat __sanitizer_syscall_pre_impl_newstat __sanitizer_syscall_post_impl_newstat __sanitizer_syscall_pre_impl_newlstat __sanitizer_syscall_post_impl_newlstat __sanitizer_syscall_pre_impl_newfstat __sanitizer_syscall_post_impl_newfstat __sanitizer_syscall_pre_impl_stat64 __sanitizer_syscall_post_impl_stat64 __sanitizer_syscall_pre_impl_fstat64 __sanitizer_syscall_post_impl_fstat64 __sanitizer_syscall_pre_impl_lstat64 __sanitizer_syscall_post_impl_lstat64 __sanitizer_syscall_pre_impl_setxattr __sanitizer_syscall_post_impl_setxattr __sanitizer_syscall_pre_impl_lsetxattr __sanitizer_syscall_post_impl_lsetxattr __sanitizer_syscall_pre_impl_fsetxattr __sanitizer_syscall_post_impl_fsetxattr __sanitizer_syscall_pre_impl_getxattr __sanitizer_syscall_post_impl_getxattr __sanitizer_syscall_pre_impl_lgetxattr __sanitizer_syscall_post_impl_lgetxattr __sanitizer_syscall_pre_impl_fgetxattr __sanitizer_syscall_post_impl_fgetxattr __sanitizer_syscall_pre_impl_listxattr __sanitizer_syscall_post_impl_listxattr __sanitizer_syscall_pre_impl_llistxattr __sanitizer_syscall_post_impl_llistxattr __sanitizer_syscall_pre_impl_flistxattr __sanitizer_syscall_post_impl_flistxattr __sanitizer_syscall_pre_impl_removexattr __sanitizer_syscall_post_impl_removexattr __sanitizer_syscall_pre_impl_lremovexattr __sanitizer_syscall_post_impl_lremovexattr __sanitizer_syscall_pre_impl_fremovexattr __sanitizer_syscall_post_impl_fremovexattr __sanitizer_syscall_pre_impl_brk __sanitizer_syscall_post_impl_brk __sanitizer_syscall_pre_impl_mprotect __sanitizer_syscall_post_impl_mprotect __sanitizer_syscall_pre_impl_mremap __sanitizer_syscall_post_impl_mremap __sanitizer_syscall_pre_impl_remap_file_pages __sanitizer_syscall_post_impl_remap_file_pages __sanitizer_syscall_pre_impl_msync __sanitizer_syscall_post_impl_msync __sanitizer_syscall_pre_impl_munmap __sanitizer_syscall_post_impl_munmap __sanitizer_syscall_pre_impl_mlock __sanitizer_syscall_post_impl_mlock __sanitizer_syscall_pre_impl_munlock __sanitizer_syscall_post_impl_munlock __sanitizer_syscall_pre_impl_mlockall __sanitizer_syscall_post_impl_mlockall __sanitizer_syscall_pre_impl_munlockall __sanitizer_syscall_post_impl_munlockall __sanitizer_syscall_pre_impl_madvise __sanitizer_syscall_post_impl_madvise __sanitizer_syscall_pre_impl_mincore __sanitizer_syscall_post_impl_mincore __sanitizer_syscall_pre_impl_pivot_root __sanitizer_syscall_post_impl_pivot_root __sanitizer_syscall_pre_impl_chroot __sanitizer_syscall_post_impl_chroot __sanitizer_syscall_pre_impl_mknod __sanitizer_syscall_post_impl_mknod __sanitizer_syscall_pre_impl_link __sanitizer_syscall_post_impl_link __sanitizer_syscall_pre_impl_symlink __sanitizer_syscall_post_impl_symlink __sanitizer_syscall_pre_impl_unlink __sanitizer_syscall_post_impl_unlink __sanitizer_syscall_pre_impl_rename __sanitizer_syscall_post_impl_rename __sanitizer_syscall_pre_impl_chmod __sanitizer_syscall_post_impl_chmod __sanitizer_syscall_pre_impl_fchmod __sanitizer_syscall_post_impl_fchmod __sanitizer_syscall_pre_impl_fcntl __sanitizer_syscall_post_impl_fcntl __sanitizer_syscall_pre_impl_fcntl64 __sanitizer_syscall_post_impl_fcntl64 __sanitizer_syscall_pre_impl_pipe __sanitizer_syscall_post_impl_pipe __sanitizer_syscall_pre_impl_pipe2 __sanitizer_syscall_post_impl_pipe2 __sanitizer_syscall_pre_impl_dup __sanitizer_syscall_post_impl_dup __sanitizer_syscall_pre_impl_dup2 __sanitizer_syscall_post_impl_dup2 __sanitizer_syscall_pre_impl_dup3 __sanitizer_syscall_post_impl_dup3 __sanitizer_syscall_pre_impl_ioperm __sanitizer_syscall_post_impl_ioperm __sanitizer_syscall_pre_impl_ioctl __sanitizer_syscall_post_impl_ioctl __sanitizer_syscall_pre_impl_flock __sanitizer_syscall_post_impl_flock __sanitizer_syscall_pre_impl_io_setup __sanitizer_syscall_post_impl_io_setup __sanitizer_syscall_pre_impl_io_destroy __sanitizer_syscall_post_impl_io_destroy __sanitizer_syscall_pre_impl_io_getevents __sanitizer_syscall_post_impl_io_getevents __sanitizer_syscall_pre_impl_io_submit __sanitizer_syscall_post_impl_io_submit __sanitizer_syscall_pre_impl_io_cancel __sanitizer_syscall_post_impl_io_cancel __sanitizer_syscall_pre_impl_sendfile __sanitizer_syscall_post_impl_sendfile __sanitizer_syscall_pre_impl_sendfile64 __sanitizer_syscall_post_impl_sendfile64 __sanitizer_syscall_pre_impl_readlink __sanitizer_syscall_post_impl_readlink __sanitizer_syscall_pre_impl_creat __sanitizer_syscall_post_impl_creat __sanitizer_syscall_pre_impl_open __sanitizer_syscall_post_impl_open __sanitizer_syscall_pre_impl_close __sanitizer_syscall_post_impl_close __sanitizer_syscall_pre_impl_access __sanitizer_syscall_post_impl_access __sanitizer_syscall_pre_impl_vhangup __sanitizer_syscall_post_impl_vhangup __sanitizer_syscall_pre_impl_chown __sanitizer_syscall_post_impl_chown __sanitizer_syscall_pre_impl_lchown __sanitizer_syscall_post_impl_lchown __sanitizer_syscall_pre_impl_fchown __sanitizer_syscall_post_impl_fchown __sanitizer_syscall_pre_impl_utime __sanitizer_syscall_post_impl_utime __sanitizer_syscall_pre_impl_utimes __sanitizer_syscall_post_impl_utimes __sanitizer_syscall_pre_impl_lseek __sanitizer_syscall_post_impl_lseek __sanitizer_syscall_pre_impl_llseek __sanitizer_syscall_post_impl_llseek __sanitizer_syscall_pre_impl_readv __sanitizer_syscall_post_impl_readv __sanitizer_syscall_pre_impl_write __sanitizer_syscall_post_impl_write __sanitizer_syscall_pre_impl_writev __sanitizer_syscall_post_impl_writev __sanitizer_syscall_pre_impl_pread64 __sanitizer_syscall_post_impl_pread64 __sanitizer_syscall_pre_impl_pwrite64 __sanitizer_syscall_post_impl_pwrite64 __sanitizer_syscall_pre_impl_preadv __sanitizer_syscall_post_impl_preadv __sanitizer_syscall_pre_impl_pwritev __sanitizer_syscall_post_impl_pwritev __sanitizer_syscall_pre_impl_getcwd __sanitizer_syscall_post_impl_getcwd __sanitizer_syscall_pre_impl_mkdir __sanitizer_syscall_post_impl_mkdir __sanitizer_syscall_pre_impl_chdir __sanitizer_syscall_post_impl_chdir __sanitizer_syscall_pre_impl_fchdir __sanitizer_syscall_post_impl_fchdir __sanitizer_syscall_pre_impl_rmdir __sanitizer_syscall_post_impl_rmdir __sanitizer_syscall_pre_impl_lookup_dcookie __sanitizer_syscall_post_impl_lookup_dcookie __sanitizer_syscall_pre_impl_quotactl __sanitizer_syscall_post_impl_quotactl __sanitizer_syscall_pre_impl_getdents __sanitizer_syscall_post_impl_getdents __sanitizer_syscall_pre_impl_getdents64 __sanitizer_syscall_post_impl_getdents64 __sanitizer_syscall_pre_impl_setsockopt __sanitizer_syscall_post_impl_setsockopt __sanitizer_syscall_pre_impl_getsockopt __sanitizer_syscall_post_impl_getsockopt __sanitizer_syscall_pre_impl_bind __sanitizer_syscall_post_impl_bind __sanitizer_syscall_pre_impl_connect __sanitizer_syscall_post_impl_connect __sanitizer_syscall_pre_impl_accept __sanitizer_syscall_post_impl_accept __sanitizer_syscall_pre_impl_accept4 __sanitizer_syscall_post_impl_accept4 __sanitizer_syscall_pre_impl_getsockname __sanitizer_syscall_post_impl_getsockname __sanitizer_syscall_pre_impl_getpeername __sanitizer_syscall_post_impl_getpeername __sanitizer_syscall_pre_impl_send __sanitizer_syscall_post_impl_send __sanitizer_syscall_pre_impl_sendto __sanitizer_syscall_post_impl_sendto __sanitizer_syscall_pre_impl_sendmsg __sanitizer_syscall_post_impl_sendmsg __sanitizer_syscall_pre_impl_sendmmsg __sanitizer_syscall_post_impl_sendmmsg __sanitizer_syscall_pre_impl_recv __sanitizer_syscall_post_impl_recv __sanitizer_syscall_pre_impl_recvfrom __sanitizer_syscall_post_impl_recvfrom __sanitizer_syscall_pre_impl_socket __sanitizer_syscall_post_impl_socket __sanitizer_syscall_pre_impl_socketpair __sanitizer_syscall_post_impl_socketpair __sanitizer_syscall_pre_impl_socketcall __sanitizer_syscall_post_impl_socketcall __sanitizer_syscall_pre_impl_listen __sanitizer_syscall_post_impl_listen __sanitizer_syscall_pre_impl_poll __sanitizer_syscall_post_impl_poll __sanitizer_syscall_pre_impl_select __sanitizer_syscall_post_impl_select __sanitizer_syscall_pre_impl_old_select __sanitizer_syscall_post_impl_old_select __sanitizer_syscall_pre_impl_epoll_create __sanitizer_syscall_post_impl_epoll_create __sanitizer_syscall_pre_impl_epoll_create1 __sanitizer_syscall_post_impl_epoll_create1 __sanitizer_syscall_pre_impl_epoll_ctl __sanitizer_syscall_post_impl_epoll_ctl __sanitizer_syscall_pre_impl_epoll_wait __sanitizer_syscall_post_impl_epoll_wait __sanitizer_syscall_pre_impl_epoll_pwait __sanitizer_syscall_post_impl_epoll_pwait __sanitizer_syscall_pre_impl_gethostname __sanitizer_syscall_post_impl_gethostname __sanitizer_syscall_pre_impl_sethostname __sanitizer_syscall_post_impl_sethostname __sanitizer_syscall_pre_impl_setdomainname __sanitizer_syscall_post_impl_setdomainname __sanitizer_syscall_pre_impl_newuname __sanitizer_syscall_post_impl_newuname __sanitizer_syscall_pre_impl_uname __sanitizer_syscall_post_impl_uname __sanitizer_syscall_pre_impl_olduname __sanitizer_syscall_post_impl_olduname __sanitizer_syscall_pre_impl_getrlimit __sanitizer_syscall_post_impl_getrlimit __sanitizer_syscall_pre_impl_old_getrlimit __sanitizer_syscall_post_impl_old_getrlimit __sanitizer_syscall_pre_impl_setrlimit __sanitizer_syscall_post_impl_setrlimit __sanitizer_syscall_pre_impl_getrusage __sanitizer_syscall_post_impl_getrusage __sanitizer_syscall_pre_impl_umask __sanitizer_syscall_post_impl_umask __sanitizer_syscall_pre_impl_msgget __sanitizer_syscall_post_impl_msgget __sanitizer_syscall_pre_impl_msgsnd __sanitizer_syscall_post_impl_msgsnd __sanitizer_syscall_pre_impl_msgrcv __sanitizer_syscall_post_impl_msgrcv __sanitizer_syscall_pre_impl_semget __sanitizer_syscall_post_impl_semget __sanitizer_syscall_pre_impl_semop __sanitizer_syscall_post_impl_semop __sanitizer_syscall_pre_impl_semctl __sanitizer_syscall_post_impl_semctl __sanitizer_syscall_pre_impl_semtimedop __sanitizer_syscall_post_impl_semtimedop __sanitizer_syscall_pre_impl_shmat __sanitizer_syscall_post_impl_shmat __sanitizer_syscall_pre_impl_shmget __sanitizer_syscall_post_impl_shmget __sanitizer_syscall_pre_impl_shmdt __sanitizer_syscall_post_impl_shmdt __sanitizer_syscall_pre_impl_ipc __sanitizer_syscall_post_impl_ipc __sanitizer_syscall_pre_impl_pciconfig_iobase __sanitizer_syscall_post_impl_pciconfig_iobase __sanitizer_syscall_pre_impl_pciconfig_read __sanitizer_syscall_post_impl_pciconfig_read __sanitizer_syscall_pre_impl_pciconfig_write __sanitizer_syscall_post_impl_pciconfig_write __sanitizer_syscall_pre_impl_swapon __sanitizer_syscall_post_impl_swapon __sanitizer_syscall_pre_impl_swapoff __sanitizer_syscall_post_impl_swapoff __sanitizer_syscall_pre_impl_sysctl __sanitizer_syscall_post_impl_sysctl __sanitizer_syscall_pre_impl_sysinfo __sanitizer_syscall_post_impl_sysinfo __sanitizer_syscall_pre_impl_sysfs __sanitizer_syscall_post_impl_sysfs __sanitizer_syscall_pre_impl_syslog __sanitizer_syscall_post_impl_syslog __sanitizer_syscall_pre_impl_uselib __sanitizer_syscall_post_impl_uselib __sanitizer_syscall_pre_impl_ni_syscall __sanitizer_syscall_post_impl_ni_syscall __sanitizer_syscall_pre_impl_ptrace __sanitizer_syscall_post_impl_ptrace __sanitizer_syscall_pre_impl_add_key __sanitizer_syscall_post_impl_add_key __sanitizer_syscall_pre_impl_request_key __sanitizer_syscall_post_impl_request_key __sanitizer_syscall_pre_impl_keyctl __sanitizer_syscall_post_impl_keyctl __sanitizer_syscall_pre_impl_ioprio_set __sanitizer_syscall_post_impl_ioprio_set __sanitizer_syscall_pre_impl_ioprio_get __sanitizer_syscall_post_impl_ioprio_get __sanitizer_syscall_pre_impl_set_mempolicy __sanitizer_syscall_post_impl_set_mempolicy __sanitizer_syscall_pre_impl_migrate_pages __sanitizer_syscall_post_impl_migrate_pages __sanitizer_syscall_pre_impl_move_pages __sanitizer_syscall_post_impl_move_pages __sanitizer_syscall_pre_impl_mbind __sanitizer_syscall_post_impl_mbind __sanitizer_syscall_pre_impl_get_mempolicy __sanitizer_syscall_post_impl_get_mempolicy __sanitizer_syscall_pre_impl_inotify_init __sanitizer_syscall_post_impl_inotify_init __sanitizer_syscall_pre_impl_inotify_init1 __sanitizer_syscall_post_impl_inotify_init1 __sanitizer_syscall_pre_impl_inotify_add_watch __sanitizer_syscall_post_impl_inotify_add_watch __sanitizer_syscall_pre_impl_inotify_rm_watch __sanitizer_syscall_post_impl_inotify_rm_watch __sanitizer_syscall_pre_impl_spu_run __sanitizer_syscall_post_impl_spu_run __sanitizer_syscall_pre_impl_spu_create __sanitizer_syscall_post_impl_spu_create __sanitizer_syscall_pre_impl_mknodat __sanitizer_syscall_post_impl_mknodat __sanitizer_syscall_pre_impl_mkdirat __sanitizer_syscall_post_impl_mkdirat __sanitizer_syscall_pre_impl_unlinkat __sanitizer_syscall_post_impl_unlinkat __sanitizer_syscall_pre_impl_symlinkat __sanitizer_syscall_post_impl_symlinkat __sanitizer_syscall_pre_impl_linkat __sanitizer_syscall_post_impl_linkat __sanitizer_syscall_pre_impl_renameat __sanitizer_syscall_post_impl_renameat __sanitizer_syscall_pre_impl_futimesat __sanitizer_syscall_post_impl_futimesat __sanitizer_syscall_pre_impl_faccessat __sanitizer_syscall_post_impl_faccessat __sanitizer_syscall_pre_impl_fchmodat __sanitizer_syscall_post_impl_fchmodat __sanitizer_syscall_pre_impl_fchownat __sanitizer_syscall_post_impl_fchownat __sanitizer_syscall_pre_impl_openat __sanitizer_syscall_post_impl_openat __sanitizer_syscall_pre_impl_newfstatat __sanitizer_syscall_post_impl_newfstatat __sanitizer_syscall_pre_impl_fstatat64 __sanitizer_syscall_post_impl_fstatat64 __sanitizer_syscall_pre_impl_readlinkat __sanitizer_syscall_post_impl_readlinkat __sanitizer_syscall_pre_impl_utimensat __sanitizer_syscall_post_impl_utimensat __sanitizer_syscall_pre_impl_unshare __sanitizer_syscall_post_impl_unshare __sanitizer_syscall_pre_impl_splice __sanitizer_syscall_post_impl_splice __sanitizer_syscall_pre_impl_vmsplice __sanitizer_syscall_post_impl_vmsplice __sanitizer_syscall_pre_impl_tee __sanitizer_syscall_post_impl_tee __sanitizer_syscall_pre_impl_get_robust_list __sanitizer_syscall_post_impl_get_robust_list __sanitizer_syscall_pre_impl_set_robust_list __sanitizer_syscall_post_impl_set_robust_list __sanitizer_syscall_pre_impl_getcpu __sanitizer_syscall_post_impl_getcpu __sanitizer_syscall_pre_impl_signalfd __sanitizer_syscall_post_impl_signalfd __sanitizer_syscall_pre_impl_signalfd4 __sanitizer_syscall_post_impl_signalfd4 __sanitizer_syscall_pre_impl_timerfd_create __sanitizer_syscall_post_impl_timerfd_create __sanitizer_syscall_pre_impl_timerfd_settime __sanitizer_syscall_post_impl_timerfd_settime __sanitizer_syscall_pre_impl_timerfd_gettime __sanitizer_syscall_post_impl_timerfd_gettime __sanitizer_syscall_pre_impl_eventfd __sanitizer_syscall_post_impl_eventfd __sanitizer_syscall_pre_impl_eventfd2 __sanitizer_syscall_post_impl_eventfd2 __sanitizer_syscall_pre_impl_old_readdir __sanitizer_syscall_post_impl_old_readdir __sanitizer_syscall_pre_impl_pselect6 __sanitizer_syscall_post_impl_pselect6 __sanitizer_syscall_pre_impl_ppoll __sanitizer_syscall_post_impl_ppoll __sanitizer_syscall_pre_impl_syncfs __sanitizer_syscall_post_impl_syncfs __sanitizer_syscall_pre_impl_perf_event_open __sanitizer_syscall_post_impl_perf_event_open __sanitizer_syscall_pre_impl_mmap_pgoff __sanitizer_syscall_post_impl_mmap_pgoff __sanitizer_syscall_pre_impl_old_mmap __sanitizer_syscall_post_impl_old_mmap __sanitizer_syscall_pre_impl_name_to_handle_at __sanitizer_syscall_post_impl_name_to_handle_at __sanitizer_syscall_pre_impl_open_by_handle_at __sanitizer_syscall_post_impl_open_by_handle_at __sanitizer_syscall_pre_impl_setns __sanitizer_syscall_post_impl_setns __sanitizer_syscall_pre_impl_process_vm_readv __sanitizer_syscall_post_impl_process_vm_readv __sanitizer_syscall_pre_impl_process_vm_writev __sanitizer_syscall_post_impl_process_vm_writev __sanitizer_syscall_pre_impl_fork __sanitizer_syscall_post_impl_fork __sanitizer_syscall_pre_impl_vfork __sanitizer_syscall_post_impl_vfork __interceptor_pthread_create __interceptor_pthread_join __interceptor_bsd_signal __interceptor_signal __interceptor_sigaction __interceptor_longjmp __asan_handle_no_return __interceptor__longjmp __interceptor_siglongjmp __interceptor___cxa_throw __asan_memcpy __asan_memset __asan_memmove __interceptor_memmove __interceptor_memcpy __interceptor_memset __interceptor_strchr __interceptor_strcat __interceptor_strncat __interceptor_strcpy __interceptor_strdup __interceptor_strlen __interceptor_wcslen __interceptor_strncpy __interceptor_strnlen __interceptor_strtol __interceptor_atoi __interceptor_atol __interceptor_strtoll __interceptor_atoll __interceptor___cxa_atexit __interceptor_fork __interceptor_index dlsym __asan_rt_version __interceptor_cfree __interceptor_calloc __interceptor_realloc __interceptor_memalign __interceptor_aligned_alloc __interceptor___libc_memalign __interceptor_malloc_usable_size __interceptor_mallinfo __interceptor_mallopt __interceptor_posix_memalign __interceptor_valloc __interceptor_pvalloc __interceptor_malloc_stats __asan_print_accumulated_stats __asan_poison_memory_region __asan_unpoison_memory_region __asan_address_is_poisoned __sanitizer_unaligned_load16 __asan_report_error __sanitizer_unaligned_load32 __sanitizer_unaligned_load64 __sanitizer_unaligned_store16 __sanitizer_unaligned_store32 __sanitizer_unaligned_store64 __asan_poison_cxx_array_cookie __asan_load_cxx_array_cookie __asan_poison_stack_memory __asan_unpoison_stack_memory __sanitizer_annotate_contiguous_container __sanitizer_contiguous_container_find_bad_address __sanitizer_verify_contiguous_container __asan_poison_intra_object_redzone __asan_unpoison_intra_object_redzone pthread_key_create pthread_getspecific pthread_setspecific __asan_set_error_report_callback __asan_describe_address __asan_report_present __asan_get_report_pc __asan_get_report_bp __asan_get_report_sp __asan_get_report_address __asan_get_report_access_type __asan_get_report_access_size __asan_get_report_description __sanitizer_ptr_sub __sanitizer_ptr_cmp __asan_on_error __asan_report_load1 __asan_report_exp_load1 __asan_report_load1_noabort __asan_report_load2 __asan_report_exp_load2 __asan_report_load2_noabort __asan_report_load4 __asan_report_exp_load4 __asan_report_load4_noabort __asan_report_load8 __asan_report_exp_load8 __asan_report_load8_noabort __asan_report_load16 __asan_report_exp_load16 __asan_report_load16_noabort __asan_report_store1 __asan_report_exp_store1 __asan_report_store1_noabort __asan_report_store2 __asan_report_exp_store2 __asan_report_store2_noabort __asan_report_store4 __asan_report_exp_store4 __asan_report_store4_noabort __asan_report_store8 __asan_report_exp_store8 __asan_report_store8_noabort __asan_report_store16 __asan_report_exp_store16 __asan_report_store16_noabort __asan_report_load_n __asan_report_exp_load_n __asan_report_load_n_noabort __asan_report_store_n __asan_report_exp_store_n __asan_report_store_n_noabort __asan_load1 __asan_test_only_reported_buggy_pointer __asan_exp_load1 __asan_load1_noabort __asan_load2 __asan_exp_load2 __asan_load2_noabort __asan_load4 __asan_exp_load4 __asan_load4_noabort __asan_load8 __asan_exp_load8 __asan_load8_noabort __asan_load16 __asan_exp_load16 __asan_load16_noabort __asan_store1 __asan_exp_store1 __asan_store1_noabort __asan_store2 __asan_exp_store2 __asan_store2_noabort __asan_store4 __asan_exp_store4 __asan_store4_noabort __asan_store8 __asan_exp_store8 __asan_store8_noabort __asan_store16 __asan_exp_store16 __asan_store16_noabort __asan_loadN __asan_exp_loadN __asan_loadN_noabort __asan_storeN __asan_exp_storeN __asan_storeN_noabort __sanitizer_set_report_path __asan_set_death_callback __asan_init __asan_version_mismatch_check_v6 __sanitizer_print_stack_trace __sanitizer_get_current_allocated_bytes __sanitizer_get_heap_size __sanitizer_get_free_bytes __sanitizer_get_unmapped_bytes __asan_default_suppressions _Znwj _Znaj _ZnwjRKSt9nothrow_t _ZnajRKSt9nothrow_t _ZdlPv _ZdaPv _ZdlPvRKSt9nothrow_t _ZdaPvRKSt9nothrow_t _ZdlPvj _ZdaPvj __lsan_ignore_object __lsan_register_root_region __lsan_unregister_root_region __lsan_disable __lsan_enable __lsan_do_leak_check __lsan_do_recoverable_leak_check __sanitizer_report_error_summary __sanitizer_set_death_callback __sanitizer_sandbox_on_notify __sanitizer_cov_dump __sanitizer_cov __sanitizer_cov_with_check __sanitizer_cov_indir_call16 __sanitizer_cov_init __sanitizer_cov_module_init __sanitizer_maybe_open_cov_file __sanitizer_get_total_unique_coverage __sanitizer_get_total_unique_caller_callee_pairs __sanitizer_cov_trace_func_enter __sanitizer_cov_trace_basic_block __sanitizer_reset_coverage __sanitizer_get_coverage_guards __sanitizer_get_number_of_counters __sanitizer_update_counter_bitset_and_clear_counters __sanitizer_cov_trace_cmp __sanitizer_cov_trace_switch __errno sysconf dl_iterate_phdr pthread_attr_init pthread_self pthread_getattr_np pthread_attr_destroy __android_log_write usleep isatty sigaltstack _ZN11__sanitizer7OnPrintEPKc __umoddi3 __udivdi3 __cxa_demangle execv __sanitizer_symbolize_data __sanitizer_symbolize_code __sanitizer_symbolize_flush __sanitizer_symbolize_demangle dlopen _Unwind_GetIP _Unwind_Backtrace __ubsan_default_options _Unwind_GetGR _Unwind_GetCFA _Unwind_SetGR _Unwind_GetIPInfo _Unwind_SetIP _Unwind_GetLanguageSpecificData _Unwind_GetRegionStart _Unwind_FindEnclosingFunction _Unwind_Find_FDE _Unwind_GetDataRelBase _Unwind_GetTextRelBase __frame_state_for _Unwind_RaiseException _Unwind_ForcedUnwind _Unwind_Resume _Unwind_Resume_or_Rethrow _Unwind_DeleteException pthread_once __register_frame_info_bases __register_frame_info __register_frame __register_frame_info_table_bases __register_frame_info_table __register_frame_table __deregister_frame_info_bases __deregister_frame_info __deregister_frame libc.so libm.so liblog.so libdl.so _ftext _fdata _edata __bss_start _fbss _end __bss_end__ __end__ libclang_rt.asan-mips-android.so 
external/compiler-rt/lib/asan/asan_activation.cc ((!asan_is_deactivated)) != (0) Deactivating ASan Activating ASan Activated with flags: ASAN_ACTIVATION_OPTIONS max_redzone quarantine_size_mb alloc_dealloc_mismatch poison_heap allocator_may_return_null malloc_context_size coverage coverage_dir verbosity help ERROR: Invalid value for int option: '%s' no yes ERROR: Invalid value for bool option: '%s' quarantine_size_mb %d, max_redzone %d, poison_heap %d, malloc_context_size %d, alloc_dealloc_mismatch %d, allocator_may_return_null %d, coverage %d, coverage_dir %s external/compiler-rt/lib/asan/asan_allocator.cc ((ms)) != (0) ((IsAligned((uptr)ptr, alignment))) != (0) ((m)) != (0) external/compiler-rt/lib/sanitizer_common/sanitizer_allocator.h %s: bad pointer %p ((IsAligned(reinterpret_cast<uptr>(p), page_size_))) != (0) ((IsAligned(p, page_size_))) != (0) ((beg + 1)) == ((end)) external/compiler-rt/lib/sanitizer_common/sanitizer_mutex.h ((atomic_load(&state_, memory_order_relaxed))) == ((1)) ((IsAligned((uptr)h, page_size_))) != (0) ((nearest_chunk)) >= ((h->map_beg)) ((nearest_chunk)) < ((h->map_beg + h->map_size)) ((nearest_chunk)) <= ((p)) ((rz_log)) < ((8)) ((id)) != (0) ((res.trace)) != (0) ((options.min_redzone)) >= ((16)) ((options.max_redzone)) >= ((options.min_redzone)) ((options.max_redzone)) <= ((2048)) ((IsPowerOfTwo(options.min_redzone))) != (0) ((IsPowerOfTwo(options.max_redzone))) != (0) ((AsanChunkView(left_chunk).AddrIsAtRight(addr, 1, &l_offset))) != (0) ((AsanChunkView(right_chunk).AddrIsAtLeft(addr, 1, &r_offset))) != (0) external/compiler-rt/lib/sanitizer_common/sanitizer_list.h ((this)) != ((l)) ((m->chunk_state)) == ((CHUNK_QUARANTINE)) ((m->alloc_tid)) != ((kInvalidTid)) ((m->free_tid)) != ((kInvalidTid)) ((alloc_magic[0])) == ((kAllocBegMagic)) ((alloc_magic[1])) == ((reinterpret_cast<uptr>(m))) ((class_id)) != ((0UL)) ((class_id)) < ((kNumClasses)) ((c->max_count)) != ((0UL)) ((b->count)) > ((0)) ((!sci->free_list.empty())) != (0) SizeClassAllocator32 ((0U)) == (((res & (kRegionSize - 1)))) ((0U)) == ((map_[idx])) external/compiler-rt/lib/sanitizer_common/sanitizer_common.h ((x)) != ((0U)) ((chunks_[idx])) == ((h)) ((idx)) < ((n_chunks_)) Stats: LargeMmapAllocator: allocated %zd times, remains %zd (%zd K) max %zd M; by size logs: %zd:%zd; ((stack)) != (0) ((IsPowerOfTwo(alignment))) != (0) ((IsAligned(needed_size, min_alignment))) != (0) WARNING: AddressSanitizer failed to allocate 0x%zx bytes ((user_end)) <= ((alloc_end)) ((alloc_tid)) == ((m->alloc_tid)) ((alloc_beg+ 2 * sizeof(uptr))) <= ((chunk_beg)) ((allocator.FromPrimary(allocated))) != (0) ((!allocator.FromPrimary(allocated))) != (0) ((rz_size)) >= ((16)) ((rz_size)) <= ((2048)) ((IsPowerOfTwo(rz_size))) != (0) ((rz_size)) == ((RZLog2Size(res))) ((reinterpret_cast<uptr>(res) & (alignment - 1))) == ((0)) LargeMmapAllocator ((IsAligned(map_beg, page_size_))) != (0) ((IsAligned(res, alignment))) != (0) ((IsAligned(res, page_size_))) != (0) ((res + size)) >= ((map_beg)) ((res + size)) <= ((map_end)) ((size_log)) < (((sizeof(stats.by_size_log)/sizeof((stats.by_size_log)[0])))) ((idx)) < ((kMaxNumChunks)) external/compiler-rt/lib/asan/asan_mapping.h ((AddrIsInMem(p))) != (0) ((CHUNK_ALLOCATED)) == ((old_chunk_state)) external/compiler-rt/lib/sanitizer_common/sanitizer_quarantine.h ((b)) != (0) ((old_ptr && new_size)) != (0) ((__interception::real_memcpy)) != ((nullptr)) IsPowerOfTwo(boundary) FakeStack T%d: FakeStack created: %p -- %p stack_size_log: %zd; mmapped %zdK, noreserve=%d %zd: %zd/%zd; T%d: FakeStack destroyed: %s external/compiler-rt/lib/asan/asan_fake_stack.cc ((class_id)) < ((kNumberOfSizeClasses)) ((base)) <= ((ptr)) ((ptr)) < ((base + (1UL << stack_size_log))) InternalScopedBuffer ASAN_SYMBOLIZER_PATH ASAN_OPTIONS UBSAN_OPTIONS %s: detect_leaks is not supported on this platform. external/compiler-rt/lib/asan/asan_flags.cc (((uptr)common_flags()->malloc_context_size)) <= ((kStackTraceMax)) ((f->min_uar_stack_size_log)) <= ((f->max_uar_stack_size_log)) ((f->redzone)) >= ((16)) ((f->max_redzone)) >= ((f->redzone)) ((f->max_redzone)) <= ((2048)) ((IsPowerOfTwo(f->redzone))) != (0) ((IsPowerOfTwo(f->max_redzone))) != (0) %s: please use either 'quarantine_size' (deprecated) or quarantine_size_mb, but not both quarantine_size Deprecated, please use quarantine_size_mb. Size (in Mb) of quarantine used to detect use-after-free errors. Lower value may reduce memory usage but increase the chance of false negatives. Minimal size (in bytes) of redzones around heap objects. Requirement: redzone >= 16, is a power of two. Maximal size (in bytes) of redzones around heap objects. debug If set, prints some debugging information and does additional checks. report_globals Controls the way to handle globals (0 - don't detect buffer overflow on globals, 1 - detect buffer overflow, 2 - print data about registered globals). check_initialization_order If set, attempts to catch initialization order issues. replace_str If set, uses custom wrappers and replacements for libc string functions to find more errors. replace_intrin If set, uses custom wrappers for memset/memcpy/memmove intinsics. detect_stack_use_after_return Enables stack-use-after-return checking at run-time. min_uar_stack_size_log Minimum fake stack size log. max_uar_stack_size_log Maximum fake stack size log. uar_noreserve Use mmap with 'noreserve' flag to allocate fake stack. max_malloc_fill_size ASan allocator flag. max_malloc_fill_size is the maximal amount of bytes that will be filled with malloc_fill_byte on malloc. malloc_fill_byte Value used to fill the newly allocated memory. allow_user_poisoning If set, user may manually mark memory regions as poisoned or unpoisoned. sleep_before_dying Number of seconds to sleep between printing an error report and terminating the program. Useful for debugging purposes (e.g. when one needs to attach gdb). check_malloc_usable_size Allows the users to work around the bug in Nvidia drivers prior to 295.