__cxa_atexit __cxa_finalize __register_atfork dlsym __sanitizer_acquire_crash_state __sanitizer_install_malloc_and_free_hooks __sanitizer_report_error_summary __sanitizer_get_report_path __sanitizer_set_report_fd __sanitizer_set_report_path __errno __libc_stack_end dl_iterate_phdr syscall __sanitizer_on_print __sanitizer_set_death_callback __sanitizer_print_memory_profile __sanitizer_sandbox_on_notify __android_log_write __libc_get_static_tls_bounds android_set_abort_message async_safe_write_log clock_gettime getauxval getrlimit getrusage openlog pthread_attr_destroy pthread_attr_init pthread_getattr_np pthread_self sigaction syslog abort isatty pipe pthread_attr_getstack setrlimit sigaltstack sleep sysconf usleep sched_yield __sancov_default_options __sancov_lowest_stack __sanitizer_cov_8bit_counters_init __sanitizer_cov_bool_flag_init __sanitizer_cov_dump __sanitizer_cov_pcs_init __sanitizer_cov_reset __sanitizer_cov_trace_cmp __sanitizer_cov_trace_cmp1 __sanitizer_cov_trace_cmp2 __sanitizer_cov_trace_cmp4 __sanitizer_cov_trace_cmp8 __sanitizer_cov_trace_const_cmp1 __sanitizer_cov_trace_const_cmp2 __sanitizer_cov_trace_const_cmp4 __sanitizer_cov_trace_const_cmp8 __sanitizer_cov_trace_div4 __sanitizer_cov_trace_div8 __sanitizer_cov_trace_gep __sanitizer_cov_trace_pc_guard __sanitizer_cov_trace_pc_guard_init __sanitizer_cov_trace_pc_indir __sanitizer_cov_trace_switch __sanitizer_dump_coverage __sanitizer_dump_trace_pc_guard_coverage __sanitizer_get_module_and_offset_for_pc __sanitizer_symbolize_global __sanitizer_symbolize_pc __cxa_demangle __sanitizer_symbolize_code __sanitizer_symbolize_data __sanitizer_symbolize_demangle __sanitizer_symbolize_flush dlerror dlopen __libc_iterate_dynamic_tls __lsan_default_options __lsan_default_suppressions __lsan_disable __lsan_do_leak_check __lsan_do_recoverable_leak_check __lsan_enable __lsan_ignore_object __lsan_is_turned_off __lsan_register_root_region __lsan_unregister_root_region snprintf __ubsan_default_options __ubsan_handle_add_overflow __ubsan_handle_add_overflow_abort __ubsan_handle_alignment_assumption __ubsan_handle_alignment_assumption_abort __ubsan_handle_builtin_unreachable __ubsan_handle_cfi_bad_type __ubsan_handle_cfi_check_fail __ubsan_handle_cfi_check_fail_abort __ubsan_handle_divrem_overflow __ubsan_handle_divrem_overflow_abort __ubsan_handle_float_cast_overflow __ubsan_handle_float_cast_overflow_abort __ubsan_handle_implicit_conversion __ubsan_handle_implicit_conversion_abort __ubsan_handle_invalid_builtin __ubsan_handle_invalid_builtin_abort __ubsan_handle_invalid_objc_cast __ubsan_handle_invalid_objc_cast_abort __ubsan_handle_load_invalid_value __ubsan_handle_load_invalid_value_abort __ubsan_handle_missing_return __ubsan_handle_mul_overflow __ubsan_handle_mul_overflow_abort __ubsan_handle_negate_overflow __ubsan_handle_negate_overflow_abort __ubsan_handle_nonnull_arg __ubsan_handle_nonnull_arg_abort __ubsan_handle_nonnull_return_v1 __ubsan_handle_nonnull_return_v1_abort __ubsan_handle_nullability_arg __ubsan_handle_nullability_arg_abort __ubsan_handle_nullability_return_v1 __ubsan_handle_nullability_return_v1_abort __ubsan_handle_out_of_bounds __ubsan_handle_out_of_bounds_abort __ubsan_handle_pointer_overflow __ubsan_handle_pointer_overflow_abort __ubsan_handle_shift_out_of_bounds __ubsan_handle_shift_out_of_bounds_abort __ubsan_handle_sub_overflow __ubsan_handle_sub_overflow_abort __ubsan_handle_type_mismatch_v1 __ubsan_handle_type_mismatch_v1_abort __ubsan_handle_vla_bound_not_positive __ubsan_handle_vla_bound_not_positive_abort __ubsan_get_current_report_data __ubsan_on_report __asan_shadow_memory_dynamic_address __asan_update_allocation_context __sanitizer_free_hook __sanitizer_get_allocated_size __sanitizer_get_estimated_allocated_size __sanitizer_get_ownership __sanitizer_malloc_hook __sanitizer_purge_allocator __asan_get_alloc_stack __asan_get_free_stack __asan_get_shadow_mapping __asan_locate_address __asan_addr_is_in_fake_stack __asan_alloca_poison __asan_allocas_unpoison __asan_get_current_fake_stack __asan_option_detect_stack_use_after_return __asan_stack_free_0 __asan_stack_free_1 __asan_stack_free_10 __asan_stack_free_2 __asan_stack_free_3 __asan_stack_free_4 __asan_stack_free_5 __asan_stack_free_6 __asan_stack_free_7 __asan_stack_free_8 __asan_stack_free_9 __asan_stack_malloc_0 __asan_stack_malloc_1 __asan_stack_malloc_10 __asan_stack_malloc_2 __asan_stack_malloc_3 __asan_stack_malloc_4 __asan_stack_malloc_5 __asan_stack_malloc_6 __asan_stack_malloc_7 __asan_stack_malloc_8 __asan_stack_malloc_9 __asan_default_options __asan_after_dynamic_init __asan_before_dynamic_init __asan_region_is_poisoned __asan_register_elf_globals __asan_register_globals __asan_register_image_globals __asan_unregister_elf_globals __asan_unregister_globals __asan_unregister_image_globals __asan_handle_no_return __cxa_rethrow_primary_exception __cxa_throw __interceptor__Unwind_RaiseException __interceptor___cxa_atexit __interceptor___cxa_rethrow_primary_exception __interceptor___cxa_throw __interceptor___strxfrm_l __interceptor___wait4 __interceptor___wcsxfrm_l __interceptor__exit __interceptor__longjmp __interceptor_accept __interceptor_asctime __interceptor_asctime_r __interceptor_asprintf __interceptor_atoi __interceptor_atol __interceptor_atoll __interceptor_bcmp __interceptor_bsd_signal __interceptor_clock_getcpuclockid __interceptor_clock_getres __interceptor_clock_gettime __interceptor_clock_settime __interceptor_ctermid __interceptor_ctime __interceptor_ctime_r __interceptor_ether_aton __interceptor_ether_ntoa __interceptor_eventfd_read __interceptor_eventfd_write __interceptor_fclose __interceptor_fdopen __interceptor_fflush __interceptor_fgets __interceptor_fgetxattr __interceptor_flistxattr __interceptor_fopen __interceptor_fprintf __interceptor_fputs __interceptor_fread __interceptor_free __interceptor_freopen __interceptor_frexp __interceptor_frexpf __interceptor_frexpl __interceptor_fscanf __interceptor_ftime __interceptor_fwrite __interceptor_getaddrinfo __interceptor_getcwd __interceptor_getgrgid __interceptor_getgrnam __interceptor_getgroups __interceptor_gethostbyaddr __interceptor_gethostbyname __interceptor_gethostbyname2 __interceptor_gethostbyname_r __interceptor_gethostent __interceptor_getitimer __interceptor_getmntent __interceptor_getnameinfo __interceptor_getpeername __interceptor_getprotobyname __interceptor_getprotobynumber __interceptor_getprotoent __interceptor_getpwnam __interceptor_getpwuid __interceptor_getresgid __interceptor_getresuid __interceptor_getsockname __interceptor_getsockopt __interceptor_getutent __interceptor_getutid __interceptor_getutline __interceptor_getxattr __interceptor_gmtime __interceptor_gmtime_r __interceptor_index __interceptor_inet_aton __interceptor_inet_ntop __interceptor_inet_pton __interceptor_initgroups __interceptor_ioctl __interceptor_lgamma __interceptor_lgamma_r __interceptor_lgammaf __interceptor_lgammaf_r __interceptor_lgammal __interceptor_lgetxattr __interceptor_listxattr __interceptor_llistxattr __interceptor_localtime __interceptor_localtime_r __interceptor_longjmp __interceptor_malloc __interceptor_mbsrtowcs __interceptor_mbstowcs __interceptor_memchr __interceptor_memcmp __interceptor_memcpy __interceptor_memmem __interceptor_memmove __interceptor_memrchr __interceptor_memset __interceptor_mincore __interceptor_mktime __interceptor_mlock __interceptor_mlockall __interceptor_mmap __interceptor_modf __interceptor_modff __interceptor_modfl __interceptor_mprotect __interceptor_munlock __interceptor_munlockall __interceptor_opendir __interceptor_pclose __interceptor_poll __interceptor_popen __interceptor_prctl __interceptor_pread __interceptor_printf __interceptor_process_vm_readv __interceptor_process_vm_writev __interceptor_pthread_attr_getdetachstate __interceptor_pthread_attr_getguardsize __interceptor_pthread_attr_getschedparam __interceptor_pthread_attr_getschedpolicy __interceptor_pthread_attr_getscope __interceptor_pthread_attr_getstack __interceptor_pthread_attr_getstacksize __interceptor_pthread_condattr_getpshared __interceptor_pthread_create __interceptor_pthread_getschedparam __interceptor_pthread_join __interceptor_pthread_mutex_lock __interceptor_pthread_mutex_unlock __interceptor_pthread_mutexattr_getpshared __interceptor_pthread_mutexattr_gettype __interceptor_pthread_rwlockattr_getpshared __interceptor_pthread_setcancelstate __interceptor_pthread_setcanceltype __interceptor_pthread_sigmask __interceptor_ptsname __interceptor_ptsname_r __interceptor_puts __interceptor_pwrite __interceptor_read __interceptor_readdir __interceptor_readdir_r __interceptor_readlink __interceptor_readlinkat __interceptor_readv __interceptor_realpath __interceptor_recv __interceptor_recvfrom __interceptor_recvmmsg __interceptor_recvmsg __interceptor_regcomp __interceptor_regerror __interceptor_regexec __interceptor_regfree __interceptor_remquo __interceptor_remquof __interceptor_remquol __interceptor_scanf __interceptor_sem_destroy __interceptor_sem_getvalue __interceptor_sem_init __interceptor_sem_post __interceptor_sem_timedwait __interceptor_sem_trywait __interceptor_sem_wait __interceptor_send __interceptor_sendmmsg __interceptor_sendmsg __interceptor_sendto __interceptor_setbuf __interceptor_setbuffer __interceptor_setitimer __interceptor_setlinebuf __interceptor_setlocale __interceptor_setvbuf __interceptor_sigaction __interceptor_sigaltstack __interceptor_siglongjmp __interceptor_signal __interceptor_sigpending __interceptor_sigprocmask __interceptor_sigwait __interceptor_sincos __interceptor_sincosf __interceptor_sincosl __interceptor_snprintf __interceptor_sprintf __interceptor_sscanf __interceptor_stat __interceptor_strcasecmp __interceptor_strcasestr __interceptor_strcat __interceptor_strchr __interceptor_strchrnul __interceptor_strcmp __interceptor_strcpy __interceptor_strcspn __interceptor_strdup __interceptor_strerror __interceptor_strerror_r __interceptor_strlcat __interceptor_strlcpy __interceptor_strlen __interceptor_strncasecmp __interceptor_strncat __interceptor_strncmp __interceptor_strncpy __interceptor_strndup __interceptor_strnlen __interceptor_strpbrk __interceptor_strptime __interceptor_strrchr __interceptor_strspn __interceptor_strstr __interceptor_strtoimax __interceptor_strtok __interceptor_strtol __interceptor_strtoll __interceptor_strtoumax __interceptor_strxfrm __interceptor_strxfrm_l __interceptor_sysinfo __interceptor_tempnam __interceptor_time __interceptor_times __interceptor_tmpnam __interceptor_ttyname __interceptor_ttyname_r __interceptor_uname __interceptor_vasprintf __interceptor_vfork __interceptor_vfprintf __interceptor_vfscanf __interceptor_vprintf __interceptor_vscanf __interceptor_vsnprintf __interceptor_vsprintf __interceptor_vsscanf __interceptor_wait __interceptor_wait3 __interceptor_waitid __interceptor_waitpid __interceptor_wcscat __interceptor_wcsdup __interceptor_wcslen __interceptor_wcsncat __interceptor_wcsnlen __interceptor_wcsrtombs __interceptor_wcstombs __interceptor_wcsxfrm __interceptor_wcsxfrm_l __interceptor_write __interceptor_writev __sanitizer_syscall_post_impl_accept __sanitizer_syscall_post_impl_accept4 __sanitizer_syscall_post_impl_access __sanitizer_syscall_post_impl_acct __sanitizer_syscall_post_impl_add_key __sanitizer_syscall_post_impl_alarm __sanitizer_syscall_post_impl_bdflush __sanitizer_syscall_post_impl_bind __sanitizer_syscall_post_impl_brk __sanitizer_syscall_post_impl_capget __sanitizer_syscall_post_impl_capset __sanitizer_syscall_post_impl_chdir __sanitizer_syscall_post_impl_chmod __sanitizer_syscall_post_impl_chown __sanitizer_syscall_post_impl_chroot __sanitizer_syscall_post_impl_clock_getres __sanitizer_syscall_post_impl_clock_gettime __sanitizer_syscall_post_impl_clock_nanosleep __sanitizer_syscall_post_impl_clock_settime __sanitizer_syscall_post_impl_close __sanitizer_syscall_post_impl_connect __sanitizer_syscall_post_impl_creat __sanitizer_syscall_post_impl_delete_module __sanitizer_syscall_post_impl_dup __sanitizer_syscall_post_impl_dup2 __sanitizer_syscall_post_impl_dup3 __sanitizer_syscall_post_impl_epoll_create __sanitizer_syscall_post_impl_epoll_create1 __sanitizer_syscall_post_impl_epoll_ctl __sanitizer_syscall_post_impl_epoll_pwait __sanitizer_syscall_post_impl_epoll_wait __sanitizer_syscall_post_impl_eventfd __sanitizer_syscall_post_impl_eventfd2 __sanitizer_syscall_post_impl_exit __sanitizer_syscall_post_impl_exit_group __sanitizer_syscall_post_impl_faccessat __sanitizer_syscall_post_impl_fchdir __sanitizer_syscall_post_impl_fchmod __sanitizer_syscall_post_impl_fchmodat __sanitizer_syscall_post_impl_fchown __sanitizer_syscall_post_impl_fchownat __sanitizer_syscall_post_impl_fcntl __sanitizer_syscall_post_impl_fcntl64 __sanitizer_syscall_post_impl_fdatasync __sanitizer_syscall_post_impl_fgetxattr __sanitizer_syscall_post_impl_flistxattr __sanitizer_syscall_post_impl_flock __sanitizer_syscall_post_impl_fork __sanitizer_syscall_post_impl_fremovexattr __sanitizer_syscall_post_impl_fsetxattr __sanitizer_syscall_post_impl_fstat __sanitizer_syscall_post_impl_fstat64 __sanitizer_syscall_post_impl_fstatat64 __sanitizer_syscall_post_impl_fsync __sanitizer_syscall_post_impl_ftruncate __sanitizer_syscall_post_impl_futimesat __sanitizer_syscall_post_impl_get_mempolicy __sanitizer_syscall_post_impl_get_robust_list __sanitizer_syscall_post_impl_getcpu __sanitizer_syscall_post_impl_getcwd __sanitizer_syscall_post_impl_getdents __sanitizer_syscall_post_impl_getdents64 __sanitizer_syscall_post_impl_getegid __sanitizer_syscall_post_impl_geteuid __sanitizer_syscall_post_impl_getgid __sanitizer_syscall_post_impl_getgroups __sanitizer_syscall_post_impl_gethostname __sanitizer_syscall_post_impl_getitimer __sanitizer_syscall_post_impl_getpeername __sanitizer_syscall_post_impl_getpgid __sanitizer_syscall_post_impl_getpgrp __sanitizer_syscall_post_impl_getpid __sanitizer_syscall_post_impl_getppid __sanitizer_syscall_post_impl_getpriority __sanitizer_syscall_post_impl_getrandom __sanitizer_syscall_post_impl_getresgid __sanitizer_syscall_post_impl_getresuid __sanitizer_syscall_post_impl_getrlimit __sanitizer_syscall_post_impl_getrusage __sanitizer_syscall_post_impl_getsid __sanitizer_syscall_post_impl_getsockname __sanitizer_syscall_post_impl_getsockopt __sanitizer_syscall_post_impl_gettid __sanitizer_syscall_post_impl_gettimeofday __sanitizer_syscall_post_impl_getuid __sanitizer_syscall_post_impl_getxattr __sanitizer_syscall_post_impl_init_module __sanitizer_syscall_post_impl_inotify_add_watch __sanitizer_syscall_post_impl_inotify_init __sanitizer_syscall_post_impl_inotify_init1 __sanitizer_syscall_post_impl_inotify_rm_watch __sanitizer_syscall_post_impl_io_cancel __sanitizer_syscall_post_impl_io_destroy __sanitizer_syscall_post_impl_io_getevents __sanitizer_syscall_post_impl_io_setup __sanitizer_syscall_post_impl_io_submit __sanitizer_syscall_post_impl_ioctl __sanitizer_syscall_post_impl_ioperm __sanitizer_syscall_post_impl_ioprio_get __sanitizer_syscall_post_impl_ioprio_set __sanitizer_syscall_post_impl_ipc __sanitizer_syscall_post_impl_kexec_load __sanitizer_syscall_post_impl_keyctl __sanitizer_syscall_post_impl_kill __sanitizer_syscall_post_impl_lchown __sanitizer_syscall_post_impl_lgetxattr __sanitizer_syscall_post_impl_link __sanitizer_syscall_post_impl_linkat __sanitizer_syscall_post_impl_listen __sanitizer_syscall_post_impl_listxattr __sanitizer_syscall_post_impl_llistxattr __sanitizer_syscall_post_impl_llseek __sanitizer_syscall_post_impl_lookup_dcookie __sanitizer_syscall_post_impl_lremovexattr __sanitizer_syscall_post_impl_lseek __sanitizer_syscall_post_impl_lsetxattr __sanitizer_syscall_post_impl_lstat __sanitizer_syscall_post_impl_lstat64 __sanitizer_syscall_post_impl_madvise __sanitizer_syscall_post_impl_mbind __sanitizer_syscall_post_impl_migrate_pages __sanitizer_syscall_post_impl_mincore __sanitizer_syscall_post_impl_mkdir __sanitizer_syscall_post_impl_mkdirat __sanitizer_syscall_post_impl_mknod __sanitizer_syscall_post_impl_mknodat __sanitizer_syscall_post_impl_mlock __sanitizer_syscall_post_impl_mlockall __sanitizer_syscall_post_impl_mmap_pgoff __sanitizer_syscall_post_impl_mount __sanitizer_syscall_post_impl_move_pages __sanitizer_syscall_post_impl_mprotect __sanitizer_syscall_post_impl_mremap __sanitizer_syscall_post_impl_msgget __sanitizer_syscall_post_impl_msgrcv __sanitizer_syscall_post_impl_msgsnd __sanitizer_syscall_post_impl_msync __sanitizer_syscall_post_impl_munlock __sanitizer_syscall_post_impl_munlockall __sanitizer_syscall_post_impl_munmap __sanitizer_syscall_post_impl_name_to_handle_at __sanitizer_syscall_post_impl_nanosleep __sanitizer_syscall_post_impl_newfstat __sanitizer_syscall_post_impl_newfstatat __sanitizer_syscall_post_impl_newlstat __sanitizer_syscall_post_impl_newstat __sanitizer_syscall_post_impl_newuname __sanitizer_syscall_post_impl_ni_syscall __sanitizer_syscall_post_impl_nice __sanitizer_syscall_post_impl_old_getrlimit __sanitizer_syscall_post_impl_old_mmap __sanitizer_syscall_post_impl_old_readdir __sanitizer_syscall_post_impl_old_select __sanitizer_syscall_post_impl_oldumount __sanitizer_syscall_post_impl_olduname __sanitizer_syscall_post_impl_open __sanitizer_syscall_post_impl_open_by_handle_at __sanitizer_syscall_post_impl_openat __sanitizer_syscall_post_impl_pause __sanitizer_syscall_post_impl_pciconfig_iobase __sanitizer_syscall_post_impl_pciconfig_read __sanitizer_syscall_post_impl_pciconfig_write __sanitizer_syscall_post_impl_perf_event_open __sanitizer_syscall_post_impl_personality __sanitizer_syscall_post_impl_pipe __sanitizer_syscall_post_impl_pipe2 __sanitizer_syscall_post_impl_pivot_root __sanitizer_syscall_post_impl_poll __sanitizer_syscall_post_impl_ppoll __sanitizer_syscall_post_impl_pread64 __sanitizer_syscall_post_impl_preadv __sanitizer_syscall_post_impl_process_vm_readv __sanitizer_syscall_post_impl_process_vm_writev __sanitizer_syscall_post_impl_pselect6 __sanitizer_syscall_post_impl_ptrace __sanitizer_syscall_post_impl_pwrite64 __sanitizer_syscall_post_impl_pwritev __sanitizer_syscall_post_impl_quotactl __sanitizer_syscall_post_impl_read __sanitizer_syscall_post_impl_readlink __sanitizer_syscall_post_impl_readlinkat __sanitizer_syscall_post_impl_readv __sanitizer_syscall_post_impl_reboot __sanitizer_syscall_post_impl_recv __sanitizer_syscall_post_impl_recvfrom __sanitizer_syscall_post_impl_recvmmsg __sanitizer_syscall_post_impl_recvmsg __sanitizer_syscall_post_impl_remap_file_pages __sanitizer_syscall_post_impl_removexattr __sanitizer_syscall_post_impl_rename __sanitizer_syscall_post_impl_renameat __sanitizer_syscall_post_impl_request_key __sanitizer_syscall_post_impl_restart_syscall __sanitizer_syscall_post_impl_rmdir __sanitizer_syscall_post_impl_rt_sigaction __sanitizer_syscall_post_impl_rt_sigpending __sanitizer_syscall_post_impl_rt_sigprocmask __sanitizer_syscall_post_impl_rt_sigqueueinfo __sanitizer_syscall_post_impl_rt_sigtimedwait __sanitizer_syscall_post_impl_rt_tgsigqueueinfo __sanitizer_syscall_post_impl_sched_get_priority_max __sanitizer_syscall_post_impl_sched_get_priority_min __sanitizer_syscall_post_impl_sched_getaffinity __sanitizer_syscall_post_impl_sched_getparam __sanitizer_syscall_post_impl_sched_getscheduler __sanitizer_syscall_post_impl_sched_rr_get_interval __sanitizer_syscall_post_impl_sched_setaffinity __sanitizer_syscall_post_impl_sched_setparam __sanitizer_syscall_post_impl_sched_setscheduler __sanitizer_syscall_post_impl_sched_yield __sanitizer_syscall_post_impl_select __sanitizer_syscall_post_impl_semctl __sanitizer_syscall_post_impl_semget __sanitizer_syscall_post_impl_semop __sanitizer_syscall_post_impl_semtimedop __sanitizer_syscall_post_impl_send __sanitizer_syscall_post_impl_sendfile __sanitizer_syscall_post_impl_sendfile64 __sanitizer_syscall_post_impl_sendmmsg __sanitizer_syscall_post_impl_sendmsg __sanitizer_syscall_post_impl_sendto __sanitizer_syscall_post_impl_set_mempolicy __sanitizer_syscall_post_impl_set_robust_list __sanitizer_syscall_post_impl_set_tid_address __sanitizer_syscall_post_impl_setdomainname __sanitizer_syscall_post_impl_setfsgid __sanitizer_syscall_post_impl_setfsuid __sanitizer_syscall_post_impl_setgid __sanitizer_syscall_post_impl_setgroups __sanitizer_syscall_post_impl_sethostname __sanitizer_syscall_post_impl_setitimer __sanitizer_syscall_post_impl_setns __sanitizer_syscall_post_impl_setpgid __sanitizer_syscall_post_impl_setpriority __sanitizer_syscall_post_impl_setregid __sanitizer_syscall_post_impl_setresgid __sanitizer_syscall_post_impl_setresuid __sanitizer_syscall_post_impl_setreuid __sanitizer_syscall_post_impl_setrlimit __sanitizer_syscall_post_impl_setsid __sanitizer_syscall_post_impl_setsockopt __sanitizer_syscall_post_impl_settimeofday __sanitizer_syscall_post_impl_setuid __sanitizer_syscall_post_impl_setxattr __sanitizer_syscall_post_impl_sgetmask __sanitizer_syscall_post_impl_shmat __sanitizer_syscall_post_impl_shmdt __sanitizer_syscall_post_impl_shmget __sanitizer_syscall_post_impl_shutdown __sanitizer_syscall_post_impl_sigaction __sanitizer_syscall_post_impl_sigaltstack __sanitizer_syscall_post_impl_signal __sanitizer_syscall_post_impl_signalfd __sanitizer_syscall_post_impl_signalfd4 __sanitizer_syscall_post_impl_sigpending __sanitizer_syscall_post_impl_sigprocmask __sanitizer_syscall_post_impl_socket __sanitizer_syscall_post_impl_socketcall __sanitizer_syscall_post_impl_socketpair __sanitizer_syscall_post_impl_splice __sanitizer_syscall_post_impl_spu_create __sanitizer_syscall_post_impl_spu_run __sanitizer_syscall_post_impl_ssetmask __sanitizer_syscall_post_impl_stat __sanitizer_syscall_post_impl_stat64 __sanitizer_syscall_post_impl_stime __sanitizer_syscall_post_impl_swapoff __sanitizer_syscall_post_impl_swapon __sanitizer_syscall_post_impl_symlink __sanitizer_syscall_post_impl_symlinkat __sanitizer_syscall_post_impl_sync __sanitizer_syscall_post_impl_syncfs __sanitizer_syscall_post_impl_sysctl __sanitizer_syscall_post_impl_sysfs __sanitizer_syscall_post_impl_sysinfo __sanitizer_syscall_post_impl_syslog __sanitizer_syscall_post_impl_tee __sanitizer_syscall_post_impl_tgkill __sanitizer_syscall_post_impl_time __sanitizer_syscall_post_impl_timer_create __sanitizer_syscall_post_impl_timer_delete __sanitizer_syscall_post_impl_timer_getoverrun __sanitizer_syscall_post_impl_timer_gettime __sanitizer_syscall_post_impl_timer_settime __sanitizer_syscall_post_impl_timerfd_create __sanitizer_syscall_post_impl_timerfd_gettime __sanitizer_syscall_post_impl_timerfd_settime __sanitizer_syscall_post_impl_times __sanitizer_syscall_post_impl_tkill __sanitizer_syscall_post_impl_truncate __sanitizer_syscall_post_impl_umask __sanitizer_syscall_post_impl_umount __sanitizer_syscall_post_impl_uname __sanitizer_syscall_post_impl_unlink __sanitizer_syscall_post_impl_unlinkat __sanitizer_syscall_post_impl_unshare __sanitizer_syscall_post_impl_uselib __sanitizer_syscall_post_impl_utime __sanitizer_syscall_post_impl_utimensat __sanitizer_syscall_post_impl_utimes __sanitizer_syscall_post_impl_vfork __sanitizer_syscall_post_impl_vhangup __sanitizer_syscall_post_impl_vmsplice __sanitizer_syscall_post_impl_wait4 __sanitizer_syscall_post_impl_waitid __sanitizer_syscall_post_impl_waitpid __sanitizer_syscall_post_impl_write __sanitizer_syscall_post_impl_writev __sanitizer_syscall_pre_impl_accept __sanitizer_syscall_pre_impl_accept4 __sanitizer_syscall_pre_impl_access __sanitizer_syscall_pre_impl_acct __sanitizer_syscall_pre_impl_add_key __sanitizer_syscall_pre_impl_alarm __sanitizer_syscall_pre_impl_bdflush __sanitizer_syscall_pre_impl_bind __sanitizer_syscall_pre_impl_brk __sanitizer_syscall_pre_impl_capget __sanitizer_syscall_pre_impl_capset __sanitizer_syscall_pre_impl_chdir __sanitizer_syscall_pre_impl_chmod __sanitizer_syscall_pre_impl_chown __sanitizer_syscall_pre_impl_chroot __sanitizer_syscall_pre_impl_clock_getres __sanitizer_syscall_pre_impl_clock_gettime __sanitizer_syscall_pre_impl_clock_nanosleep __sanitizer_syscall_pre_impl_clock_settime __sanitizer_syscall_pre_impl_close __sanitizer_syscall_pre_impl_connect __sanitizer_syscall_pre_impl_creat __sanitizer_syscall_pre_impl_delete_module __sanitizer_syscall_pre_impl_dup __sanitizer_syscall_pre_impl_dup2 __sanitizer_syscall_pre_impl_dup3 __sanitizer_syscall_pre_impl_epoll_create __sanitizer_syscall_pre_impl_epoll_create1 __sanitizer_syscall_pre_impl_epoll_ctl __sanitizer_syscall_pre_impl_epoll_pwait __sanitizer_syscall_pre_impl_epoll_wait __sanitizer_syscall_pre_impl_eventfd __sanitizer_syscall_pre_impl_eventfd2 __sanitizer_syscall_pre_impl_exit __sanitizer_syscall_pre_impl_exit_group __sanitizer_syscall_pre_impl_faccessat __sanitizer_syscall_pre_impl_fchdir __sanitizer_syscall_pre_impl_fchmod __sanitizer_syscall_pre_impl_fchmodat __sanitizer_syscall_pre_impl_fchown __sanitizer_syscall_pre_impl_fchownat __sanitizer_syscall_pre_impl_fcntl __sanitizer_syscall_pre_impl_fcntl64 __sanitizer_syscall_pre_impl_fdatasync __sanitizer_syscall_pre_impl_fgetxattr __sanitizer_syscall_pre_impl_flistxattr __sanitizer_syscall_pre_impl_flock __sanitizer_syscall_pre_impl_fork __sanitizer_syscall_pre_impl_fremovexattr __sanitizer_syscall_pre_impl_fsetxattr __sanitizer_syscall_pre_impl_fstat __sanitizer_syscall_pre_impl_fstat64 __sanitizer_syscall_pre_impl_fstatat64 __sanitizer_syscall_pre_impl_fsync __sanitizer_syscall_pre_impl_ftruncate __sanitizer_syscall_pre_impl_futimesat __sanitizer_syscall_pre_impl_get_mempolicy __sanitizer_syscall_pre_impl_get_robust_list __sanitizer_syscall_pre_impl_getcpu __sanitizer_syscall_pre_impl_getcwd __sanitizer_syscall_pre_impl_getdents __sanitizer_syscall_pre_impl_getdents64 __sanitizer_syscall_pre_impl_getegid __sanitizer_syscall_pre_impl_geteuid __sanitizer_syscall_pre_impl_getgid __sanitizer_syscall_pre_impl_getgroups __sanitizer_syscall_pre_impl_gethostname __sanitizer_syscall_pre_impl_getitimer __sanitizer_syscall_pre_impl_getpeername __sanitizer_syscall_pre_impl_getpgid __sanitizer_syscall_pre_impl_getpgrp __sanitizer_syscall_pre_impl_getpid __sanitizer_syscall_pre_impl_getppid __sanitizer_syscall_pre_impl_getpriority __sanitizer_syscall_pre_impl_getrandom __sanitizer_syscall_pre_impl_getresgid __sanitizer_syscall_pre_impl_getresuid __sanitizer_syscall_pre_impl_getrlimit __sanitizer_syscall_pre_impl_getrusage __sanitizer_syscall_pre_impl_getsid __sanitizer_syscall_pre_impl_getsockname __sanitizer_syscall_pre_impl_getsockopt __sanitizer_syscall_pre_impl_gettid __sanitizer_syscall_pre_impl_gettimeofday __sanitizer_syscall_pre_impl_getuid __sanitizer_syscall_pre_impl_getxattr __sanitizer_syscall_pre_impl_init_module __sanitizer_syscall_pre_impl_inotify_add_watch __sanitizer_syscall_pre_impl_inotify_init __sanitizer_syscall_pre_impl_inotify_init1 __sanitizer_syscall_pre_impl_inotify_rm_watch __sanitizer_syscall_pre_impl_io_cancel __sanitizer_syscall_pre_impl_io_destroy __sanitizer_syscall_pre_impl_io_getevents __sanitizer_syscall_pre_impl_io_setup __sanitizer_syscall_pre_impl_io_submit __sanitizer_syscall_pre_impl_ioctl __sanitizer_syscall_pre_impl_ioperm __sanitizer_syscall_pre_impl_ioprio_get __sanitizer_syscall_pre_impl_ioprio_set __sanitizer_syscall_pre_impl_ipc __sanitizer_syscall_pre_impl_kexec_load __sanitizer_syscall_pre_impl_keyctl __sanitizer_syscall_pre_impl_kill __sanitizer_syscall_pre_impl_lchown __sanitizer_syscall_pre_impl_lgetxattr __sanitizer_syscall_pre_impl_link __sanitizer_syscall_pre_impl_linkat __sanitizer_syscall_pre_impl_listen __sanitizer_syscall_pre_impl_listxattr __sanitizer_syscall_pre_impl_llistxattr __sanitizer_syscall_pre_impl_llseek __sanitizer_syscall_pre_impl_lookup_dcookie __sanitizer_syscall_pre_impl_lremovexattr __sanitizer_syscall_pre_impl_lseek __sanitizer_syscall_pre_impl_lsetxattr __sanitizer_syscall_pre_impl_lstat __sanitizer_syscall_pre_impl_lstat64 __sanitizer_syscall_pre_impl_madvise __sanitizer_syscall_pre_impl_mbind __sanitizer_syscall_pre_impl_migrate_pages __sanitizer_syscall_pre_impl_mincore __sanitizer_syscall_pre_impl_mkdir __sanitizer_syscall_pre_impl_mkdirat __sanitizer_syscall_pre_impl_mknod __sanitizer_syscall_pre_impl_mknodat __sanitizer_syscall_pre_impl_mlock __sanitizer_syscall_pre_impl_mlockall __sanitizer_syscall_pre_impl_mmap_pgoff __sanitizer_syscall_pre_impl_mount __sanitizer_syscall_pre_impl_move_pages __sanitizer_syscall_pre_impl_mprotect __sanitizer_syscall_pre_impl_mremap __sanitizer_syscall_pre_impl_msgget __sanitizer_syscall_pre_impl_msgrcv __sanitizer_syscall_pre_impl_msgsnd __sanitizer_syscall_pre_impl_msync __sanitizer_syscall_pre_impl_munlock __sanitizer_syscall_pre_impl_munlockall __sanitizer_syscall_pre_impl_munmap __sanitizer_syscall_pre_impl_name_to_handle_at __sanitizer_syscall_pre_impl_nanosleep __sanitizer_syscall_pre_impl_newfstat __sanitizer_syscall_pre_impl_newfstatat __sanitizer_syscall_pre_impl_newlstat __sanitizer_syscall_pre_impl_newstat __sanitizer_syscall_pre_impl_newuname __sanitizer_syscall_pre_impl_ni_syscall __sanitizer_syscall_pre_impl_nice __sanitizer_syscall_pre_impl_old_getrlimit __sanitizer_syscall_pre_impl_old_mmap __sanitizer_syscall_pre_impl_old_readdir __sanitizer_syscall_pre_impl_old_select __sanitizer_syscall_pre_impl_oldumount __sanitizer_syscall_pre_impl_olduname __sanitizer_syscall_pre_impl_open __sanitizer_syscall_pre_impl_open_by_handle_at __sanitizer_syscall_pre_impl_openat __sanitizer_syscall_pre_impl_pause __sanitizer_syscall_pre_impl_pciconfig_iobase __sanitizer_syscall_pre_impl_pciconfig_read __sanitizer_syscall_pre_impl_pciconfig_write __sanitizer_syscall_pre_impl_perf_event_open __sanitizer_syscall_pre_impl_personality __sanitizer_syscall_pre_impl_pipe __sanitizer_syscall_pre_impl_pipe2 __sanitizer_syscall_pre_impl_pivot_root __sanitizer_syscall_pre_impl_poll __sanitizer_syscall_pre_impl_ppoll __sanitizer_syscall_pre_impl_pread64 __sanitizer_syscall_pre_impl_preadv __sanitizer_syscall_pre_impl_process_vm_readv __sanitizer_syscall_pre_impl_process_vm_writev __sanitizer_syscall_pre_impl_pselect6 __sanitizer_syscall_pre_impl_ptrace __sanitizer_syscall_pre_impl_pwrite64 __sanitizer_syscall_pre_impl_pwritev __sanitizer_syscall_pre_impl_quotactl __sanitizer_syscall_pre_impl_read __sanitizer_syscall_pre_impl_readlink __sanitizer_syscall_pre_impl_readlinkat __sanitizer_syscall_pre_impl_readv __sanitizer_syscall_pre_impl_reboot __sanitizer_syscall_pre_impl_recv __sanitizer_syscall_pre_impl_recvfrom __sanitizer_syscall_pre_impl_recvmmsg __sanitizer_syscall_pre_impl_recvmsg __sanitizer_syscall_pre_impl_remap_file_pages __sanitizer_syscall_pre_impl_removexattr __sanitizer_syscall_pre_impl_rename __sanitizer_syscall_pre_impl_renameat __sanitizer_syscall_pre_impl_request_key __sanitizer_syscall_pre_impl_restart_syscall __sanitizer_syscall_pre_impl_rmdir __sanitizer_syscall_pre_impl_rt_sigaction __sanitizer_syscall_pre_impl_rt_sigpending __sanitizer_syscall_pre_impl_rt_sigprocmask __sanitizer_syscall_pre_impl_rt_sigqueueinfo __sanitizer_syscall_pre_impl_rt_sigtimedwait __sanitizer_syscall_pre_impl_rt_tgsigqueueinfo __sanitizer_syscall_pre_impl_sched_get_priority_max __sanitizer_syscall_pre_impl_sched_get_priority_min __sanitizer_syscall_pre_impl_sched_getaffinity __sanitizer_syscall_pre_impl_sched_getparam __sanitizer_syscall_pre_impl_sched_getscheduler __sanitizer_syscall_pre_impl_sched_rr_get_interval __sanitizer_syscall_pre_impl_sched_setaffinity __sanitizer_syscall_pre_impl_sched_setparam __sanitizer_syscall_pre_impl_sched_setscheduler __sanitizer_syscall_pre_impl_sched_yield __sanitizer_syscall_pre_impl_select __sanitizer_syscall_pre_impl_semctl __sanitizer_syscall_pre_impl_semget __sanitizer_syscall_pre_impl_semop __sanitizer_syscall_pre_impl_semtimedop __sanitizer_syscall_pre_impl_send __sanitizer_syscall_pre_impl_sendfile __sanitizer_syscall_pre_impl_sendfile64 __sanitizer_syscall_pre_impl_sendmmsg __sanitizer_syscall_pre_impl_sendmsg __sanitizer_syscall_pre_impl_sendto __sanitizer_syscall_pre_impl_set_mempolicy __sanitizer_syscall_pre_impl_set_robust_list __sanitizer_syscall_pre_impl_set_tid_address __sanitizer_syscall_pre_impl_setdomainname __sanitizer_syscall_pre_impl_setfsgid __sanitizer_syscall_pre_impl_setfsuid __sanitizer_syscall_pre_impl_setgid __sanitizer_syscall_pre_impl_setgroups __sanitizer_syscall_pre_impl_sethostname __sanitizer_syscall_pre_impl_setitimer __sanitizer_syscall_pre_impl_setns __sanitizer_syscall_pre_impl_setpgid __sanitizer_syscall_pre_impl_setpriority __sanitizer_syscall_pre_impl_setregid __sanitizer_syscall_pre_impl_setresgid __sanitizer_syscall_pre_impl_setresuid __sanitizer_syscall_pre_impl_setreuid __sanitizer_syscall_pre_impl_setrlimit __sanitizer_syscall_pre_impl_setsid __sanitizer_syscall_pre_impl_setsockopt __sanitizer_syscall_pre_impl_settimeofday __sanitizer_syscall_pre_impl_setuid __sanitizer_syscall_pre_impl_setxattr __sanitizer_syscall_pre_impl_sgetmask __sanitizer_syscall_pre_impl_shmat __sanitizer_syscall_pre_impl_shmdt __sanitizer_syscall_pre_impl_shmget __sanitizer_syscall_pre_impl_shutdown __sanitizer_syscall_pre_impl_sigaction __sanitizer_syscall_pre_impl_sigaltstack __sanitizer_syscall_pre_impl_signal __sanitizer_syscall_pre_impl_signalfd __sanitizer_syscall_pre_impl_signalfd4 __sanitizer_syscall_pre_impl_sigpending __sanitizer_syscall_pre_impl_sigprocmask __sanitizer_syscall_pre_impl_socket __sanitizer_syscall_pre_impl_socketcall __sanitizer_syscall_pre_impl_socketpair __sanitizer_syscall_pre_impl_splice __sanitizer_syscall_pre_impl_spu_create __sanitizer_syscall_pre_impl_spu_run __sanitizer_syscall_pre_impl_ssetmask __sanitizer_syscall_pre_impl_stat __sanitizer_syscall_pre_impl_stat64 __sanitizer_syscall_pre_impl_stime __sanitizer_syscall_pre_impl_swapoff __sanitizer_syscall_pre_impl_swapon __sanitizer_syscall_pre_impl_symlink __sanitizer_syscall_pre_impl_symlinkat __sanitizer_syscall_pre_impl_sync __sanitizer_syscall_pre_impl_syncfs __sanitizer_syscall_pre_impl_sysctl __sanitizer_syscall_pre_impl_sysfs __sanitizer_syscall_pre_impl_sysinfo __sanitizer_syscall_pre_impl_syslog __sanitizer_syscall_pre_impl_tee __sanitizer_syscall_pre_impl_tgkill __sanitizer_syscall_pre_impl_time __sanitizer_syscall_pre_impl_timer_create __sanitizer_syscall_pre_impl_timer_delete __sanitizer_syscall_pre_impl_timer_getoverrun __sanitizer_syscall_pre_impl_timer_gettime __sanitizer_syscall_pre_impl_timer_settime __sanitizer_syscall_pre_impl_timerfd_create __sanitizer_syscall_pre_impl_timerfd_gettime __sanitizer_syscall_pre_impl_timerfd_settime __sanitizer_syscall_pre_impl_times __sanitizer_syscall_pre_impl_tkill __sanitizer_syscall_pre_impl_truncate __sanitizer_syscall_pre_impl_umask __sanitizer_syscall_pre_impl_umount __sanitizer_syscall_pre_impl_uname __sanitizer_syscall_pre_impl_unlink __sanitizer_syscall_pre_impl_unlinkat __sanitizer_syscall_pre_impl_unshare __sanitizer_syscall_pre_impl_uselib __sanitizer_syscall_pre_impl_utime __sanitizer_syscall_pre_impl_utimensat __sanitizer_syscall_pre_impl_utimes __sanitizer_syscall_pre_impl_vfork __sanitizer_syscall_pre_impl_vhangup __sanitizer_syscall_pre_impl_vmsplice __sanitizer_syscall_pre_impl_wait4 __sanitizer_syscall_pre_impl_waitid __sanitizer_syscall_pre_impl_waitpid __sanitizer_syscall_pre_impl_write __sanitizer_syscall_pre_impl_writev __sanitizer_weak_hook_memcmp __sanitizer_weak_hook_memmem __sanitizer_weak_hook_strcasecmp __sanitizer_weak_hook_strcasestr __sanitizer_weak_hook_strcmp __sanitizer_weak_hook_strncasecmp __sanitizer_weak_hook_strncmp __sanitizer_weak_hook_strstr __strxfrm_l __wait4 __wcsxfrm_l _exit _longjmp accept asctime asctime_r asprintf atoi atol atoll bcmp bsd_signal clock_getcpuclockid clock_getres clock_settime ctermid ctime ctime_r ether_aton ether_ntoa eventfd_read eventfd_write fclose fdopen fflush fgets fgetxattr flistxattr fopen fprintf fputs fread freopen frexp frexpf frexpl fscanf ftime fwrite getaddrinfo getcwd getgrgid getgrnam getgroups gethostbyaddr gethostbyname gethostbyname2 gethostbyname_r gethostent getitimer getmntent getnameinfo getpeername getprotobyname getprotobynumber getprotoent getpwnam getpwuid getresgid getresuid getsockname getsockopt getutent getutid getutline getxattr gmtime gmtime_r index inet_aton inet_ntop inet_pton initgroups ioctl lgamma lgamma_r lgammaf lgammaf_r lgammal lgetxattr listxattr llistxattr localtime localtime_r longjmp mbsrtowcs mbstowcs memchr memcmp memcpy memmem memmove memrchr memset mincore mktime mlock mlockall mmap modf modff modfl mprotect munlock munlockall opendir pclose poll popen prctl pread printf process_vm_readv process_vm_writev pthread_attr_getdetachstate pthread_attr_getguardsize pthread_attr_getschedparam pthread_attr_getschedpolicy pthread_attr_getscope pthread_attr_getstacksize pthread_condattr_getpshared pthread_create pthread_getschedparam pthread_join pthread_mutex_lock pthread_mutex_unlock pthread_mutexattr_getpshared pthread_mutexattr_gettype pthread_rwlockattr_getpshared pthread_setcancelstate pthread_setcanceltype pthread_sigmask ptsname ptsname_r puts pwrite read readdir readdir_r readlink readlinkat readv realpath recv recvfrom recvmmsg recvmsg regcomp regerror regexec regfree remquo remquof remquol scanf sem_destroy sem_getvalue sem_init sem_post sem_timedwait sem_trywait sem_wait send sendmmsg sendmsg sendto setbuf setbuffer setitimer setlinebuf setlocale setvbuf siglongjmp signal signgam sigpending sigprocmask sigwait sincos sincosf sincosl sprintf sscanf stat strcasecmp strcasestr strcat strchr strchrnul strcmp strcpy strcspn strdup strerror strerror_r strlcat strlcpy strlen strncasecmp strncat strncmp strncpy strndup strnlen strpbrk strptime strrchr strspn strstr strtoimax strtok strtol strtoll strtoumax strxfrm strxfrm_l sysinfo tempnam time times tmpnam ttyname ttyname_r uname vasprintf vfork vfprintf vfscanf vprintf vscanf vsnprintf vsprintf vsscanf wait wait3 waitid waitpid wcscat wcsdup wcslen wcsncat wcsnlen wcsrtombs wcstombs wcsxfrm wcsxfrm_l write writev __asan_memcpy __asan_memmove __asan_memset __asan_rt_version __asan_print_accumulated_stats __interceptor___libc_memalign __interceptor_aligned_alloc __interceptor_calloc __interceptor_mallinfo __interceptor_malloc_stats __interceptor_malloc_usable_size __interceptor_mallopt __interceptor_memalign __interceptor_posix_memalign __interceptor_pvalloc __interceptor_realloc __interceptor_reallocarray __interceptor_valloc __libc_memalign aligned_alloc calloc free mallinfo malloc malloc_stats malloc_usable_size mallopt memalign posix_memalign pvalloc realloc reallocarray valloc __asan_address_is_poisoned __asan_load_cxx_array_cookie __asan_poison_cxx_array_cookie __asan_poison_intra_object_redzone __asan_poison_memory_region __asan_poison_stack_memory __asan_report_error __asan_set_shadow_00 __asan_set_shadow_f1 __asan_set_shadow_f2 __asan_set_shadow_f3 __asan_set_shadow_f5 __asan_set_shadow_f8 __asan_unpoison_intra_object_redzone __asan_unpoison_memory_region __asan_unpoison_stack_memory __sanitizer_annotate_contiguous_container __sanitizer_contiguous_container_find_bad_address __sanitizer_unaligned_load16 __sanitizer_unaligned_load32 __sanitizer_unaligned_load64 __sanitizer_unaligned_store16 __sanitizer_unaligned_store32 __sanitizer_unaligned_store64 __sanitizer_verify_contiguous_container pthread_getspecific pthread_key_create pthread_setspecific __asan_describe_address __asan_get_report_access_size __asan_get_report_access_type __asan_get_report_address __asan_get_report_bp __asan_get_report_description __asan_get_report_pc __asan_get_report_sp __asan_on_error __asan_report_present __asan_set_error_report_callback __sanitizer_ptr_cmp __sanitizer_ptr_sub __asan_exp_load1 __asan_exp_load16 __asan_exp_load2 __asan_exp_load4 __asan_exp_load8 __asan_exp_loadN __asan_exp_store1 __asan_exp_store16 __asan_exp_store2 __asan_exp_store4 __asan_exp_store8 __asan_exp_storeN __asan_handle_vfork __asan_init __asan_load1 __asan_load16 __asan_load16_noabort __asan_load1_noabort __asan_load2 __asan_load2_noabort __asan_load4 __asan_load4_noabort __asan_load8 __asan_load8_noabort __asan_loadN __asan_loadN_noabort __asan_report_exp_load1 __asan_report_exp_load16 __asan_report_exp_load2 __asan_report_exp_load4 __asan_report_exp_load8 __asan_report_exp_load_n __asan_report_exp_store1 __asan_report_exp_store16 __asan_report_exp_store2 __asan_report_exp_store4 __asan_report_exp_store8 __asan_report_exp_store_n __asan_report_load1 __asan_report_load16 __asan_report_load16_noabort __asan_report_load1_noabort __asan_report_load2 __asan_report_load2_noabort __asan_report_load4 __asan_report_load4_noabort __asan_report_load8 __asan_report_load8_noabort __asan_report_load_n __asan_report_load_n_noabort __asan_report_store1 __asan_report_store16 __asan_report_store16_noabort __asan_report_store1_noabort __asan_report_store2 __asan_report_store2_noabort __asan_report_store4 __asan_report_store4_noabort __asan_report_store8 __asan_report_store8_noabort __asan_report_store_n __asan_report_store_n_noabort __asan_set_death_callback __asan_store1 __asan_store16 __asan_store16_noabort __asan_store1_noabort __asan_store2 __asan_store2_noabort __asan_store4 __asan_store4_noabort __asan_store8 __asan_store8_noabort __asan_storeN __asan_storeN_noabort __asan_test_only_reported_buggy_pointer __asan_version_mismatch_check_v9 __sanitizer_print_stack_trace __sanitizer_get_current_allocated_bytes __sanitizer_get_free_bytes __sanitizer_get_heap_size __sanitizer_get_unmapped_bytes __asan_default_suppressions __sanitizer_finish_switch_fiber __sanitizer_start_switch_fiber _ZdaPv _ZdaPvRKSt9nothrow_t _ZdaPvSt11align_val_t _ZdaPvSt11align_val_tRKSt9nothrow_t _ZdaPvj _ZdaPvjSt11align_val_t _ZdlPv _ZdlPvRKSt9nothrow_t _ZdlPvSt11align_val_t _ZdlPvSt11align_val_tRKSt9nothrow_t _ZdlPvj _ZdlPvjSt11align_val_t _Znaj _ZnajRKSt9nothrow_t _ZnajSt11align_val_t _ZnajSt11align_val_tRKSt9nothrow_t _Znwj _ZnwjRKSt9nothrow_t _ZnwjSt11align_val_t _ZnwjSt11align_val_tRKSt9nothrow_t __ubsan_handle_dynamic_type_cache_miss __ubsan_handle_dynamic_type_cache_miss_abort __ubsan_handle_function_type_mismatch_v1 __ubsan_handle_function_type_mismatch_v1_abort __ubsan_vptr_type_cache _ZTIN10__cxxabiv117__class_type_infoE _ZTIN10__cxxabiv120__si_class_type_infoE _ZTIN10__cxxabiv121__vmi_class_type_infoE _ZTISt9type_info __dynamic_cast __sF pthread_rwlock_rdlock pthread_rwlock_unlock pthread_rwlock_wrlock libc.so LIBC libdl.so libm.so libc++.so liblog.so libclang_rt.asan-i686-android.so 
HINT: if you don't care about these errors you may set allocator_may_return_null=1 out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_allocator_bytemap.h out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_list.h ((s)) >= ((z)) Command: stdout ((atomic_load(&state_, memory_order_relaxed))) == ((1)) log_path intercept_strspn intercept_strcmp dump_registers detect_write_exec %d out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_printf.cpp shadow gap Failed suspending threads. DATA log_threads ((root_regions)) != (0) HEAP <unknown> negation of %0 cannot be represented in type %1; cast to an unsigned type to negate this value to itself check failed in %0, destination function located in %1 %0 integer overflow: %1 %2 %3 cannot be represented in type %4 ((IsAligned((uptr)h, page_size_))) != (0) out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_allocator_local_cache.h low shadow %p is located %zd bytes to the left overflows ERROR: AddressSanitizer: %s (%s vs %s) on %p ASAN_SYMBOLIZER_PATH ((f->redzone)) >= ((16)) %s Global[%p]: beg=%p size=%zu/%zu name=%s module=%s dyn_init=%zu odr_indicator=%p Removed strndup fwrite getnameinfo strerror_r strxfrm getprotoent ((__interception::real__Unwind_RaiseException)) != (0) '-+ #0 ((*endptr >= nptr)) != (0) AddrHashMap SIOCGIFFLAGS CDROMSUBCHNL EVIOCGBIT EVIOCGSW SOUND_MIXER_WRITE_CD SOUND_MIXER_WRITE_LINE1 ((end - beg)) <= (((1UL << 30))) sigalt AddressSanitizer Init done vptr for %0 call to function %0 through pointer to incorrect function type %1 unknown pointer encoding ((allocated_end_ - allocated_current_ >= (sptr)size)) != (0) ((IsAligned(res, kRegionSize))) != (0) ERROR: Can't open file: (reason: %d) If available, use the fast frame-pointer-based unwinder on fatal errors. malloc_context_size Print inlined frames in stacktraces. Defaults to true. If set check that string arguments are properly null-terminated If set, uses custom wrappers for memset/memcpy/memmove intrinsics to find more errors. If set, decorate sanitizer mappings in /proc/self/maps with user-readable names ((IsPowerOfTwo(size))) != (0) base == 10 || !negative %s: StackDepot: %zd ids; %zdM allocated Detached from thread %d. If set, converage information will be symbolized by sancov tool after dumping. ((id)) != ((0)) (%p) x86_64 out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_internal.h Using addr2line found at: %s use_tls suppressions Suppressions file name. HINT: For debugging, try setting environment variable LSAN_OPTIONS=verbosity=1:log_threads=1 TLS at %p-%p. float-divide-by-zero Print specific error type instead of 'undefined-behavior' in summary. shift exponent %0 is too large for %1-bit type %2 ((old)) == ((kAllocBegMagic)) ((IsPowerOfTwo(x))) != (0) ((alloc_beg + sizeof(LargeChunkHeader))) <= ((chunk_beg)) redzone alloc_dealloc_mismatch read stack-buffer-overflow dynamic-stack-buffer-overflow far-from-bounds ERROR: AddressSanitizer: %s on address %p at pc %p bp %p sp %p SCARINESS: %d (%s) Size (in Kb) of thread local quarantine used to detect use-after-free errors. Lower value may reduce memory usage but increase the chance of false negatives. It is not advised to go lower than 64Kb, otherwise frequent transfers to global quarantine might affect performance. max_uar_stack_size_log max_malloc_fill_size Poison (or not) the array cookie after operator new[]. inet_pton inet_aton sendmmsg sigpending asprintf TIOCSETD CDROMSEEK HDIO_GET_DMA PPPIOCSFLAGS SNDCTL_COPR_RCVMSG SOUND_MIXER_READ_SPEAKER SOUND_MIXER_READ_SYNTH SOUND_MIXER_WRITE_BASS VT_RESIZEX ((flags()->min_uar_stack_size_log)) <= ((flags()->max_uar_stack_size_log)) ((AddrIsInMem(stack_bottom_))) != (0) vptr for %2 base class of %1 libunwind: malformed DW_CFA_register DWARF unwind, reg2 too big libunwind: malformed DW_CFA_val_offset_sf DWARF unwind, reg too big . If false, disable printing error summaries in addition to error reports. hard_rss_limit_mb allocator_release_to_os_interval_ms intercept_strlen print_cmdline ERROR: Invalid value for signal handler option: '%s' /proc/self/exe ((can_parse_)) != (0) Print flags help. ((!*start)) != (0) use_ld_allocations log_pointers out/llvm-project/compiler-rt/lib/lsan/lsan_common.cpp Suppressions used: Registered root region at %p of size %llu HINT: LeakSanitizer does not work under ptrace (strace, gdb, etc) member access within 'BOOL' out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common.h stack created by unknown thread Address %p is located in stack of thread %s ' (0x%zx) of size %zu Stack left redzone: out/llvm-project/compiler-rt/lib/asan/asan_flags.cpp ((f->max_redzone)) >= ((f->redzone)) check_initialization_order detect_stack_use_after_return sleep_before_dying strict_init_order ((asan_inited)) != (0) ((global_registration_site_vector)) != (0) frexp getgroups initgroups pthread_attr_getscope strtol _Unwind_RaiseException ((atomic_load(&c->addr, memory_order_relaxed))) == ((0)) FDGETFDCSTAT FDPOLLDRVSTAT PPPIOCSASYNCMAP SNDCTL_MIDI_INFO SOUND_MIXER_WRITE_ALTPCM ((current_error_.kind)) == ((kErrorKindInvalid)) || `[%p, %p]` || ShadowGap || protect_shadow_gap=0: not protecting shadow gap, allocating gap's shadow || `[%p, %p]` || ShadowGap's shadow || ((this->stack_size())) > ((0U)) ebx FATAL: Internal error: %s's allocator failed to allocate a transfer batch. strip_path_prefix fast_unwind_on_check allocator_may_return_null If set, instructs kernel to not store the (huge) shadow in core file. ((IsAligned(offset, 4096))) != (0) ==%d== out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_procmaps_common.cpp ((*data_.current++)) == ((' ')) ((*tls_addr + *tls_size)) <= ((*stk_addr + *stk_size)) ERROR: %s failed to allocate 0x%zx (%zd) bytes at address %zx (errno: %d) riscv64 ((path_)) != (0) unsigned-integer-overflow invalid-shift-base null cfi _Nonnull return type annotation applying zero offset to null pointer out/llvm-project/compiler-rt/lib/ubsan/ubsan_value.cpp ((0 && "libclang_rt.ubsan was built without __int128 support")) != (0) ((IsAligned((uptr)ptr, alignment))) != (0) ((rz_size)) >= ((16)) high shadow This frame has %zu object(s): %s <== Memory access at offset %zd %s this variable%s operator delete HINT: if you don't care about these errors you may set ASAN_OPTIONS=detect_odr_violation=0 [ print_full_thread_history poison_partial memrchr getpwnam readdir pthread_attr_getstack listxattr eventfd_write getutent regcomp AddressSanitizer: failed to intercept '%s' jztLq WARNING: unexpected floating-point arg size in printf interceptor: %d FIOGETOWN