*. unmap_shadow_on_exit If set, explicitly unmaps the (huge) shadow at exit. protect_shadow_gap If set, mprotect the shadow gap print_stats Print various statistics after printing an error message or if atexit=1. print_legend Print the legend for the shadow bytes. If set, prints ASan exit stats even after program terminates successfully. print_full_thread_history If set, prints thread creation stacks for the threads involved in the report and their ancestors up to the main thread. Poison (or not) the heap memory on [de]allocation. Zero value is useful for benchmarking the allocator or instrumentator. poison_partial If true, poison partially addressable 8-byte aligned words (default=true). This flag affects heap and global buffers, but not stack buffers. poison_array_cookie Poison (or not) the array cookie after operator new[]. Report errors on malloc/delete, new/free, new/delete[], etc. new_delete_type_mismatch Report errors on mismatch betwen size of new and delete. strict_init_order If true, assume that dynamic initializers can never access globals from other modules, even if the latter are already initialized. start_deactivated If true, ASan tweaks a bunch of other flags (quarantine, redzone, heap poisoning) to reduce memory consumption as much as possible, and restores them to original values when the first instrumented module is loaded into the process. This is mainly intended to be used on Android. detect_invalid_pointer_pairs If non-zero, try to detect operations like <, <=, >, >= and - on invalid pointer pairs (e.g. when pointers belong to different objects). The bigger the value the harder we try. detect_container_overflow If true, honor the container overflow annotations. See https://github.com/google/sanitizers/wiki/AddressSanitizerContainerOverflow detect_odr_violation If >=2, detect violation of One-Definition-Rule (ODR); If ==1, detect ODR-violation only if the two variables have different sizes dump_instruction_bytes If true, dump 16 bytes starting at the instruction that caused SEGV Suppressions file name. halt_on_error Crash the program after printing the first error report (WARNING: USE AT YOUR OWN RISK!) Search global === ID %d; %p %p external/compiler-rt/lib/asan/asan_globals.cc ((dynamic_init_globals)) != (0) ((module_name)) != (0) ((asan_inited)) != (0) DynInitPoison module: %s %s Global[%p]: beg=%p size=%zu/%zu name=%s module=%s dyn_init=%zu location (%p): name=%s[%p], %d %d ((global_registration_site_vector)) != (0) ((i)) < ((size_)) Added ((flags()->report_globals)) != (0) ((AddrIsInMem(g->beg))) != (0) ((AddrIsAlignedByGranularity(g->beg))) != (0) ((AddrIsAlignedByGranularity(g->size_with_redzone))) != (0) InternalMmapVectorNoCtor ((size_)) <= ((capacity_)) ((size)) != (0) ((size < (1ULL << (up + 1)))) != (0) ((size > (1ULL << up))) != (0) ((new_capacity)) > ((0)) ((size_)) <= ((new_capacity)) InternalMmapVector Removed  X 0 X P , 4 | @ | L strcmp external/compiler-rt/lib/sanitizer_common/sanitizer_common_interceptors.inc ((!asan_init_is_running)) != (0) strncmp strcasecmp strncasecmp strcasestr strcspn memchr memrchr frexp frexpf frexpl pread pwrite prctl localtime localtime_r gmtime gmtime_r asctime asctime_r mktime strptime vscanf vsscanf vfscanf vprintf vfprintf vsnprintf vsprintf vasprintf ((ioctl_initialized)) != (0) Decoding unknown ioctl 0x%x WARNING: failed decoding unknown ioctl 0x%x getpwnam getpwuid getgrnam getgrgid clock_getres clock_gettime clock_settime getitimer setitimer waitid waitpid wait3 __wait4 inet_ntop inet_pton inet_aton pthread_getschedparam getaddrinfo getnameinfo getsockname gethostbyname gethostbyaddr gethostent gethostbyname2 gethostbyname_r getsockopt accept modf modff modfl recvmsg getpeername sysinfo opendir readdir readdir_r setlocale getcwd strtoimax strtoumax mbstowcs mbsrtowcs wcstombs wcsrtombs realpath strerror strerror_r getgroups poll sigwait sigpending sigprocmask pthread_mutex_lock pthread_mutex_unlock getmntent initgroups ether_ntoa ether_aton pthread_attr_getdetachstate pthread_attr_getguardsize pthread_attr_getschedparam pthread_attr_getschedpolicy pthread_attr_getscope pthread_attr_getstacksize pthread_attr_getstack pthread_mutexattr_getpshared pthread_mutexattr_gettype pthread_rwlockattr_getpshared pthread_condattr_getpshared tmpnam tempnam sincos sincosf sincosl remquo remquof remquol lgamma lgammaf lgammal lgamma_r lgammaf_r times llistxattr flistxattr lgetxattr fgetxattr getresuid getresgid ftime fopen fdopen freopen fflush fclose sem_init sem_destroy sem_wait sem_trywait sem_timedwait sem_post sem_getvalue pthread_setcancelstate pthread_setcanceltype mincore process_vm_readv process_vm_writev ctermid external/compiler-rt/lib/asan/asan_interceptors.cc ((__interception::real___cxa_throw)) != (0) memcpy memmove memset strchr strcat strncat strcpy strdup strlen wcslen strncpy strnlen strtol atoi atol strtoll atoll ((was_called_once == false)) != (0) AddressSanitizer: failed to intercept 'memmove' AddressSanitizer: failed to intercept 'memset' AddressSanitizer: failed to intercept 'memcpy' AddressSanitizer: failed to intercept 'strcat' AddressSanitizer: failed to intercept 'strchr' AddressSanitizer: failed to intercept 'strcpy' AddressSanitizer: failed to intercept 'strlen' AddressSanitizer: failed to intercept 'wcslen' AddressSanitizer: failed to intercept 'strncat' AddressSanitizer: failed to intercept 'strncpy' AddressSanitizer: failed to intercept 'strdup' AddressSanitizer: failed to intercept 'strnlen' AddressSanitizer: failed to intercept 'index' AddressSanitizer: failed to intercept 'atoi' AddressSanitizer: failed to intercept 'atol' AddressSanitizer: failed to intercept 'strtol' AddressSanitizer: failed to intercept 'atoll' AddressSanitizer: failed to intercept 'strtoll' AddressSanitizer: failed to intercept 'longjmp' sigaction AddressSanitizer: failed to intercept 'sigaction' bsd_signal AddressSanitizer: failed to intercept 'bsd_signal' AddressSanitizer: failed to intercept 'signal' _longjmp AddressSanitizer: failed to intercept '_longjmp' siglongjmp AddressSanitizer: failed to intercept 'siglongjmp' __cxa_throw AddressSanitizer: failed to intercept '__cxa_throw' pthread_create AddressSanitizer: failed to intercept 'pthread_create@@ASAN_PTHREAD_CREATE_VERSION' pthread_join AddressSanitizer: failed to intercept 'pthread_join' __cxa_atexit AddressSanitizer: failed to intercept '__cxa_atexit' fork AddressSanitizer: failed to intercept 'fork' AddressSanitizer: libc interceptors initialized external/compiler-rt/lib/sanitizer_common/sanitizer_common_interceptors_format.inc ((n_inputs)) > ((0)) ((*p)) == ((0)) WARNING: unexpected format specifier in scanf interceptor: %.*s jztLq cCsS[ CS cs[ diouxXn aAeEfFgG WARNING: unexpected floating-point arg size in printf interceptor: %d WARNING: unexpected format specifier in printf interceptor: %.*s WARNING: unexpected arg size in printf interceptor: %d '-+ #0 cCsS external/compiler-rt/lib/sanitizer_common/sanitizer_common_interceptors_ioctl.inc <DECODED_IOCTL> ((!h.created())) != (0) ((h->type == CommonInterceptorMetadata::CIMT_FILE)) != (0) external/compiler-rt/lib/sanitizer_common/sanitizer_addrhashmap.h ((!h->remove_)) != (0) ((atomic_load(&c->addr, memory_order_relaxed))) == ((0)) ((addr1)) == ((0)) ((addr1)) == ((h->addr_)) ((h.exists())) != (0) %s ignores mlock/mlockall/munlock/munlockall ((*endptr >= nptr)) != (0) AddressSanitizer: failed to intercept 'strcmp' AddressSanitizer: failed to intercept 'strncmp' AddressSanitizer: failed to intercept 'strcasecmp' AddressSanitizer: failed to intercept 'strncasecmp' AddressSanitizer: failed to intercept 'strstr' AddressSanitizer: failed to intercept 'strcasestr' AddressSanitizer: failed to intercept 'strspn' AddressSanitizer: failed to intercept 'strcspn' AddressSanitizer: failed to intercept 'strpbrk' AddressSanitizer: failed to intercept 'memchr' AddressSanitizer: failed to intercept 'memcmp' AddressSanitizer: failed to intercept 'memrchr' AddressSanitizer: failed to intercept 'read' AddressSanitizer: failed to intercept 'pread' AddressSanitizer: failed to intercept 'readv' AddressSanitizer: failed to intercept 'write' AddressSanitizer: failed to intercept 'pwrite' AddressSanitizer: failed to intercept 'writev' AddressSanitizer: failed to intercept 'prctl' AddressSanitizer: failed to intercept 'localtime' AddressSanitizer: failed to intercept 'localtime_r' AddressSanitizer: failed to intercept 'gmtime' AddressSanitizer: failed to intercept 'gmtime_r' AddressSanitizer: failed to intercept 'ctime' AddressSanitizer: failed to intercept 'ctime_r' AddressSanitizer: failed to intercept 'asctime' AddressSanitizer: failed to intercept 'asctime_r' AddressSanitizer: failed to intercept 'mktime' AddressSanitizer: failed to intercept 'strptime' AddressSanitizer: failed to intercept 'scanf' AddressSanitizer: failed to intercept 'sscanf' AddressSanitizer: failed to intercept 'fscanf' AddressSanitizer: failed to intercept 'vscanf' AddressSanitizer: failed to intercept 'vsscanf' AddressSanitizer: failed to intercept 'vfscanf' AddressSanitizer: failed to intercept 'printf' AddressSanitizer: failed to intercept 'sprintf' AddressSanitizer: failed to intercept 'snprintf' AddressSanitizer: failed to intercept 'asprintf' AddressSanitizer: failed to intercept 'fprintf' AddressSanitizer: failed to intercept 'vprintf' AddressSanitizer: failed to intercept 'vsprintf' AddressSanitizer: failed to intercept 'vsnprintf' AddressSanitizer: failed to intercept 'vasprintf' AddressSanitizer: failed to intercept 'vfprintf' AddressSanitizer: failed to intercept 'frexp' AddressSanitizer: failed to intercept 'frexpf' AddressSanitizer: failed to intercept 'frexpl' AddressSanitizer: failed to intercept 'getpwnam' AddressSanitizer: failed to intercept 'getpwuid' AddressSanitizer: failed to intercept 'getgrnam' AddressSanitizer: failed to intercept 'getgrgid' AddressSanitizer: failed to intercept 'clock_getres' AddressSanitizer: failed to intercept 'clock_gettime' AddressSanitizer: failed to intercept 'clock_settime' AddressSanitizer: failed to intercept 'getitimer' AddressSanitizer: failed to intercept 'setitimer' AddressSanitizer: failed to intercept 'time' AddressSanitizer: failed to intercept 'wait' AddressSanitizer: failed to intercept 'waitid' AddressSanitizer: failed to intercept 'waitpid' AddressSanitizer: failed to intercept 'wait3' AddressSanitizer: failed to intercept '__wait4' AddressSanitizer: failed to intercept 'inet_ntop' AddressSanitizer: failed to intercept 'inet_pton' AddressSanitizer: failed to intercept 'pthread_getschedparam' AddressSanitizer: failed to intercept 'getaddrinfo' AddressSanitizer: failed to intercept 'getnameinfo' AddressSanitizer: failed to intercept 'getsockname' AddressSanitizer: failed to intercept 'gethostent' AddressSanitizer: failed to intercept 'gethostbyaddr' AddressSanitizer: failed to intercept 'gethostbyname' AddressSanitizer: failed to intercept 'gethostbyname2' AddressSanitizer: failed to intercept 'gethostbyname_r' AddressSanitizer: failed to intercept 'getsockopt' AddressSanitizer: failed