TIOCNOTTY TIOCNXCL SIOCSIFMTU BLKRASET CDROMPLAYMSF PPPIOCGDEBUG SIOCDRARP SIOCGIFHWADDR SIOCGIFMAP SIOCGIFMEM SIOCSIFLINK SNDCTL_COPR_RCODE SNDCTL_COPR_SENDMSG SOUND_MIXER_READ_LINE3 SOUND_MIXER_WRITE_LINE3 SOUND_MIXER_WRITE_OGAIN SOUND_MIXER_WRITE_RECSRC SOUND_MIXER_WRITE_SYNTH SOUND_PCM_READ_RATE TIOCSERCONFIG TIOCSLCKTRMIOS TIOCSSOFTCAR VT_ACTIVATE ((value)) == ((end.value)) ((b2 - b1)) == ((granularity)) AddressSanitizer CHECK failed: %s:%d "%s" (0x%zx, 0x%zx) unwind_phase2 libunwind: malformed DW_CFA_def_cfa DWARF unwind, reg too big getSLEB128 getSavedRegister edx esi out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_allocator_local_cache.h log_exe_name Colorize reports: (always|never|auto). full_address_space yes ((v)) != ((MtxUnlocked)) ERROR: %s failed to deallocate 0x%zx (%zd) bytes at address %p ((!have_width || left_justified)) != (0) ((0)) == ((internal_sigaction(signum, &sigact, nullptr))) undefined-behavior invalid-bool-load vptr Global quarantine stats: batches: %zd; bytes: %zd (user: %zd); chunks: %zd (capacity: %zd); %d%% chunks used; %d%% memory overhead max_redzone ((region_kind)) != (0) at offset %zu in frame%s operator new ASAN_OPTIONS WARNING: strndup* interceptors are enabled even though replace_str=0. Use intercept_strndup=0 to disable them. (Windows only) enable hooking of Rtl(Allocate|Free|Size|ReAllocate)Heap. prctl vsscanf wait3 readdir_r remquof wcsxfrm ((__interception::real___cxa_rethrow_primary_exception)) != (0) strcat __cxa_atexit ((addr1)) == ((0)) snprintf EVIOCSABS HDIO_DRIVE_CMD SNDCTL_SEQ_PANIC SNDCTL_SEQ_SYNC SOUND_MIXER_READ_DEVMASK SOUND_MIXER_READ_MIC SOUND_MIXER_READ_STEREODEVS SOUND_MIXER_WRITE_LINE SOUND_MIXER_WRITE_MIC __asan_%spoison_intra_object_redzone [%p,%p) %zd contiguous_container: %p %p %p %p pvalloc-overflow || `[%p, %p]` || HighMem || getFloatRegister getEncodedP ERROR: Path is too long: %c%c%c%c%c%c%c%c... %s If set, allows online symbolizer to run addr2line binary to symbolize stack traces (addr2line will only be used if llvm-symbolizer binary is unavailable. Print the process module map where supported (0 - don't print, 1 - print only once before process exits, 2 - print after each report). If set, uses custom wrappers for strpbrk function to find more errors. If set, uses custom wrappers for send* functions to find more errors. Available flags for %s: ((owner_)) == ((0)) WARNING: reading executable name failed with errno %d, some stack frames may not be symbolized ILL buff <= buff_end ((suppression_types_num_)) <= ((kMaxSuppressionTypes)) %s: reading suppressions file at %s %s: soft rss limit exhausted (%zdMb vs %zdMb) ((symbolizer_)) != (0) ((0)) == ((internal_strcmp(module_name, addr2line->module_name()))) use_poisoned __lsan_ignore_object(): ignoring heap object at %p ((stack_trace_id)) != (0) %s note: %s nullptr-after-nonzero-offset Include full stacktrace into an error report reference binding to ((b)) != (0) ((beg + 1)) == ((end)) operator new [] ERROR: AddressSanitizer: %s: memory ranges [%p,%p) and [%p, %p) overlap If set, attempts to catch initialization order issues. If set, explicitly unmaps the (huge) shadow at exit. Search recvmmsg getxattr mmap setvbuf setbuffer TIOCGWINSZ BLKRRPART CDROMPLAYTRKIND FDGETDRVPRM FDSETPRM HDIO_GET_IDENTITY SNDCTL_DSP_GETFMTS SNDCTL_DSP_STEREO SNDCTL_DSP_SUBDIVIDE SNDCTL_FM_LOAD_INSTR SNDCTL_SEQ_RESET SNDCTL_SYNTH_MEMAVL SOUND_MIXER_READ_ALTPCM VT_SETMODE bsd_signal ((AddrIsAlignedByGranularity(addr + size))) != (0) ((beg)) < ((end)) allocation-size-too-big || `[%p, %p]` || MidShadow || MemToShadow(shadow): %p %p setFloatRegister ((kBlockMagic)) == ((p->magic)) ((IsAligned(res, alignment))) != (0) ERROR: %s failed to %s 0x%zx (%zd) bytes of %s (error code: %d) ((buff->size())) <= ((max_len)) leak_check_at_exit use_sigaltstack Limit the amount of mmap-ed memory (excluding shadow) in Mb; not a user-facing flag, used mosly for testing the tools soft_rss_limit_mb dedup_token_length sancov_path %s: ERROR: %s out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_posix.cpp minimal_num_length < kMaxLen ((status == ThreadStatusRunning || status == ThreadStatusFinished)) != (0) ((tctx)) != ((0)) ERROR: %s failed to unmap 0x%zx (%zd) bytes at address %p ERROR: %s getrlimit() failed %d ScopedStackWithGuard %% (<unknown module>) Unsupported specifier in stack frame format: %c (0x%zx)! ERROR: Using `atos` is only supported on Darwin. always ERROR: %s: %s on unknown address (pc %p bp %p sp %p T%d) acquire_my_map_info_list Root set: mark as reachable all allocations made from dynamic linker. This was the old way to handle dynamic TLS, and will be removed soon. Do not use this flag. %s leak of %zu byte(s) in %zu object(s) allocated from: __lsan_ignore_object(): no heap object found at %p WARNING: LeakSanitizer gave up on indirect leaks suppression. REGISTERS missing-return UndefinedBehaviorSanitizer execution reached the end of a value-returning function without returning a value passing zero to %0, which is not a valid argument out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_allocator_bytemap.h Activated with flags: quarantine_size_mb Address %p is located in the %s area. %p is located %zd bytes inside ERROR: AddressSanitizer: %s: (size=%zd) Stack after return: ((f->max_redzone)) <= ((2048)) uar_noreserve ASan allocator flag. max_free_fill_size is the maximal amount of bytes that will be filled with free_fill_byte during free. verify_asan_link_order This may happen if another global with the same name strstr frexpl mbstowcs wcstombs pthread_mutex_lock pthread_mutexattr_getpshared pthread_rwlockattr_getpshared sem_post mincore strncpy AddressSanitizer: failed to intercept '%s@@%s' ((addr1)) == ((h->addr_)) sscanf fscanf fprintf SIOCSIFMETRIC CDROMRESUME HDIO_GET_KEEPSETTINGS PPPIOCSMRU SNDCTL_SEQ_CTRLRATE SNDCTL_SEQ_PERCMODE SNDCTL_SEQ_THRESHOLD SNDCTL_TMR_SELECT SOUND_MIXER_READ_VOLUME VT_WAITACTIVE ((beg.offset)) < ((end.offset)) poisoning: %p %zx invalid-aligned-alloc-alignment AddressSanitizer Stats: %zuM freed by %zu calls Stats: %zuM (%zuM-%zuM) mmaped; %zu maps, %zu unmaps Stats: StackDepot: %zd ids; %zdM allocated ((t->context())) != (0) ((class_id)) != ((0UL)) ((IsAligned(map_beg, page_size_))) != (0) ((res + size)) <= ((map_end)) auto ((out < out_end - 1)) != (0) Controls custom tool's SIGBUS handler (0 - do not registers the handler, 1 - register the handler and allow user to set own, 2 - registers the handler and block user from changing it). Controls custom tool's SIGILL handler (0 - do not registers the handler, 1 - register the handler and allow user to set own, 2 - registers the handler and block user from changing it). mmap_limit_mb FlagHandlerInclude false ((length_)) < ((size())) ((0)) == ((sigaltstack(nullptr, &oldstack))) ((0)) == ((sigaltstack(&altstack, &oldstack))) SanitizerCoverage: failed to open %s for writing (reason: %d) stack depot +0x%zx %s(%d +0x%zx) armv7k out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_libcdep.cpp use_unaligned ((tag == kReachable || tag == kIndirectlyLeaked)) != (0) ((tag == kDirectlyLeaked || tag == kIndirectlyLeaked)) != (0) LeakSanitizer has encountered a fatal error. ((0 && "unknown ErrorType!")) != (0) undefined UBSAN_SYMBOLIZER_PATH - %0 null pointer of type %1 ((old_chunk_state)) == ((CHUNK_QUARANTINE)) %zd:%zd; created by %s here: %p is located %zd bytes to the left of HINT: if you don't care about these errors you may set ASAN_OPTIONS=new_delete_type_mismatch=0 write ((IsPowerOfTwo(f->redzone))) != (0) detect_odr_violation localtime sysinfo realpath sem_getvalue munlockall TIOCMSET CDROMPAUSE CDROMSTOP FDSETDRVPRM SIOCGSTAMP SNDCTL_SYNTH_INFO VT_GETMODE VT_RESIZE ((0)) == ((pthread_key_create(&tsd_key, destructor))) out/llvm-project/compiler-rt/lib/asan/asan_rtl.cpp ecx FDE has zero length FDE is really a CIE ((res + size)) >= ((map_beg)) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_flags.cpp If available, use the fast frame-pointer-based unwinder on malloc/free. Controls custom tool's SIGSEGV handler (0 - do not registers the handler, 1 - register the handler and allow user to set own, 2 - registers the handler and block user from changing it). coverage_dir intercept_strpbrk Print command line on crash (asan only). <empty> ((MtxUnlocked)) != ((atomic_load(m, memory_order_relaxed))) ==%s ((stack_top)) != (0) (((uptr)&rl >= segment.start && (uptr)&rl < segment.end)) != (0) Using llvm-symbolizer at user-specified path: %s [1m [0m Root set: include thread stacks Consider unaligned pointers valid. %p: found %p pointing into chunk %p-%p of size %zu. __lsan_unregister_root_region(): region at %p of size %llu has not been registered. WARNING: stack pointer not in stack range. %lld nullptr-with-nonzero-offset misaligned-pointer-use function-type-mismatch [1m negation of %0 cannot be represented in type %1 nonnull attribute _Nonnull type annotation applying non-zero offset %0 to null pointer out/llvm-project/compiler-rt/lib/asan/asan_activation.cpp Thread %s ((chunk.AllocTid())) != ((kInvalidTid)) %zd bytes malloc ERROR: AddressSanitizer: bad parameters to __sanitizer_annotate_contiguous_container: beg : %p end : %p old_mid : %p new_mid : %p [2]: FakeStack Poison (or not) the heap memory on [de]allocation. Zero value is useful for benchmarking the allocator or instrumentator. If true, ASan tweaks a bunch of other flags (quarantine, redzone, heap poisoning) to reduce memory consumption as much as possible, and restores them to original values when the first instrumented module is loaded into the process. This is mainly intended to be used on Android. but AddressSanitizer can not provide more details. readv puts getgrnam gethostbyaddr modfl pthread_mutex_unlock pthread_condattr_getpshared %s: WARNING: unexpected format specifier in printf interceptor: %.*s (reported once per process) cCsS out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_addrhashmap.h SIOCATMARK EVIOCGREP FDMSGOFF FDTWADDLE FDWERRORCLR HDIO_SET_32BIT SIOCSIFSLAVE SNDCTL_DSP_POST %s%s%x%x%s%s bad-free rss-limit-exceeded || `[%p, %p]` || ShadowGap2 || (((((kMidMemBeg) >> kDefaultShadowScale) + (__asan_shadow_memory_dynamic_address)) > ((((__asan_shadow_memory_dynamic_address ? __asan_shadow_memory_dynamic_address - 1 : 0)) >> kDefaultShadowScale) + (__asan_shadow_memory_dynamic_address)) && kMidMemBeg > (((kMidMemEnd) >> kDefaultShadowScale) + (__asan_shadow_memory_dynamic_address)) && (((((((kHighMemEnd) >> kDefaultShadowScale) + (__asan_shadow_memory_dynamic_address)) + 1)) >> kDefaultShadowScale) + (__asan_shadow_memory_dynamic_address)) > kMidMemEnd)) != (0) ((t)) != (0) unprotected gap shadow virtual pointer to member function call libunwind: malformed DW_CFA_same_value DWARF unwind, reg too big DW_EH_PE_aligned pointer encoding not supported truncated sleb128 expression out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_allocator_combined.h ((size_)) <= ((new_capacity)) ((i)) < ((size_)) symbolize Verbosity level (0 - silent, 1 - a bit of output, 2+ - more output). If false, the allocator will crash instead of returning 0 on out-of-memory. heap_profile abort_on_error If true, dump 16 bytes starting at the instruction that caused SEGV test_only_emulate_no_memorymap Can't read directory entries from /proc/%d/task. /proc/self/cmdline ((tctx->status)) == ((ThreadStatusInvalid)) ((running_threads_)) > ((0)) HEAP PROFILE at RSS %zdMb ReserveShadowMemoryRange failed while trying to map 0x%zx bytes. Perhaps you're using ulimit -v ((*tls_addr + *tls_size)) > ((*stk_addr)) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_posix_libcdep.cpp Waiting on the process failed (errno %d). Tracer caught signal %d: addr=0x%zx pc=0x%zx sp=0x%zx DEDUP_TOKEN: %s x86_64h ((pid)) > ((0)) %s%s%x%x%s ((map)) != (0) The %zu top leak(s): Running thread %d was not suspended. False leaks are possible. STACK %s runtime error: %s%s non-positive-vla-index unreachable return dynamic operation on * returns_nonnull attribute non-virtual pointer to member function call out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_allocator_combined.h WARNING: AddressSanitizer failed to allocate 0x%zx bytes ERROR: AddressSanitizer: %s on %p in thread %s: free ERROR: AddressSanitizer: reallocarray parameters overflow: count * size (%zd * %zd) cannot be represented in type size_t (thread %s) [1] size=%zd '%s' %s (((uptr)common_flags()->malloc_context_size)) <= ((kStackTraceMax)) If set, prints thread creation stacks for the threads involved in the report and their ancestors up to the main thread. location (%p): name=%s[%p], %d %d In either case this is likely an ODR violation bug, strnlen vasprintf clock_getres sincosf ftime sem_init sem_timedwait sendto readlinkat regexec popen strncat CDROMREADRAW EVIOCGVERSION FDCLRPRM MTIOCTOP SIOCGARP SIOCSIFENCAP SNDCTL_DSP_SPEED SNDCTL_TMR_TEMPO SOUND_MIXER_READ_BASS SOUND_MIXER_WRITE_VOLUME VT_DISALLOCATE VT_OPENQRY Trying to unpoison memory region [%p, %p) || `[%p, %p]` || ShadowGap3 || thread_local_quarantine_size_kb=%zuK unsupported restore location for register log_to_syslog detect_leaks intercept_tls_get_addr intercept_strstr intercept_strndup decorate_proc_maps Truncated ((0)) == ((sigaltstack(&altstack, nullptr))) %c ((0 && "Invalid module arch")) != (0) UNKNOWN ((arg->stack->size)) < ((arg->max_depth)) Print addresses of leaked objects after main leak report. The number of leaks reported. Scanning %s range %p-%p. Unable to get registers from thread %d. LeakSanitizer: Multiple modules match "%s". TLS and other allocations originating from linker might be falsely reported as leaks. '%s' invalid-objc-cast 'bool' ctz() (unknown) out/llvm-project/compiler-rt/lib/asan/asan_allocator.cpp Activating ASan intra-object-overflow T%d: FakeStack created: %p -- %p stack_size_log: %zd; mmapped %zdK, noreserve=%d %zd: %zd/%zd; replace_intrin check_malloc_usable_size ((AddrIsInMem(g->beg))) != (0) strtok memcpy writev gmtime getitimer accept getmntent times __cxa_rethrow_primary_exception out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors_ioctl.inc CDROMMULTISESSION EVIOCGPHYS FDWERRORGET HDIO_SET_NOWERR HDIO_SET_UNMASKINTR SIOCGIFNAME SNDCTL_SEQ_GETOUTCOUNT TIOCGSOFTCAR unpoisoning: %p %zx ((mid)) <= ((end)) ================================================================= bad-__sanitizer_annotate_contiguous_container virtual call cast to unrelated type invalid vtable during phase1 personality function said it would stop here, but now in phase2 it did not stop here libunwind: malformed DW_CFA_GNU_negative_offset_extended DWARF unwind, reg too big include read more options from the given file (if it exists) Print the flag descriptions. max_allocation_size_mb disable_coredump intercept_intrin dump_instruction_bytes ERROR: Invalid value for uptr option: '%s' ((reinterpret_cast<uptr>(&addr))) < ((addr)) ((0)) == (((uptr)child_stack % 16)) /proc/ ((alive_threads_)) == ((max_alive_threads_)) ((getrlimit(3, &rl))) == ((0)) /proc/self/statm SetAlternateSignalStack #%n %p %F %L ,%d WARNING: Can't write to symbolizer at fd %d use_stacks ((allocator_begin)) <= ((allocator_end)) count bytes template %s Too many leaks! Only the first %zu leaks encountered will be reported. out/llvm-project/compiler-rt/lib/ubsan/ubsan_diag.h signed-integer-overflow implicit-unsigned-integer-truncation dynamic-type-mismatch <unknown type> %0 specified here ((0 && "unexpected floating point bit width")) != (0) ((cache_size)) >= ((overhead_size)) ASAN_ACTIVATION_OPTIONS AddressSanitizer can't parse the stack frame descriptor: |%s| %p is located %zd bytes to the right HINT: if you don't care about these errors you may set ASAN_OPTIONS=alloc_dealloc_mismatch=0 Poisoned by user: report_globals allow_user_poisoning sleep_after_init ((flags()->report_globals)) != (0) clock_gettime waitpid getaddrinfo lgammaf flistxattr sem_destroy atoll pthread_create FIONCLEX SIOCDELMULTI SIOCGIFNETMASK FDRAWCMD MTIOCPOS SNDCTL_COPR_RDATA SNDCTL_COPR_WCODE SOUND_PCM_READ_BITS out/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp __libc_malloc_dispatch Live Heap Allocations: %zd bytes in %zd chunks; quarantined: %zd bytes in %zd chunks; %zd other chunks; total chunks: %zd; showing top %zd%% (at most %zd unique contexts) ((beg.chunk)) < ((end.chunk)) ((beg)) <= ((mid)) new-delete-type-mismatch check failed in %0, vtable located in %1 %0 address %1 which does not point to an object of type %2 setRegister libunwind: malformed DW_CFA_offset_extended DWARF unwind, reg too big edi out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_common.h ERROR: Failed to mmap fast_unwind_on_malloc verbosity print_summary If set, uses alternate stack for signal handling. Soft RSS limit in Mb. If non-zero, a background thread is spawned at startup which periodically reads RSS. If the limit is reached all subsequent malloc/new calls will fail or return NULL (depending on the value of allocator_may_return_null) until the RSS goes below the soft limit. This limit does not affect memory allocations other than malloc/new. If non-zero, malloc/new calls larger than this size will return nullptr (or crash if allocator_may_return_null=false). no_huge_pages_for_shadow allocate Supported Printf formats: %([0-9]*)?(z|ll)?{d,u,x,X}; %p; %[-]([0-9]*)?(\.\*)?s; %c ((tid)) < ((n_contexts_)) ((((end + 1) % GetMmapGranularity()))) == ((0)) AddDieCallback(TracerThreadDieCallback) ((out_buf <= out_end)) != (0) %s "%s:%s" 0x%zx ((garbage)) != (0) %L %F Unmatched call to __lsan_enable(). use_globals unreadable %zu byte(s) leaked in %zu allocation(s). Rerun with %zu suppressed stacks. implicit-integer-sign-change left shift of %0 by %1 places cannot be represented in type %2 control flow integrity check for type %0 failed during %1 ((!AddrIsInMem(addr))) != (0) ' ERROR: AddressSanitizer: requested allocation size 0x%zx (0x%zx after adjustments for alignment, red zones etc.) exceeds maximum supported size of 0x%zx (thread %s) ] debug If true, poison partially addressable 8-byte aligned words (default=true). This flag affects heap and global buffers, but not stack buffers. out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc memmove frexpf fread pread fputs setlocale strerror pthread_attr_getschedparam send wcslen strlcpy index sS scanf TIOCSWINSZ SIOCSIFDSTADDR BLKRAGET FDFMTBEG PPPIOCGFLAGS PPPIOCGXASYNCMAP SNDCTL_COPR_HALT TCSETSW wild-addr-write ((0)) != (0) %p %p ((0)) == ((main_thread->tid())) %zu:%zu; out/llvm-project/compiler-rt/lib/asan/asan_suppressions.cpp T%d exited invalid vptr libunwind: malformed DW_CFA_val_offset DWARF unwind, reg (%llu) out of range CIE version is not 1 or 3 ((0 && "unable to mmap")) != (0) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_mutex.h Enables support for dynamic libraries linked with libpthread 2.2.5. If set, uses custom wrappers for strstr and strcasestr functions to find more errors. ERROR: Invalid value for bool option: '%s' 0 no %s - %s (Current Value%s: %s) ((n_unknown_flags_)) < ((kMaxUnknownFlags)) ((IsOneOf(*data_.current, '-', 'w'))) != (0) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cpp ((index)) < ((thread_ids_.size())) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace.cpp WARNING: Symbolizer was blocked from starting itself! --default-arch=i386 Launching Symbolizer process: Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. report_objects Objects leaked above: ((isIntegerTy())) != (0) invalid ObjC cast, object is a '%0', but expected a %1 indirect function call ((0 && "unexpected bit width")) != (0) ((chunks[i])) == ((t)) Deactivating ASan AddressSanitizer can not describe address in more detail (wild memory access suspected). partially overflows INVALID heap-buffer-overflow ASan allocator flag. max_malloc_fill_size is the maximal amount of bytes that will be filled with malloc_fill_byte on malloc. Value used to fill the newly allocated memory. detect_invalid_pointer_pairs getsockname gethostbyname getpeername wcsrtombs pthread_attr_getdetachstate fflush ctermid stat strxfrm_l regfree FIONBIO EVIOCSFF SIOCGIFSLAVE SNDCTL_DSP_RESET SNDCTL_SEQ_GETINCOUNT out/llvm-project/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cpp out/llvm-project/compiler-rt/lib/asan/asan_poisoning.cpp ((*(u8*)MemToShadow(a))) == ((0)) out/llvm-project/compiler-rt/lib/asan/asan_report.cpp out/llvm-project/compiler-rt/lib/asan/asan_shadow_setup.cpp __asan_finish_switch_fiber called from unknown thread DW_EH_PE_funcrel pointer encoding not supported libunwind: Unsupported .eh_frame_hdr version eax LargeMmapAllocator ((chunks_[idx])) == ((h)) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_file.cpp ((base)) != (0) fast_unwind_on_fatal handle_sigill detect_deadlocks intercept_strchr %s: %s format in %s (%s %s "%s" 0x%zx External symbolizer is explicitly disabled. ERROR: %s: %s on unknown address %p (pc %p bp %p sp %p T%d) The signal is caused by a %s memory access. Hint: address points to the zero page. release_my_map_info_list use_registers Unregistered root region at %p of size %llu null-pointer-use ((IsPowerOfTwo(options.max_redzone))) != (0) ((rz_log)) < ((8)) out/llvm-project/compiler-rt/lib/asan/asan_mapping.h ((!asan_is_deactivated)) != (0) HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (line %d) ((dealloc_stack->size)) > ((0)) ERROR: AddressSanitizer: attempting to call __sanitizer_get_allocated_size() for pointer which is not owned: %p Shadow bytes around the buggy address: %s%p: Deprecated, please use quarantine_size_mb. ((res)) != (0) ((!asan_init_is_running)) != (0) tmpnam ttyname lgammaf_r sem_wait __strxfrm_l regerror strdup sprintf SIOCGIFDSTADDR CDROMEJECT EVIOCSKEYCODE FDGETMAXERRS SIOCSIFMAP SNDCTL_DSP_GETBLKSIZE SOUND_MIXER_READ_CD SOUND_MIXER_READ_LINE1 SOUND_PCM_WRITE_FILTER signal redzone=%zu malloc_context_size=%zu SHADOW_SCALE: %d ERROR: starting fiber switch while in fiber switch SetCurrentThread: %p for thread %p WARNING: %s: CombinedAllocator allocation overflow: 0x%zx bytes with 0x%zx alignment requested InternalMmapVector stderr handle_sigfpe Large shadow regions are zero-filled using mmap(NORESERVE) instead of memset(). This is the threshold size in bytes. Print matched suppressions at exit. true exclusive /proc/%d/task/ ((module_name_len)) < ((buf_len)) NullSepFileArray ((IsOneOf(*data_.current, '-', 'r'))) != (0) ((tid)) < ((max_threads_)) ((tctx->status)) == ((ThreadStatusCreated)) ((ThreadStatusCreated)) == ((tctx->status)) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_linux_libcdep.cpp ERROR: %s setrlimit() failed %d Waiting on thread %zu failed, detaching (errno %d). ((id & (((u32)-1) >> kReservedBits))) == ((id)) ((frames)) != (0) GLOBAL ((size_)) > ((0)) float-cast-overflow invalid-enum-load cfi-bad-type report_error_type load of %0 address %1 with insufficient space for an object of type %2 variable length array bound evaluates to non-positive value %0 pointer index expression with base %0 overflowed to %1 out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_allocator_secondary.h %p is located somewhere around (this is AddressSanitizer bug!) [2] size=%zd '%s' %s [1]: multi-byte unknown-crash Stack use after scope: ((base)) <= ((ptr)) Controls the way to handle globals (0 - don't detect buffer overflow on globals, 1 - detect buffer overflow, 2 - print data about registered globals). Minimum fake stack size log. realloc(p, 0) is equivalent to free(p) by default (Same as the POSIX standard). If set to false, realloc(p, 0) will return a pointer to an allocated space which can not be used. strlen strcasestr mktime vsnprintf setitimer modf ether_aton pthread_attr_getguardsize sincosl pthread_setcancelstate sigaltstack pthread_join AddressSanitizer: libc interceptors initialized SIOCGIFCONF SIOCGPGRP BLKFLSBUF BLKROGET CDROMEJECT_SW CDROMSTART EVIOCGUNIQ FDDEFPRM HDIO_SET_MULTCOUNT SNDCTL_COPR_RESET SNDCTL_DSP_SETFRAGMENT TCSETSF TIOCLINUX null-deref ((bottom)) != (0) libunwind: %s - %s esp read more options from the given file strip_env handle_abort allow_user_segv_handler color Target directory for coverage dumps. Defaults to the current directory. intercept_memcmp If set, uses custom wrappers for memcmp function to find more errors. /proc/%d/task/%d/status out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_procmaps_linux.cpp ((pthread_getattr_np(pthread_self(), &attr))) == ((0)) SanitizerCoverage: %s: %zd PCs written ((stack_top)) > ((stack_bottom)) Using libbacktrace