to intercept 'accept' AddressSanitizer: failed to intercept 'modf' AddressSanitizer: failed to intercept 'modff' AddressSanitizer: failed to intercept 'modfl' AddressSanitizer: failed to intercept 'recvmsg' AddressSanitizer: failed to intercept 'getpeername' AddressSanitizer: failed to intercept 'ioctl' AddressSanitizer: failed to intercept 'inet_aton' AddressSanitizer: failed to intercept 'sysinfo' AddressSanitizer: failed to intercept 'opendir' AddressSanitizer: failed to intercept 'readdir' AddressSanitizer: failed to intercept 'readdir_r' AddressSanitizer: failed to intercept 'setlocale' AddressSanitizer: failed to intercept 'getcwd' AddressSanitizer: failed to intercept 'strtoimax' AddressSanitizer: failed to intercept 'strtoumax' AddressSanitizer: failed to intercept 'mbstowcs' AddressSanitizer: failed to intercept 'mbsrtowcs' AddressSanitizer: failed to intercept 'wcstombs' AddressSanitizer: failed to intercept 'wcsrtombs' AddressSanitizer: failed to intercept 'realpath' AddressSanitizer: failed to intercept 'strerror' AddressSanitizer: failed to intercept 'strerror_r' AddressSanitizer: failed to intercept 'getgroups' AddressSanitizer: failed to intercept 'poll' AddressSanitizer: failed to intercept 'sigwait' AddressSanitizer: failed to intercept 'sigpending' AddressSanitizer: failed to intercept 'sigprocmask' AddressSanitizer: failed to intercept '_exit' AddressSanitizer: failed to intercept 'pthread_mutex_lock' AddressSanitizer: failed to intercept 'pthread_mutex_unlock' AddressSanitizer: failed to intercept 'getmntent' AddressSanitizer: failed to intercept 'initgroups' AddressSanitizer: failed to intercept 'ether_ntoa' AddressSanitizer: failed to intercept 'ether_aton' AddressSanitizer: failed to intercept 'pthread_attr_getdetachstate' AddressSanitizer: failed to intercept 'pthread_attr_getguardsize' AddressSanitizer: failed to intercept 'pthread_attr_getschedparam' AddressSanitizer: failed to intercept 'pthread_attr_getschedpolicy' AddressSanitizer: failed to intercept 'pthread_attr_getscope' AddressSanitizer: failed to intercept 'pthread_attr_getstacksize' AddressSanitizer: failed to intercept 'pthread_attr_getstack' AddressSanitizer: failed to intercept 'pthread_mutexattr_getpshared' AddressSanitizer: failed to intercept 'pthread_mutexattr_gettype' AddressSanitizer: failed to intercept 'pthread_rwlockattr_getpshared' AddressSanitizer: failed to intercept 'pthread_condattr_getpshared' AddressSanitizer: failed to intercept 'tmpnam' AddressSanitizer: failed to intercept 'tempnam' AddressSanitizer: failed to intercept 'sincos' AddressSanitizer: failed to intercept 'sincosf' AddressSanitizer: failed to intercept 'sincosl' AddressSanitizer: failed to intercept 'remquo' AddressSanitizer: failed to intercept 'remquof' AddressSanitizer: failed to intercept 'remquol' AddressSanitizer: failed to intercept 'lgamma' AddressSanitizer: failed to intercept 'lgammaf' AddressSanitizer: failed to intercept 'lgammal' AddressSanitizer: failed to intercept 'lgamma_r' AddressSanitizer: failed to intercept 'lgammaf_r' AddressSanitizer: failed to intercept 'times' AddressSanitizer: failed to intercept 'listxattr' AddressSanitizer: failed to intercept 'llistxattr' AddressSanitizer: failed to intercept 'flistxattr' AddressSanitizer: failed to intercept 'getxattr' AddressSanitizer: failed to intercept 'lgetxattr' AddressSanitizer: failed to intercept 'fgetxattr' AddressSanitizer: failed to intercept 'getresuid' AddressSanitizer: failed to intercept 'getresgid' AddressSanitizer: failed to intercept 'ftime' AddressSanitizer: failed to intercept 'fopen' AddressSanitizer: failed to intercept 'fdopen' AddressSanitizer: failed to intercept 'freopen' AddressSanitizer: failed to intercept 'fflush' AddressSanitizer: failed to intercept 'fclose' mlock AddressSanitizer: failed to intercept 'mlock' munlock AddressSanitizer: failed to intercept 'munlock' mlockall AddressSanitizer: failed to intercept 'mlockall' munlockall AddressSanitizer: failed to intercept 'munlockall' AddressSanitizer: failed to intercept 'sem_init' AddressSanitizer: failed to intercept 'sem_destroy' AddressSanitizer: failed to intercept 'sem_wait' AddressSanitizer: failed to intercept 'sem_trywait' AddressSanitizer: failed to intercept 'sem_timedwait' AddressSanitizer: failed to intercept 'sem_post' AddressSanitizer: failed to intercept 'sem_getvalue' AddressSanitizer: failed to intercept 'pthread_setcancelstate' AddressSanitizer: failed to intercept 'pthread_setcanceltype' AddressSanitizer: failed to intercept 'mincore' AddressSanitizer: failed to intercept 'process_vm_readv' AddressSanitizer: failed to intercept 'process_vm_writev' AddressSanitizer: failed to intercept 'ctermid' AddrHashMap Duplicate or unsorted ioctl request id %x >= %x (%s vs %s) ((ioctl_table_size < ioctl_table_max)) != (0) FIOASYNC FIOCLEX FIOGETOWN FIONBIO FIONCLEX FIOSETOWN SIOCADDMULTI SIOCATMARK SIOCDELMULTI SIOCGIFADDR SIOCGIFBRDADDR SIOCGIFCONF SIOCGIFDSTADDR SIOCGIFFLAGS SIOCGIFMETRIC SIOCGIFMTU SIOCGIFNETMASK SIOCGPGRP SIOCSIFADDR SIOCSIFBRDADDR SIOCSIFDSTADDR SIOCSIFFLAGS SIOCSIFMETRIC SIOCSIFMTU SIOCSIFNETMASK SIOCSPGRP TIOCCONS TIOCEXCL TIOCGETD TIOCGPGRP TIOCGWINSZ TIOCMBIC TIOCMBIS TIOCMGET TIOCMSET TIOCNOTTY TIOCNXCL TIOCOUTQ TIOCPKT TIOCSCTTY TIOCSETD TIOCSPGRP TIOCSTI TIOCSWINSZ BLKFLSBUF BLKGETSIZE BLKRAGET BLKRASET BLKROGET BLKROSET BLKRRPART CDROMEJECT CDROMEJECT_SW CDROMMULTISESSION CDROMPAUSE CDROMPLAYMSF CDROMPLAYTRKIND CDROMREADAUDIO CDROMREADCOOKED CDROMREADMODE1 CDROMREADMODE2 CDROMREADRAW CDROMREADTOCENTRY CDROMREADTOCHDR CDROMRESET CDROMRESUME CDROMSEEK CDROMSTART CDROMSTOP CDROMSUBCHNL CDROMVOLCTRL CDROMVOLREAD CDROM_GET_UPC EVIOCGABS EVIOCGBIT EVIOCGEFFECTS EVIOCGID EVIOCGKEY EVIOCGKEYCODE EVIOCGLED EVIOCGNAME EVIOCGPHYS EVIOCGRAB EVIOCGREP EVIOCGSND EVIOCGSW EVIOCGUNIQ EVIOCGVERSION EVIOCRMFF EVIOCSABS EVIOCSFF EVIOCSKEYCODE EVIOCSREP FDCLRPRM FDDEFPRM FDFLUSH FDFMTBEG FDFMTEND FDFMTTRK FDGETDRVPRM FDGETDRVSTAT FDGETDRVTYP FDGETFDCSTAT FDGETMAXERRS FDGETPRM FDMSGOFF FDMSGON FDPOLLDRVSTAT FDRAWCMD FDRESET FDSETDRVPRM FDSETEMSGTRESH FDSETMAXERRS FDSETPRM FDTWADDLE FDWERRORCLR FDWERRORGET HDIO_DRIVE_CMD HDIO_GETGEO HDIO_GET_32BIT HDIO_GET_DMA HDIO_GET_IDENTITY HDIO_GET_KEEPSETTINGS HDIO_GET_MULTCOUNT HDIO_GET_NOWERR HDIO_GET_UNMASKINTR HDIO_SET_32BIT HDIO_SET_DMA HDIO_SET_KEEPSETTINGS HDIO_SET_MULTCOUNT HDIO_SET_NOWERR HDIO_SET_UNMASKINTR MTIOCGET MTIOCPOS MTIOCTOP PPPIOCGASYNCMAP PPPIOCGDEBUG PPPIOCGFLAGS PPPIOCGUNIT PPPIOCGXASYNCMAP PPPIOCSASYNCMAP PPPIOCSDEBUG PPPIOCSFLAGS PPPIOCSMAXCID PPPIOCSMRU PPPIOCSXASYNCMAP SIOCADDRT SIOCDARP SIOCDELRT SIOCDRARP SIOCGARP SIOCGIFENCAP SIOCGIFHWADDR SIOCGIFMAP SIOCGIFMEM SIOCGIFNAME SIOCGIFSLAVE SIOCGRARP SIOCGSTAMP SIOCSARP SIOCSIFENCAP SIOCSIFHWADDR SIOCSIFLINK SIOCSIFMAP SIOCSIFMEM SIOCSIFSLAVE SIOCSRARP SNDCTL_COPR_HALT SNDCTL_COPR_LOAD SNDCTL_COPR_RCODE SNDCTL_COPR_RCVMSG SNDCTL_COPR_RDATA SNDCTL_COPR_RESET SNDCTL_COPR_RUN SNDCTL_COPR_SENDMSG SNDCTL_COPR_WCODE SNDCTL_COPR_WDATA SNDCTL_DSP_GETBLKSIZE SNDCTL_DSP_GETFMTS SNDCTL_DSP_NONBLOCK SNDCTL_DSP_POST SNDCTL_DSP_RESET SNDCTL_DSP_SETFMT SNDCTL_DSP_SETFRAGMENT SNDCTL_DSP_SPEED SNDCTL_DSP_STEREO SNDCTL_DSP_SUBDIVIDE SNDCTL_DSP_SYNC SNDCTL_FM_4OP_ENABLE SNDCTL_FM_LOAD_INSTR SNDCTL_MIDI_INFO SNDCTL_MIDI_PRETIME SNDCTL_SEQ_CTRLRATE SNDCTL_SEQ_GETINCOUNT SNDCTL_SEQ_GETOUTCOUNT SNDCTL_SEQ_NRMIDIS SNDCTL_SEQ_NRSYNTHS SNDCTL_SEQ_OUTOFBAND SNDCTL_SEQ_PANIC SNDCTL_SEQ_PERCMODE SNDCTL_SEQ_RESET SNDCTL_SEQ_RESETSAMPLES SNDCTL_SEQ_SYNC SNDCTL_SEQ_TESTMIDI SNDCTL_SEQ_THRESHOLD SNDCTL_SYNTH_INFO SNDCTL_SYNTH_MEMAVL SNDCTL_TMR_METRONOME SNDCTL_TMR_SELECT SNDCTL_TMR_SOURCE SNDCTL_TMR_TEMPO SNDCTL_TMR_TIMEBASE SOUND_MIXER_READ_ALTPCM SOUND_MIXER_READ_BASS SOUND_MIXER_READ_CAPS SOUND_MIXER_READ_CD SOUND_MIXER_READ_DEVMASK SOUND_MIXER_READ_ENHANCE SOUND_MIXER_READ_IGAIN SOUND_MIXER_READ_IMIX SOUND_MIXER_READ_LINE SOUND_MIXER_READ_LINE1 SOUND_MIXER_READ_LINE2 SOUND_MIXER_READ_LINE3 SOUND_MIXER_READ_MIC SOUND_MIXER_READ_OGAIN SOUND_MIXER_READ_PCM SOUND_MIXER_READ_RECLEV SOUND_MIXER_READ_RECMASK SOUND_MIXER_READ_RECSRC SOUND_MIXER_READ_SPEAKER SOUND_MIXER_READ_STEREODEVS SOUND_MIXER_READ_SYNTH SOUND_MIXER_READ_TREBLE SOUND_MIXER_READ_VOLUME SOUND_MIXER_WRITE_ALTPCM SOUND_MIXER_WRITE_BASS SOUND_MIXER_WRITE_CD SOUND_MIXER_WRITE_ENHANCE SOUND_MIXER_WRITE_IGAIN SOUND_MIXER_WRITE_IMIX SOUND_MIXER_WRITE_LINE SOUND_MIXER_WRITE_LINE1 SOUND_MIXER_WRITE_LINE2 SOUND_MIXER_WRITE_LINE3 SOUND_MIXER_WRITE_MIC SOUND_MIXER_WRITE_OGAIN SOUND_MIXER_WRITE_PCM SOUND_MIXER_WRITE_RECLEV SOUND_MIXER_WRITE_RECSRC SOUND_MIXER_WRITE_SPEAKER SOUND_MIXER_WRITE_SYNTH SOUND_MIXER_WRITE_TREBLE SOUND_MIXER_WRITE_VOLUME SOUND_PCM_READ_BITS SOUND_PCM_READ_CHANNELS SOUND_PCM_READ_FILTER SOUND_PCM_READ_RATE SOUND_PCM_WRITE_CHANNELS SOUND_PCM_WRITE_FILTER TCFLSH TCGETA TCGETS TCSBRK TCSBRKP TCSETA TCSETAF TCSETAW TCSETS TCSETSF TCSETSW TCXONC TIOCGLCKTRMIOS TIOCGSOFTCAR TIOCINQ TIOCLINUX TIOCSERCONFIG TIOCSERGETLSR TIOCSERGWILD TIOCSERSWILD TIOCSLCKTRMIOS TIOCSSOFTCAR VT_ACTIVATE VT_DISALLOCATE VT_GETMODE VT_GETSTATE VT_OPENQRY VT_RELDISP VT_RESIZE VT_RESIZEX VT_SENDSIG VT_SETMODE VT_WAITACTIVE external/compiler-rt/lib/asan/asan_malloc_linux.cc ((allocated < kCallocPoolSize)) != (0) __libc_malloc_dispatch __libc_malloc_default_dispatch external/compiler-rt/lib/asan/asan_poisoning.cc ((AddrIsAlignedByGranularity(addr))) != (0) ((AddrIsInMem(addr))) != (0) ((AddrIsAlignedByGranularity(addr + size))) != (0) ((AddrIsInMem(addr + size - (1ULL << kDefaultShadowScale)))) != (0) ((__interception::real_memset)) != (0) __asan_%spoison_intra_object_redzone [%p,%p) %zd un ((size)) <= ((4096)) ((IsAligned(end, (1ULL << kDefaultShadowScale)))) != (0) Trying to poison memory region [%p, %p) ((beg.offset < end.offset)) != (0) ((value == end.value)) != (0) ((beg.chunk < end.chunk)) != (0) Trying to unpoison memory region [%p, %p) ((beg)) < ((end)) ((0 && "mem_is_zero returned false, but poisoned byte was not found")) != (0) unpoisoning: %p %zx contiguous_container: %p %p %p %p ((end - beg)) <= (( (1UL << 30))) ((*(u8*)MemToShadow(a))) == ((0)) ((b2 - b1)) == ((granularity)) ((beg)) <= ((mid)) ((mid)) <= ((end)) ASAN:DEADLYSIGNAL FPE ILL external/compiler-rt/lib/asan/asan_posix.cc ((!tsd_key_inited)) != (0) ((0)) == ((pthread_key_create(&tsd_key, destructor))) ((tsd_key_inited)) != (0) ((0)) == ((pthread_setspecific(tsd_key, tsd))) X pX pX pX X X X X Y X X Y Y @^ @^ @^ @^ ^ ^ ^ _ ^ ^ ^ ^ ^ $_ ` ` ` ` da xa <a a a Pa Pa <a a a AppendToErrorMessageBuffer kErrorMessageBufferSize >= error_message_buffer_pos First 16 instruction bytes at pc: unaccessible high shadow low shadow Address %p is located in the %s area. external/compiler-rt/lib/asan/asan_report.cc ((descr)) != (0) ((0 && "Address is not in memory and not in shadow?")) != (0) ( ((frame_descr)) != (0) Address %p is located in stack of thread T%d%s at offset %zu in frame%s AddressSanitizer can't parse the stack frame descriptor: |%s| This frame has %zu object(s): HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) AddressSanitizer can not describe address in more detail (wild memory access suspected). ((chunk.AllocTid() != kInvalidTid)) != (0) %sfreed by thread T%d%s here:%s %spreviously allocated by thread T%d%s here:%s %sallocated by thread T%d%s here:%s ((context)) != (0) Thread T%d%s created by unknown thread created by T%d%s here: ERROR: AddressSanitizer: stack-overflow on address %p (pc %p bp %p sp %p T%d) stack-overflow ERROR: AddressSanitizer: %s on unknown address %p (pc %p bp %p sp %p T%d) Hint: pc points to the zero page. AddressSanitizer can not provide additional info. ERROR: AddressSanitizer: attempting double-free on %p in thread T%d%s: ((free_stack->size)) > ((0)) double-free ERROR: AddressSanitizer: new-delete-type-mismatch on %p in thread T%d%s: %s object passed to delete has wrong type: size of the allocated type: %zd bytes; size of the deallocated type: %zd bytes. new-delete-type-mismatch HINT: if you don't care about these errors you may set ASAN_OPTIONS=new_delete_type_mismatch=0 ERROR: AddressSanitizer: attempting free on address which was not malloc()-ed: %p in thread T%d%s bad-free INVALID operator new operator new [] operator delete operator delete [] ((alloc_type)) != ((dealloc_type)) ERROR: AddressSanitizer: alloc-dealloc-mismatch (%s vs %s) on %p alloc-dealloc-mismatch HINT: if you don't care about these errors you may set ASAN_OPTIONS=alloc_dealloc_mismatch=0 ERROR: AddressSanitizer: attempting to call malloc_usable_size() for pointer which is not owned: %p bad-malloc_usable_size ERROR: AddressSanitizer: attempting to call __sanitizer_get_allocated_size() for pointer which is not owned: %p bad-__sanitizer_get_allocated_size %s-param-overlap ERROR: AddressSanitizer: %s: memory ranges [%p,%p) and [%p, %p) overlap negative-size-param ERROR: AddressSanitizer: %s: (size=%zd) ERROR: AddressSanitizer: bad parameters to __sanitizer_annotate_contiguous_container: beg : %p end : %p old_mid : %p new_mid : %p ERROR: beg is not aligned by %d bad-__sanitizer_annotate_contiguous_container ERROR: AddressSanitizer: odr-violation (%p): [1] size=%zd '%s' %s [2] size=%zd '%s' %s These globals were registered at these points: [1]: [2]: HINT: if you don't care about these errors you may set ASAN_OPTIONS=detect_odr_violation=0 odr-violation: global '%s' at %s mz_realloc(%p) -- attempting to realloc unallocated memory. This is an unrecoverable problem, exiting now. unknown-crash heap-buffer-overflow heap-use-after-free stack-buffer-underflow initialization-order-fiasco stack-use-after-return use-after-poison container-overflow stack-use-after-scope global-buffer-overflow intra-object-overflow dynamic-stack-buffer-overflow ERROR: AddressSanitizer: %s on address %p at pc %p bp %p sp %p %s%s of size %zu at %p thread T%d%s%s WRITE ACCESS %s%s%x%x%s%s [1m [31m [1m [35m [1m [36m [1m [34m [1m [33m [1m [0m [1m [32m is inside partially overflows partially underflows [%zd, %zd) %c %s <== Memory access at offset %zd %s this variable%s %p is located %zd bytes to the left of %p is located %zd bytes to the right of %p is located %zd bytes inside of %p is located somewhere around (this is AddressSanitizer bug!) %zu-byte region [%p,%p) AddressSanitizer: while reporting a bug found another one. Ignoring. ================================================================= ABORTING registered at: %p is located %zd bytes to the left %p is located %zd bytes to the right %p is located %zd bytes inside of global variable '%s' defined in ' ' (0x%zx) of size %zu '%s' is ascii string '%s' :%d ((res)) != (0) malloc_zone_from_ptr(%p) = %p, which is %s malloc_zone_from_ptr(%p) = %p, which doesn't have a name malloc_zone_from_ptr(%p) = 0 Shadow bytes around the buggy address: => %s%p: Shadow byte legend (one shadow byte represents %d application bytes): Addressable: Partially addressable: Heap left redzone: Heap right redzone: Freed heap region: Stack left redzone: Stack mid redzone: Stack right redzone: Stack partial redzone: Stack after return: Stack use after scope: Global redzone: Global init order: Poisoned by user: Container overflow: Array cookie: Intra object redzone: ASan internal: Left alloca redzone: Right alloca redzone: invalid-pointer-pair ERROR: AddressSanitizer: invalid-pointer-pair: %p %p AddressSanitizer: nested bug in the same thread, aborting. < T l 0 H d , H d $ 8 P l external/compiler-rt/lib/asan/asan_rtl.cc (((beg % GetPageSizeCached()))) == ((0)) ((((end + 1) % GetPageSizeCached()))) == ((0)) ReserveShadowMemoryRange failed while trying to map 0x%zx bytes. Perhaps you're using ulimit -v WARNING: ASan is ignoring requested __asan_handle_no_return: stack top: %p; bottom %p; size: %p (%zd) False positive error reports may follow For details see https://github.com/google/sanitizers/issues/189 AddressSanitizer ((!asan_init_is_running && "ASan init calls itself!")) != (0) ((((kMidMemBeg ? (((kMidMemBeg) >> kDefaultShadowScale) + ((0))) : (((((((kHighMemEnd) >> kDefaultShadowScale) + ((0))) + 1)) >> kDefaultShadowScale) + ((0)))) - 1))) == (((((((((kHighMemEnd) >> kDefaultShadowScale) + ((0))) + 1)) >> kDefaultShadowScale) + ((0))) - 1)) (((0) != (((((0) ? (0) - 1 : 0)) >> kDefaultShadowScale) + ((0))))) != (0) Shadow memory range interleaves with an existing memory mapping. ASan cannot proceed correctly. ABORTING. ASan shadow was supposed to be located in the [%p-%p] range. ((0)) == ((main_thread->tid())) AddressSanitizer Init done (((((((kHighMemEnd) >> kDefaultShadowScale) + ((0))) + 1) % GetPageSizeCached()))) == ((0)) Sleeping for %d second(s) AddressSanitizer CHECK failed: %s:%d "%s" (0x%zx, 0x%zx) || `[%p, %p]` || HighMem || || `[%p, %p]` || HighShadow || || `[%p, %p]` || ShadowGap3 || || `[%p, %p]` || MidMem || || `[%p, %p]` || ShadowGap2 || || `[%p, %p]` || MidShadow || || `[%p, %p]` || ShadowGap || MemToShadow(shadow): %p %p %p %p max_redzone=%zu quarantine_size_mb=%zuM malloc_context_size=%zu SHADOW_SCALE: %d SHADOW_GRANULARITY: %d SHADOW_OFFSET: 0x%zx (((((kMidMemBeg) >> kDefaultShadowScale) + ((0))) > (((((0) ? (0) - 1 : 0)) >> kDefaultShadowScale) + ((0))) && kMidMemBeg > (((kMidMemEnd) >> kDefaultShadowScale) + ((0))) && (((((((kHighMemEnd) >> kDefaultShadowScale) + ((0))) + 1)) >> kDefaultShadowScale) + ((0))) > kMidMemEnd)) != (0) ERROR: Failed to protect the shadow gap. ASan cannot proceed correctly. ABORTING. AddressSanitizer exit stats: asan_mapping.h:%zd -- %zd external/compiler-rt/lib/asan/asan_stats.cc Stats: %zuM malloced (%zuM for red zones) by %zu calls Stats: %zuM realloced by %zu calls Stats: %zuM freed by %zu calls Stats: %zuM really freed by %zu calls Stats: %zuM (%zuM-%zuM) mmaped; %zu maps, %zu unmaps mallocs by size class: Stats: malloc large: %zu %zu:%zu; Stats: StackDepot: %zd ids; %zdM allocated external/compiler-rt/lib/asan/asan_suppressions.cc ((nullptr)) == ((suppression_ctx)) ((suppression_ctx)) != (0) interceptor_name interceptor_via_fun interceptor_via_lib odr_violation Create T%d TSDDtor T%d exited external/compiler-rt/lib/asan/asan_thread.cc ((flags()->min_uar_stack_size_log)) <= ((flags()->max_uar_stack_size_log)) ((this->stack_size())) == ((0U)) ((this->stack_size())) > ((0U)) ((AddrIsInMem(stack_bottom_))) != (0) ((AddrIsInMem(stack_top_ - 1))) != (0) T%d: stack [%p,%p) size 0x%zx; local=%p ((tid())) == ((0)) ((AddrIsInStack((uptr)&local))) != (0) ((bottom)) != (0) ((ptr[0] == kCurrentStackFrameMagic)) != (0) ((t->context())) != (0) SetCurrentThread: %p for thread %p ((0)) == ((AsanTSDGet())) ((t->context())) == ((AsanTSDGet())) ((IsPowerOfTwo(x))) != (0) external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_allocator.cc ((kBlockMagic)) == ((((u64*)addr)[0])) Allocate ((allocated_end_ - allocated_current_ >= (sptr)size)) != (0) %s's allocator is terminating the process instead of returning 0 If you don't like this behavior set allocator_may_return_null=1 ((0)) != (0) external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_allocator.h external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common.h SanitizerTool %s.%s.