symbolizer. use_root_regions __lsan_ignore_object(): heap object at %p is already being ignored DTLS index %0 out of bounds for type %1 ((user_end)) <= ((alloc_end)) registered at: %spreviously allocated by thread %s here:%s partially underflows Right alloca redzone: min_uar_stack_size_log DynInitPoison module: %s Added strcasecmp strspn strcspn getpwuid inet_ntop pthread_mutexattr_gettype llistxattr fdopen pthread_setcanceltype recvfrom wcsnlen atol strtoll WARNING: unexpected arg size in printf interceptor: %d %s ignores mlock/mlockall/munlock/munlockall SIOCSIFMEM SNDCTL_SEQ_OUTOFBAND SOUND_MIXER_READ_ENHANCE SOUND_MIXER_READ_OGAIN TCSETS invalid-allocation-alignment || `[%p, %p]` || HighShadow || SHADOW_OFFSET: 0x%zx ((0)) == ((AsanTSDGet())) libunwind: malformed DW_CFA_restore DWARF unwind, reg (%llu) out of range DW_OP_deref_size with bad size Unknown DWARF encoding for search table. ((idx)) < ((n_chunks_)) Intercept and handle ioctl requests. Controls custom tool's SIGFPE handler (0 - do not registers the handler, 1 - register the handler and allow user to set own, 2 - registers the handler and block user from changing it). legacy_pthread_cond symbolize_inline_frames If set, uses custom wrappers for *stat functions to find more errors. TEST ONLY fail to read memory mappings to emulate sanitized "init" 2 unterminated string %s ABRT ((size)) < ((page_size * 10)) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace_printer.cpp armv7s FRAME [1m [31m READ ROOT Ignored: chunk %p-%p of size %zu. ((NumArgs != MaxArgs)) != (0) %0 misaligned address %1 for type %3, which requires %2 byte alignment ((id)) != (0) ((nearest_chunk)) >= ((h->map_beg)) out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_mutex.h [%zd, %zd) %zu-byte region [%p,%p) ERROR: AddressSanitizer: invalid allocation alignment: %zd, alignment must be a power of two (thread %s) These globals were registered at these points: Shadow byte legend (one shadow byte represents %d application bytes): print_scariness Report errors on mismatch between size of new and delete. pwrite asctime pthread_getschedparam gethostent wcsncat __wcsxfrm_l cCsS[ diouxXn ((__interception::real_memcpy)) != (0) CDROMREADCOOKED CDROMREADTOCENTRY CDROM_GET_UPC EVIOCGSND FDFLUSH SNDCTL_COPR_WDATA wild-addr-read bad-malloc_usable_size calloc-overflow out-of-memory odr-violation ((ptr[0] == kCurrentStackFrameMagic)) != (0) libunwind: malformed DW_CFA_expression DWARF unwind, reg too big If positive, after printing a stack trace also print a short string token based on this number of frames that will simplify deduplication of the reports. Example: 'DEDUP_TOKEN: foo-bar-main'. Default is 0. strict_string_checks If set, uses custom wrappers for strndup functions to find more errors. intercept_memmem html_cov_report ((size)) <= ((1ULL << (30))) SEGV TRAP ERROR: Failed to protect the shadow gap. %s cannot proceed correctly. ABORTING. ((map_start)) != ((~(uptr)0)) ((id)) < ((kMaxId)) ((module_name)) != (0) --no-inlines WARNING: external symbolizer didn't start up correctly! ERROR: External symbolizer path is set to '%s' which isn't a known symbolizer. Please set the path to the llvm-symbolizer binary or other known tool. -iCfe First 16 instruction bytes at pc: libcorkscrew.so out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_unwind_linux_libcdep.cpp (((uptr)res)) <= ((kStackTraceMax)) ((allocator_end)) <= ((end)) invalid-null-return %s%02x shift-exponent bool nullability-return + subtraction of unsigned offset from %0 overflowed to %1 ((AsanChunkView(right_chunk).AddrIsAtLeft(addr, 1, &r_offset))) != (0) ((nearest_chunk)) < ((h->map_beg + h->map_size)) ((atomic_load(&m->chunk_state, memory_order_relaxed))) == ((CHUNK_QUARANTINE)) heap-invalid of global variable '%s' defined in ' default-aligned ((alloc_type)) != ((dealloc_type)) ERROR: beg is not aligned by %d global-buffer-overflow out/llvm-project/compiler-rt/lib/asan/asan_descriptions.h => Intra object redzone: ((ptr)) < ((base + (((uptr)1) << stack_size_log))) Maximum fake stack size log. out/llvm-project/compiler-rt/lib/asan/asan_globals.cpp ((AddrIsAlignedByGranularity(g->beg))) != (0) strchrnul gethostbyname2 modff ether_ntoa ttyname_r mprotect CS aAeEfFgG TIOCPKT SIOCSIFBRDADDR CDROMREADMODE1 CDROMREADTOCHDR CDROMVOLCTRL PPPIOCGASYNCMAP SOUND_MIXER_WRITE_ENHANCE out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_signal_interceptors.inc ((total_allocated_user_size_)) != (0) %zd byte(s) (%zd%%) in %zd allocation(s) wild-jump max_redzone=%zu object is of type %0 no x86 float registers evaluateExpression Path to external symbolizer. If empty, the tool will search $PATH for the symbolizer. allow_addr2line Invoke leak checking in an atexit handler. Has no effect if detect_leaks=false, or if __lsan_do_leak_check() is called before the handler has a chance to run. handle_segv can_use_proc_maps_statm Print file locations in Visual Studio style (e.g: file(10,42): ... Flag parsing failed. Can't open /proc/%d/task for reading. ((size_)) <= ((capacity())) ((!data_)) != (0) ((*data_.current++)) == (('-')) (((beg % GetMmapGranularity()))) == ((0)) ((14)) == ((write_errno)) WARNING: failed to fork (errno %d) Could not detach from thread %d (errno %d). ((0 && "unimplemented")) != (0) ((infd)) != (0) ERROR: %s: %s on address %p (pc %p bp %p sp %p T%d) Failed to find one of the required symbols in libcorkscrew.so. You may see broken stack traces in SEGV reports. max_leaks Root region %p-%p intersects with mapped region %p-%p (%s) insufficient-object-size <memory cannot be printed> shift-base Crash the program after printing the first error report Do not print non-fatal error reports for unsigned integer overflow. Used to provide fuzzing signal without blowing up logs. null pointer passed as argument %0, which is declared to never be null out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_allocator_primary32.h ((prev->next)) == ((x)) Container overflow: Left alloca redzone: T%d: FakeStack destroyed: %s If set, uses custom wrappers for memset/memcpy/memmove intrinsics. If true, assume that dynamic initializers can never access globals from other modules, even if the latter are already initialized. memset gmtime_r strtoimax getresuid getprotobyname ((__interception::real___cxa_throw)) != (0) FIOCLEX TIOCMGET SIOCGIFMETRIC HDIO_GET_32BIT SNDCTL_TMR_TIMEBASE SOUND_MIXER_WRITE_IMIX SOUND_MIXER_WRITE_SPEAKER SOUND_PCM_WRITE_CHANNELS TCFLSH ((AddrIsInMem(addr + size - (1ULL << kDefaultShadowScale)))) != (0) [1m [33m Stats: %zuM realloced by %zu calls libunwind: malformed DW_CFA_undefined DWARF unwind, reg too big Allocate (total_mmaped >> 20) < common_flags()->mmap_limit_mb check_printf handle_sigtrap If set, deadlock detection is enabled. intercept_stat intercept_send %p ((!((precision >= 0 || left_justified) && *cur != 's'))) != (0) Report %s: failed to read suppressions file '%s' %s: failed to parse suppressions out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_thread_registry.cpp ((tctx->status)) == ((ThreadStatusDead)) Installed the sigaction for signal %d ((idx)) < ((kTabSize)) ((nullptr)) == ((suppression_ctx)) %p (%zu bytes) ================================================================= alignment assumption was specified here ((getType().isUnsignedIntegerTy())) != (0) Stats: LargeMmapAllocator: allocated %zd times, remains %zd (%zd K) max %zd M; by size logs: ((AddrIsInMem(p))) != (0) ((AddressSpaceView::Load(chunks[i])->chunk_idx)) == ((i)) global (%s) %sfreed by thread %s here:%s ERROR: AddressSanitizer: specified RSS limit exceeded, currently set to soft_rss_limit_mb=%zd use-after-poison detect_container_overflow Or the global comes from a C file built w/o -fno-common. strcmp time localtime_r __wait4 poll sigprocmask _exit pthread_attr_getstacksize sincos fgetxattr process_vm_readv getutline readlink out/llvm-project/compiler-rt/lib/asan/asan_interceptors.cpp ((*p)) == ((0)) %.*s <DECODED_IOCTL> SIOCSPGRP TIOCEXCL SIOCADDMULTI HDIO_GET_UNMASKINTR SIOCDARP SNDCTL_COPR_LOAD SNDCTL_MIDI_PRETIME TIOCINQ out/llvm-project/compiler-rt/lib/asan/asan_memory_profile.cpp WARNING: ASan is ignoring requested __asan_handle_no_return: stack type: %s top: %p; bottom %p; size: %p (%zd) False positive error reports may follow For details see https://github.com/google/sanitizers/issues/189 libunwind: malformed DW_CFA_register DWARF unwind, reg too big handle_sigbus If false, do not attempt to read /proc/maps/statm. Mostly useful for testing sanitizers. If set, coverage information will be dumped at program shutdown (if the coverage instrumentation was enabled at compile time). use_madv_dontdump If set, uses custom wrappers for strcmp functions to find more errors. If set, the tool calls abort() instead of _exit() after printing the error report. 1 out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_flag_parser.cpp buff_length > 0 /proc/self/maps ((*data_.current++)) == ((':')) %s: Thread limit (%u threads) exceeded. Dying. ((0 ? ThreadStatusCreated : ThreadStatusRunning)) == ((tctx->status)) %s: hard rss limit exhausted (%zdMb vs %zdMb) Failed spawning a tracer thread (errno %d). ((name)) != (0) i386 CODE WARNING: invalid path to external symbolizer! WARNING: Can't create a socket pair to start external symbolizer (errno: %d) Symbolizer is disabled. Root set: include regions added via __lsan_register_root_region(). Suppressed: chunk %p-%p of size %zu. Skipped %d guard page(s) to obtain stack %p-%p. %llu out-of-bounds-index nullability-arg halt_on_error %0 is outside the range of representable values of type %2 out/llvm-project/compiler-rt/lib/ubsan/ubsan_monitor.cpp ((options.max_redzone)) <= ((2048)) out/llvm-project/compiler-rt/lib/asan/asan_debugging.cpp %sallocated by thread %s here:%s ERROR: AddressSanitizer: attempting %s on %p in thread %s: ((0 && "AddressInformation kind is invalid")) != (0) Addressable: Global init order: ASan internal: out/llvm-project/compiler-rt/lib/asan/asan_fake_stack.cpp LSAN_OPTIONS Value used to fill deallocated memory. print_stats ((0)) == ((((uptr)stop - (uptr)start) % sizeof(__asan_global))) strptime vprintf clock_settime sigwait freopen setlinebuf SIOCGIFMTU HDIO_GETGEO HDIO_SET_DMA SIOCDELRT SNDCTL_DSP_SETFMT SNDCTL_DSP_SYNC SOUND_PCM_READ_FILTER ((__interception::real_memset)) != (0) bad-__sanitizer_get_allocated_size || `[%p, %p]` || LowMem || mallocs by size class: T%d: stack [%p,%p) size 0x%zx; local=%p DW_OP_fbreg not implemented ip ((b->Count())) > ((0)) ((IsAligned(p, page_size_))) != (0) ReadFileToBuffer ((new_capacity)) > ((0)) sancov Controls custom tool's SIGTRAP handler (0 - do not registers the handler, 1 - register the handler and allow user to set own, 2 - registers the handler and block user from changing it). Sanitize complete address space; by default kernel area on 32-bit platforms will not be sanitized print_suppressions Disable core dumping. By default, disable_coredump=1 on 64-bit to avoid dumping a 16T+ core file. Ignored on OSes that don't dump core by default and for sanitizers that don't reserve lots of virtual memory. intercept_strtok If true, assume that memcmp(p1, p2, n) always reads n bytes before comparing p1 and p2. %s: ERROR: expected '=' in %s expected '=' ((base)) == ((10)) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_linux.cpp ((size)) > (((1ULL << up))) <null> Buffer in Report is too short! ((rv)) == ((0)) ?? Using llvm-symbolizer found at: %s Hint: pc points to the zero page. ((context)) != (0) ((!root_regions)) != (0) %p is poisoned: ignoring %p pointing into chunk %p-%p of size %zu. readable ((leaks_.size() <= kMaxLeaksConsidered)) != (0) out/llvm-project/compiler-rt/lib/lsan/../sanitizer_common/sanitizer_common.h TLS [1m [32m vla-bound upcast of division by zero execution reached an unreachable program point unsigned (longjmp and C++ exceptions *are* supported) %s object passed to delete has wrong type: size of the allocated type: %zd bytes; size of the deallocated type: %zd bytes. alignment of the allocated type: %s; alignment of the deallocated type: %s. ERROR: AddressSanitizer: %s (%p): %s%s of size %zu at %p thread %s%s Address %p is a wild pointer. HINT: if you don't care about these errors you may set ASAN_OPTIONS=detect_container_overflow=0. If you suspect a false positive see also: https://github.com/google/sanitizers/wiki/AddressSanitizerContainerOverflow. Shadow gap: If >=2, detect violation of One-Definition-Rule (ODR); If ==1, detect ODR-violation only if the two variables have different sizes Crash the program after printing the first error report (WARNING: USE AT YOUR OWN RISK!) strncmp ctime ptsname eventfd_read setbuf longjmp printf ((ioctl_table_size < ioctl_table_max)) != (0) SIOCGIFADDR CDROMRESET PPPIOCGUNIT SNDCTL_TMR_METRONOME SOUND_MIXER_READ_LINE SOUND_MIXER_READ_RECSRC __libc_malloc_default_dispatch ((0)) == ((sigaltstack(nullptr, &signal_stack))) ((!tsd_key_inited)) != (0) out/llvm-project/compiler-rt/lib/asan/asan_errors.h invalid-pointer-pair object is base class subobject at offset %0 within object of type %1 libunwind: malformed DW_CFA_def_cfa_sf DWARF unwind, reg too big ((reinterpret_cast<uptr>(res) & (alignment - 1))) == ((0)) IsPowerOfTwo(boundary) include_if_exists If available, use the fast frame-pointer-based unwinder on internal CHECK failures. Check printf arguments. clear_shadow_mmap_threshold If set, uses custom wrappers for strchr, strchrnul, and strrchr functions to find more errors. Deduplicate multiple reports for single source location in halt_on_error=false mode (asan only). out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_libc.cpp ((buffer_.size())) >= ((4096)) %s/%s.