%zu ERROR: Can't open file: ERROR: Path is too long: %c%c%c%c%c%c%c%c... stdout stderr Sanitizer CHECK failed: %s:%d %s (%lld, %lld) ERROR: Failed to mmap ERROR: %s failed to %s 0x%zx (%zd) bytes of %s (error code: %d) external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common.cc ((0 && "unable to mmap")) != (0) ReadFileToBuffer ((IsPowerOfTwo(size))) != (0) SUMMARY: %s: %s %s %L %F ((s)) >= ((z)) (total_mmaped >> 20) < common_flags()->mmap_limit_mb external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_mutex.h always auto external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_libcdep.cc ((SoftRssLimitExceededCallback)) == ((nullptr)) %s: RSS: %zdMb %s: StackDepot: %zd ids; %zdM allocated %s: hard rss limit exhausted (%zdMb vs %zdMb) %s: soft rss limit exhausted (%zdMb vs %zdMb) %s/%zd.sancov.raw Coverage: failed to open %s for reading/writing CovInit CovInit::cc_array CovInit::tr_event_array external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_coverage_libcdep.cc ((atomic_load(&pc_array_index, memory_order_relaxed))) == ((0)) ((pc_fd)) != ((kInvalidFd)) ((new_mapped_size)) <= ((sizeof(uptr) * kPcArrayMaxSize)) failed to extend raw coverage file: %d (((uptr)p)) == ((next_map_base)) ((reinterpret_cast<uptr>(counters) % 16)) == ((0)) ((n)) < ((1 << 30)) ((idx * sizeof(uptr))) < (( atomic_load(&pc_array_size, memory_order_acquire))) ((idx * sizeof(uptr))) < (( atomic_load(&cc_array_size, memory_order_acquire))) ((atomic_load(&atomic_callee_cache[0], memory_order_relaxed))) == ((caller)) ((reinterpret_cast<uptr>(bitset) % kBatchSize)) == ((0)) ((n % 16)) == ((0)) ((cur % kBatchSize)) == ((0)) ((reinterpret_cast<uptr>(c) % kBatchSize)) == ((0)) ((cur)) < ((num_8bit_counters)) ((cur)) == ((num_8bit_counters)) <unknown> trace-points trace-compunits trace-events CovDump: Trace: %zd PCs written CovDump: Trace: %zd Events written ((cc_cache)) != (0) %s 0x%zx %s 0x%zx caller-callee CovDump: %zd caller-callee pairs written ((r.copied_module_name)) != (0) ((r.beg)) <= ((r.end)) ((r.end)) <= ((size())) counters-sancov CovDump: %zd counters written for '%s' bitset-sancov CovDump: bitset of %zd bits written for '%s', %zd bits are set ((sym)) != ((nullptr)) ((offsets.size())) >= ((num_words_for_magic)) ((*magic_p)) == ((0ULL)) CovDump: %zd PCs written to packed file CovDump: %s: %zd PCs written ((name)) != (0) %s/%s.%zd.%s %s/%zd.%s.packed %s/%s.%s.packed SanitizerCoverage: failed to open %s for writing (reason: %d) ((header_size_with_module)) < ((cov_max_block_size)) external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_coverage_mapping_libcdep.cc ((modules.data())) != (0) %zx %zx %zx %s %s/%zd.sancov.map.tmp ((res)) <= ((tmp_path.size())) Coverage: failed to open %s for writing: %d sancov.map write failed: %d %s/%zd.sancov.map ((res)) <= ((path.size())) sancov.map rename failed: %d DEFAULT include read more options from the given file include_if_exists read more options from the given file (if it exists) symbolize If set, use the online symbolizer from common sanitizer runtime to turn virtual addresses to file/line locations. external_symbolizer_path Path to external symbolizer. If empty, the tool will search $PATH for the symbolizer. allow_addr2line If set, allows online symbolizer to run addr2line binary to symbolize stack traces (addr2line will only be used if llvm-symbolizer binary is unavailable. strip_path_prefix Strips this prefix from file paths in error reports. fast_unwind_on_check If available, use the fast frame-pointer-based unwinder on internal CHECK failures. fast_unwind_on_fatal If available, use the fast frame-pointer-based unwinder on fatal errors. fast_unwind_on_malloc If available, use the fast frame-pointer-based unwinder on malloc/free. handle_ioctl Intercept and handle ioctl requests. Max number of stack frames kept for each allocation/deallocation. log_path Write logs to "log_path.pid". The special values are "stdout" and "stderr". The default is "stderr". log_exe_name Mention name of executable when reporting error and append executable name to logs (as in "log_path.exe_name.pid"). log_to_syslog Write all sanitizer output to syslog in addition to other means of logging. Verbosity level (0 - silent, 1 - a bit of output, 2+ - more output). detect_leaks Enable memory leak detection. leak_check_at_exit Invoke leak checking in an atexit handler. Has no effect if detect_leaks=false, or if __lsan_do_leak_check() is called before the handler has a chance to run. If false, the allocator will crash instead of returning 0 on out-of-memory. print_summary If false, disable printing error summaries in addition to error reports. check_printf Check printf arguments. handle_segv If set, registers the tool's custom SIGSEGV/SIGBUS handler. handle_abort If set, registers the tool's custom SIGABRT handler. handle_sigill If set, registers the tool's custom SIGILL handler. handle_sigfpe If set, registers the tool's custom SIGFPE handler. allow_user_segv_handler If set, allows user to register a SEGV handler even if the tool registers one. use_sigaltstack If set, uses alternate stack for signal handling. detect_deadlocks If set, deadlock detection is enabled. clear_shadow_mmap_threshold Large shadow regions are zero-filled using mmap(NORESERVE) instead of memset(). This is the threshold size in bytes. color Colorize reports: (always|never|auto). legacy_pthread_cond Enables support for dynamic libraries linked with libpthread 2.2.5. intercept_tls_get_addr Intercept __tls_get_addr. Print the flag descriptions. Limit the amount of mmap-ed memory (excluding shadow) in Mb; not a user-facing flag, used mosly for testing the tools hard_rss_limit_mb Hard RSS limit in Mb. If non-zero, a background thread is spawned at startup which periodically reads RSS and aborts the process if the limit is reached soft_rss_limit_mb Soft RSS limit in Mb. If non-zero, a background thread is spawned at startup which periodically reads RSS. If the limit is reached all subsequent malloc/new calls will fail or return NULL (depending on the value of allocator_may_return_null) until the RSS goes below the soft limit. This limit does not affect memory allocations other than malloc/new. can_use_proc_maps_statm If false, do not attempt to read /proc/maps/statm. Mostly useful for testing sanitizers. If set, coverage information will be dumped at program shutdown (if the coverage instrumentation was enabled at compile time). coverage_pcs If set (and if 'coverage' is set too), the coverage information will be dumped as a set of PC offsets for every module. coverage_order_pcs If true, the PCs will be dumped in the order they've appeared during the execution. coverage_bitset If set (and if 'coverage' is set too), the coverage information will also be dumped as a bitset to a separate file. coverage_counters If set (and if 'coverage' is set too), the bitmap that corresponds to coverage counters will be dumped. coverage_direct If set, coverage information will be dumped directly to a memory mapped file. This way data is not lost even if the process is suddenly killed. Target directory for coverage dumps. Defaults to the current directory. full_address_space Sanitize complete address space; by default kernel area on 32-bit platforms will not be sanitized print_suppressions Print matched suppressions at exit. disable_coredump Disable core dumping. By default, disable_core=1 on 64-bit to avoid dumping a 16T+ core file. Ignored on OSes that don't dump core bydefault and for sanitizers that don't reserve lots of virtual memory. use_madv_dontdump If set, instructs kernel to not store the (huge) shadow in core file. symbolize_inline_frames Print inlined frames in stacktraces. Defaults to true. symbolize_vs_style Print file locations in Visual Studio style (e.g: file(10,42): ... stack_trace_format Format string used to render stack frames. See sanitizer_stacktrace_printer.h for the format description. Use DEFAULT to get default format. no_huge_pages_for_shadow If true, the shadow is not allowed to use huge pages. strict_string_checks If set check that string arguments are properly null-terminated intercept_strstr If set, uses custom wrappers for strstr and strcasestr functions to find more errors. intercept_strspn If set, uses custom wrappers for strspn and strcspn function to find more errors. intercept_strpbrk If set, uses custom wrappers for strpbrk function to find more errors. intercept_memcmp If set, uses custom wrappers for memcmp function to find more errors. strict_memcmp If true, assume that memcmp(p1, p2, n) always reads n bytes before comparing p1 and p2. decorate_proc_maps If set, decorate sanitizer mappings in /proc/self/maps with user-readable names exitcode Override the program exit status if the tool found an error abort_on_error If set, the tool calls abort() instead of _exit() after printing the error report. suppress_equal_pcs Deduplicate multiple reports for single source location in halt_on_error=false mode (asan only). FlagHandlerInclude external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_flags.cc ((base)) != (0) ERROR: Invalid value for uptr option: '%s' Available flags for %s: %s - %s ERROR: %s expected '=' unterminated string Flag parsing failed. Failed to read options from '%s': error %d external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_flag_parser.cc ((n_flags_)) < ((kMaxFlags)) WARNING: found %d unrecognized flag(s): %s ((n_unknown_flags_)) < ((kMaxUnknownFlags)) external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_libc.cc (((reinterpret_cast<uptr>(s) | n) & 15)) == ((0)) ((base)) == ((10)) ((size)) <= ((1ULL << (30))) external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_linux.cc ((IsAligned(offset, 4096))) != (0) /proc/self/environ /proc/self/exe ((internal_iserror(rv, &rverrno))) == ((true)) execve failed, errno %d ((owner_)) == ((0)) ((v)) != ((MtxUnlocked)) ((MtxUnlocked)) != ((atomic_load(m, memory_order_relaxed))) ((signum)) < ((sizeof(*set) * 8)) /proc/%d/task/ Can't open /proc/%d/task for reading. ((error_)) != ((true)) Can't read directory entries from /proc/%d/task. WARNING: reading executable name failed with errno %d, some stack frames may not be symbolized ((module_name_len)) < ((buf_len)) /proc/self/cmdline ((0)) == (((uptr)child_stack % 16)) NullSepFileArray ((count)) <= ((arr_size - 1)) external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_linux_libcdep.cc ((stack_top)) != (0) ((stack_bottom)) != (0) ((getrlimit(3, &rl))) == ((0)) (((uptr)&rl >= start && (uptr)&rl < end)) != (0) ((pthread_getattr_np(pthread_self(), &attr))) == ((0)) ((stacksize)) <= ((kMaxThreadStackSize)) setenv ((*tls_addr + *tls_size)) > ((*stk_addr)) ((*tls_addr + *tls_size)) <= ((*stk_addr + *stk_size)) ((modules)) != (0) /proc/self/statm external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_posix.cc ((reinterpret_cast<uptr>(&res))) < ((res)) allocate ERROR: %s failed to deallocate 0x%zx (%zd) bytes at address %p (("unable to unmap" && 0)) != (0) allocate noreserve memory at address 0x%zx ((fd != kInvalidFd)) != (0) ((fsize)) != (((uptr)-1)) ((fsize)) > ((0)) could not map writable file (%d, %lld, %zu): %zd, errno: %d ((0)) != ((end)) void __sanitizer::DumpProcessMap() Process memory map follows: %p-%p %s End of process memory map. PWD ReportFile::Write() can't output requested buffer! ((start1 <= end1)) != (0) ((start2 <= end2)) != (0) external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_posix_libcdep.cc ((!StackSizeIsUnlimited())) != (0) ((AddressSpaceIsUnlimited())) != (0) ((0)) == ((sigaltstack(nullptr, &oldstack))) void __sanitizer::SetAlternateSignalStack() ((0)) == ((sigaltstack(&altstack, nullptr))) ((0)) == ((sigaltstack(&altstack, &oldstack))) ((size)) < ((page_size * 10)) ((14)) == ((write_errno)) ERROR: %s failed to allocate 0x%zx (%zd) bytes at address %zx (errno: %d) Sanitizer: increasing stacksize %zu->%zu Sanitizer: pre-allocated stack size is insufficient: %zu < %zu Sanitizer: pthread_create is likely to fail. ERROR: %s setrlimit() failed %d ((0)) == ((getrlimit(res, &rlim))) ((0)) == ((internal_sigaction(signum, &sigact, nullptr))) Installed the sigaction for signal %d d Supported Printf formats: %([0-9]*)?(z|ll)?{d,u,x}; %p; %(\.\*)?s; %c buff_length > 0 external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_printf.cc ((!(precision >= 0 && *cur != 's'))) != (0) buff <= buff_end ((length_)) < ((size())) base == 10 || base == 16 base == 10 || !negative absolute_value || !negative minimal_num_length < kMaxLen AppendNumber buffer overflow pos > 0 <null> Report ==%s Buffer in Report is too short! ==%d== external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_procmaps_common.cc ((proc_self_maps_.len)) > ((0)) ((proc_self_maps_.mmaped_size)) > ((0)) /proc/self/smaps Rss: /proc/self/maps external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_procmaps_linux.cc ((ReadFileToBuffer("/proc/self/maps", &proc_maps->data, &proc_maps->mmaped_size, &proc_maps->len))) != (0) ((*current_++)) == (('-')) ((*current_++)) == ((' ')) ((IsOneOf(*current_, '-', 'r'))) != (0) ((IsOneOf(*current_, '-', 'w'))) != (0) ((IsOneOf(*current_, '-', 'x'))) != (0) ((IsOneOf(*current_, 's', 'p'))) != (0) ((*current_++)) == ((':')) external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_stackdepot.cc ((prev + 1)) < ((StackDepotNode::kMaxUseCount)) external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_stackdepotbase.h ((id)) < ((kMaxId)) ((id)) != ((0)) ((id & (((u32)-1) >> kReservedBits))) == ((id)) stack depot ((idx)) < ((kTabSize)) external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_stacktrace.cc ((size)) <= ((kStackTraceMax)) ((max_depth)) >= ((2)) ((count)) < ((size)) <empty stack> external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_stacktrace_libcdep.cc ((frames)) != (0) \ L #%n %p %F %L %% in %s +0x%zx (<unknown module>) (%s+%p) (%p) Unsupported specifier in stack frame format: %c (0x%zx)! %s(%d ,%d (%s+0x%zx) external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_suppressions.cc ((suppression_types_num_)) <= ((kMaxSuppressionTypes)) %s: reading suppressions file at %s %s: failed to read suppressions file '%s' ((can_parse_)) != (0) %s: failed to parse suppressions ((i)) < ((suppressions_.size())) external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_symbolizer.cc ((start_hook_ == 0 && end_hook_ == 0)) != (0) external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_symbolizer_libcdep.cc ((n_modules_)) > ((0)) ((n_modules_)) < ((kMaxNumberOfModules)) ((symbolizer_)) != (0) ((function_name)) != (0) ?? %s"%s" 0x%zx DATA ((path_)) != (0) ((path_[0])) != (('\0')) WARNING: Failed to use and restart external symbolizer! WARNING: Can't read from symbolizer at fd %d WARNING: Can't write to symbolizer at fd %d external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_symbolizer_internal.h ((0 && "unimplemented")) != (0) --default-arch=unknown --inlining=true --inlining=false ((file_line_info)) != (0) ((last_colon)) != (0) WARNING: invalid path to external symbolizer! external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_symbolizer_posix_libcdep.cc WARNING: Can't create a socket pair to start external symbolizer (errno: %d) ((infd)) != (0) ((outfd)) != (0) WARNING: failed to fork external symbolizer (errno: %d) WARNING: external symbolizer didn't start up correctly! Symbolizer is disabled. Using internal symbolizer. Using libbacktrace symbolizer. External symbolizer is explicitly disabled. llvm-symbolizer Using llvm-symbolizer at user-specified path: %s atos ERROR: Using `atos` is only supported on Darwin. Using addr2line at user-specified path: %s ERROR: External symbolizer path is set to '%s' which isn't a known symbolizer. Please set the path to the llvm-symbolizer binary or other known tool. Using llvm-symbolizer found at: %s Using addr2line found at: %s ((0)) == ((internal_strcmp(module_name, addr2line->module_name()))) 0x%zx 0x%zx -iCfe ((garbage)) != (0) ?? ??:0 external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_thread_registry.cc ((status == ThreadStatusRunning || status == ThreadStatusFinished)) != (0) ((false)) == ((detached)) ((ThreadStatusFinished)) == ((status)) ThreadRegistry %s: Thread limit (%u threads) exceeded. Dying. ((tctx)) != ((0)) ((tid)) != ((kUnknownTid)) ((tid)) < ((max_threads_)) ((tctx->status)) == ((ThreadStatusInvalid)) ((alive_threads_)) == ((max_alive_threads_)) ((tid)) < ((n_contexts_)) ((ThreadStatusRunning)) == ((tctx->status)) %s: Detach of non-existent thread %s: Join of non-existent thread ((alive_threads_)) > ((0)) ((running_threads_)) > ((0)) ((ThreadStatusCreated)) == ((tctx->status)) ((tctx->status)) == ((ThreadStatusDead)) external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_list.h ((!empty())) != (0) libcorkscrew.so Failed to open libcorkscrew.so. You may see broken stack traces in SEGV reports. acquire_my_map_info_list release_my_map_info_list unwind_backtrace_signal_arch Failed to find one of the required symbols in libcorkscrew.so. You may see broken stack traces in SEGV reports. external/compiler-rt/lib/asan/../sanitizer_common/sanitizer_unwind_linux_libcdep.cc ((arg->stack->size)) < ((arg->max_depth)) ((map)) != (0) (((uptr)res)) <= ((kStackTraceMax)) external/compiler-rt/lib/ubsan/ubsan_init.cc ((UBSAN_MODE_PLUGIN)) != ((ubsan_mode)) ((UBSAN_MODE_UNKNOWN)) == ((ubsan_mode)) UndefinedBehaviorSanitizer Crash the program after printing the first error report print_stacktrace Include full stacktrace into an error report report_error_type Print specific error type instead of 'undefined-behavior' in summary. %s runtime error: %s%s %s note: %s external/compiler-rt/lib/ubsan/ubsan_diag.cc external/compiler-rt/lib/ubsan/ubsan_diag.h ((NumArgs != MaxArgs)) != (0) [1m %s: [1m [30m '%s' %lld %llu %Lg <memory cannot be printed> %s%02x ((isMemoryLocation())) != (0) undefined-behavior null-pointer-use misaligned-pointer-use insufficient-object-size unsigned-integer-overflow integer-divide-by-zero float-divide-by-zero invalid-shift-base invalid-shift-exponent out-of-bounds-index unreachable-call missing-return non-positive-vla-index float-cast-overflow invalid-bool-load invalid-enum-load function-type-mismatch invalid-null-return invalid-null-argument dynamic-type-mismatch cfi-bad-type ((0 && "unknown ErrorType!")) != (0) undefined alignment bounds unreachable vla-bound bool enum function returns-nonnull-attribute vptr cfi vptr_check Xi h (i Xi hi xi xi xi xi i <i Xi hi y lt t t u u \u u \u u v Pv v v v w ,w `w w w x Px x y y y y y y y y y y y y y y y y y y y y y y x 8y \y ( 0 L @ ` 8 X l < ( \ < p
k H @ ( D , X 4 P t T ( }f f {f @~f f |f 1 s @2 ! s @ " s xt t t wt @ht @ t t t t qT t rt pT T t vt rT gt @E @ E @ E @ E @ E @ E @ E @ E @ E @ E E @ E @ E @ E @ E @ E E E, E E a ` c b ^ ] _ S S S S S S S S S S S S S S S S S S S S S S A C K G I H X@ 4@ @ @ @ @F E 4@X T X J L B Y V @ $ & # ! % " m @Xt @At @Zt @Vt @Pt @Wt @t Yt Qt Rt Ot S ` T % ' p ) a U & $ q 0 b C C C C O C C C C C C P @ P @ P @ P @ P P T T T T T T T T T T T T T T F T T T T T T T V V V V V m @ m P P @ P P P P P P P P P Q Q( Qt m Q Q @ Q @ Q @ Q @ Q Q Q Q Q Q Q Q Q Q T T T T T M @ M @ M @ M @ M @ M @ M @ M @ M @ M @ M @ M @ M @ M @ M @ M @ M @ M @ M @ M @ M @ M @ M @ M M M M M M M M M M M M M M M M M M M V V V V V V K - D a t
GCC: (GNU) 4.9 20150123 (prerelease) Android clang version 3.8.256229 (based on LLVM 3.8.256229) GCC: (GNU) 4.9.x 20150123 (prerelease)
.shstrtab .MIPS.abiflags .note.gnu.build-id .hash .dynsym .dynstr .rel.dyn .text .MIPS.stubs .rodata .eh_frame_hdr .eh_frame .init_array .fini_array .data.rel.ro .dynamic .data .got .bss .comment .gnu.attributes .gnu_debuglink