%zd.%s Using internal symbolizer. Failed to open libcorkscrew.so. You may see broken stack traces in SEGV reports. Direct ((param)) != (0) Processing platform-specific allocations. ((!comp(v[i], v[last]))) != (0) ((suppression_ctx)) != (0) LeakSanitizer: Dynamic linker not found. TLS and other allocations originating from linker might be falsely reported as leaks. assumption of %0 byte alignment for pointer of type %1 failed %0address is %1 aligned, misalignment offset is %2 bytes left shift of negative value %0 ((0 && "Invalid arguments passed to __ubsan_get_current_report_data")) != (0) ((options.max_redzone)) >= ((options.min_redzone)) ((IsPowerOfTwo(options.min_redzone))) != (0) (((size == 0 && cache_size == 0) || cache_size != 0)) != (0) ((nearest_chunk)) <= ((p)) ((IsPowerOfTwo(rz_size))) != (0) ((old_ptr && new_size)) != (0) ((__interception::real_memcpy)) != ((nullptr)) %s: global '%s' at %s ERROR: AddressSanitizer: %s: %p %p Stack right redzone: Global redzone: ((IsPowerOfTwo(f->max_redzone))) != (0) WARNING: strlen interceptor is enabled even though replace_str=0. Use intercept_strlen=0 to disable it. Number of seconds to sleep between printing an error report and terminating the program. Useful for debugging purposes (e.g. when one needs to attach gdb). Print the legend for the shadow bytes. waitid pthread_attr_getschedpolicy lgetxattr _longjmp sS[ ((!h.created())) != (0) ((!h->remove_)) != (0) TIOCMBIC TIOCSTI CDROMREADAUDIO EVIOCGKEY SIOCSARP SNDCTL_COPR_RUN SOUND_MIXER_READ_IMIX ((alignment >= kWordSize)) != (0) ((AddrIsAlignedByGranularity(addr))) != (0) ((AddrIsInMem(addr))) != (0) stack-overflow reallocarray-overflow base-to-derived cast object has a possibly invalid vptr: abs(offset to top) too big ((IsPowerOfTwo(alignment))) != (0) ((class_id)) < ((kNumClasses)) ((IsAligned(res, page_size_))) != (0) PATH Write all sanitizer output to syslog in addition to other means of logging. Hard RSS limit in Mb. If non-zero, a background thread is spawned at startup which periodically reads RSS and aborts the process if the limit is reached Sancov tool location. If true, triggers warning when writable-executable pages requests are being made ((IsOneOf(*data_.current, '-', 'x'))) != (0) Attached to thread %zu. ((count)) < ((size)) :%s arm64 modules_.size() > 0 ((path_[0])) != (('\0')) WARNING: Can't read from symbolizer at fd %d atos Hint: PC is at a non-executable region. Maybe a wild jump? [1m [35m Root set: include global variables (.data and .bss) ((arg)) != (0) Thread %d not found in registry. ERROR: LeakSanitizer: detected memory leaks invalid-null-argument object-size out/llvm-project/compiler-rt/lib/ubsan/ubsan_handlers.cpp pointer points here ((CallerPC)) != (0) out/llvm-project/compiler-rt/lib/ubsan/ubsan_value.h signed quarantine_size_mb %d, thread_local_quarantine_size_kb %d, max_redzone %d, poison_heap %d, malloc_context_size %d, alloc_dealloc_mismatch %d, allocator_may_return_null %d, coverage %d, coverage_dir %s, allocator_release_to_os_interval_ms %d %p is located %zd bytes to the right of %p is located %zd bytes inside of Partially addressable: WARNING: strchr* interceptors are enabled even though replace_str=0. Use intercept_strchr=0 to disable them. Maximal size (in bytes) of redzones around heap objects. If set, uses custom wrappers and replacements for libc string functions to find more errors. free_fill_byte If set, user may manually mark memory regions as poisoned or unpoisoned. vscanf pthread_sigmask sem_trywait recv getprotobynumber siglongjmp ASAN_PTHREAD_CREATE_VERSION vfork %s: WARNING: unexpected format specifier in scanf interceptor: ((h.exists())) != (0) TIOCMBIS SIOCSIFFLAGS CDROMREADMODE2 HDIO_GET_NOWERR HDIO_SET_KEEPSETTINGS SNDCTL_TMR_SOURCE SOUND_MIXER_WRITE_RECLEV out/llvm-project/compiler-rt/lib/asan/asan_linux.cpp ((allocated_for_dlsym)) < ((kDlsymAllocPoolSize)) Trying to poison memory region [%p, %p) || `[%p, %p]` || LowShadow || libunwind: malformed DW_CFA_offset_extended_sf DWARF unwind, reg too big getULEB128 malformed uleb128 expression DWARF opcode not implemented ((n)) < ((kMaxNumChunks)) SUMMARY: %s: %s DEFAULT Max number of stack frames kept for each allocation/deallocation. print_module_map help coverage If set, uses custom wrappers for strspn and strcspn function to find more errors. If set, uses a custom wrapper for the strtok function to find more errors. strict_memcmp ((size)) < (((1ULL << (up + 1)))) ((alive_threads_)) > ((0)) %s: RSS: %zdMb ((&__android_log_write)) != (0) llvm-symbolizer Debug logging FAKE STACK Omitting %zu more leak(s). enum returns-nonnull-attribute store to member call on cast to virtual base of division of %0 by -1 cannot be represented in type %1 shift exponent %0 is negative ((0 && "source location pointer is null!")) != (0) applying non-zero offset to non-null pointer %0 produced null pointer ((Val >= 0)) != (0) ((getType().isFloatTy())) != (0) ((options.min_redzone)) >= ((16)) ((count)) < ((kSize)) ((rz_size)) <= ((2048)) out/llvm-project/compiler-rt/lib/asan/asan_descriptions.cpp underflows Size (in Mb) of quarantine used to detect use-after-free errors. Lower value may reduce memory usage but increase the chance of false negatives. If set, prints some debugging information and does additional checks. max_free_fill_size Allows the users to work around the bug in Nvidia drivers prior to 295.*. If true, honor the container overflow annotations. See https://github.com/google/sanitizers/wiki/AddressSanitizerContainerOverflow windows_hook_rtl_allocators The following global variable is not properly aligned. memcmp bcmp gethostbyname_r mbsrtowcs lgamma process_vm_writev wcsdup strlcat ((h->type == CommonInterceptorMetadata::CIMT_FILE)) != (0) BLKGETSIZE EVIOCGLED EVIOCRMFF FDFMTTRK FDGETDRVSTAT FDGETDRVTYP SNDCTL_SEQ_TESTMIDI SOUND_MIXER_READ_LINE2 SOUND_MIXER_WRITE_LINE2 default wild-addr ((second_free_stack->size)) > ((0)) SHADOW_GRANULARITY: %d Stats: malloc large: %zu ERROR: finishing a fiber switch that has not started ((tid())) == ((0)) ((AddrIsInStack((uptr)&local))) != (0) object has invalid vptr libunwind: malformed DW_CFA_val_expression DWARF unwind, reg too big WARNING: %s: LargeMmapAllocator allocation overflow: 0x%zx bytes with 0x%zx alignment requested SanitizerTool external_symbolizer_path Whether to remove the sanitizer from DYLD_INSERT_LIBRARIES to avoid passing it to children. Default is true. Enable memory leak detection. Failed to read options from '%s': error %d ((size)) != (0) DumpProcessMap End of process memory map. BUS base == 10 || base == 16 Sanitizer CHECK failed: %s:%d %s (%lld, %lld) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stackdepotbase.h ((!info || address == info->address)) != (0) addr2line Using addr2line at user-specified path: %s 0x%zx 0x%zx unaccessible unwind_backtrace_signal_arch resolution Aggregate two objects into one leak if this many stack frames match. If zero, the entire stack trace must match. out/llvm-project/compiler-rt/lib/ubsan/ubsan_diag.cpp out/llvm-project/compiler-rt/lib/ubsan/../sanitizer_common/sanitizer_common.h alignment-assumption [1m [30m bounds %0 defined here out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_list.h ((this)) != ((l)) Quarantine limits: global: %zdMb; thread local: %zdKb initialization-order-fiasco out/llvm-project/compiler-rt/lib/asan/asan_errors.cpp %s-param-overlap Minimal size (in bytes) of redzones around heap objects. Requirement: redzone >= 16, is a power of two. replace_str Enables stack-use-after-return checking at run-time. protect_shadow_gap memmem ioctl remquo __cxa_throw munlock TIOCCONS TIOCGPGRP SIOCSIFNETMASK FDGETPRM FDRESET MTIOCGET SIOCGIFENCAP SOUND_MIXER_READ_RECMASK SOUND_MIXER_WRITE_IGAIN SOUND_MIXER_WRITE_PCM SOUND_PCM_READ_CHANNELS ((size)) <= ((4096)) ((0 && "mem_is_zero returned false, but poisoned byte was not found")) != (0) quarantine_size_mb=%zuM (((((((kHighMemEnd) >> kDefaultShadowScale) + (__asan_shadow_memory_dynamic_address)) + 1) % GetMmapGranularity()))) == ((0)) AddressSanitizer exit stats: Create T%d TSDDtor ((this->stack_size())) == ((0U)) __asan_start_switch_fiber called from unknown thread DW_EH_PE_textrel pointer encoding not supported truncated uleb128 expression stack_trace_format Override the program exit status if the tool found an error ((signum)) < ((sizeof(*set) * 8)) ((MprotectNoAccess((uptr)guard_start_, guard_size_))) != (0) <can't symbolize> :%d WARNING: Symbolizer buffer too small WRITE %s can not provide additional info. Root set: include TLS and thread-specific storage %7zu %10zu %s Indirect Processing thread %d. [1m [34m implicit-signed-integer-truncation-or-sign-change function UBSAN_OPTIONS out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_quarantine.h heap ((0 && "Address is not in memory and not in shadow?")) != (0) operator delete [] ERROR: AddressSanitizer: calloc parameters overflow: count * size (%zd * %zd) cannot be represented in type size_t (thread %s) ERROR: AddressSanitizer: allocator is out of memory trying to allocate 0x%zx bytes heap-use-after-free Stack mid redzone: %s: thread_local_quarantine_size_kb can be set to 0 only when quarantine_size_mb is set to 0 quarantine_size If set, prints ASan exit stats even after program terminates successfully. start_deactivated ((AddrIsAlignedByGranularity(g->size_with_redzone))) != (0) memchr vfprintf ((ioctl_initialized)) != (0) Decoding unknown ioctl 0x%x WARNING: failed decoding unknown ioctl 0x%x getgrgid getsockopt sendmsg getcwd remquol getutid pclose uname FIOSETOWN TIOCSPGRP EVIOCSREP FDMSGON PPPIOCSMAXCID SNDCTL_DSP_NONBLOCK SOUND_MIXER_READ_CAPS SOUND_MIXER_READ_IGAIN SOUND_MIXER_READ_PCM SOUND_MIXER_WRITE_TREBLE TIOCSERGWILD TIOCSERSWILD VT_RELDISP out/llvm-project/compiler-rt/lib/asan/asan_posix.cpp kErrorMessageBufferSize >= error_message_buffer_pos invalid-posix-memalign-alignment Sleeping for %d second(s) non-virtual call vtable is of type %0 libunwind: malformed DW_CFA_restore_extended DWARF unwind, reg too big getTableEntrySize ebp out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_allocator_primary32.h %s.%zu ((read_len)) < ((buff->size())) Mention name of executable when reporting error and append executable name to logs (as in "log_path.exe_name.pid"). Only affects a 64-bit allocator. If set, tries to release unused memory to the OS, but not more often than this interval (in milliseconds). Negative values mean do not attempt to release memory to the OS. symbolize_vs_style If true, the shadow is not allowed to use huge pages. ERROR: Invalid value for int option: '%s' WARNING: found %d unrecognized flag(s): (("unable to unmap" && 0)) != (0) absolute_value || !negative ((IsOneOf(*data_.current, 's', 'p'))) != (0) ((SoftRssLimitExceededCallback)) == ((nullptr)) ((stack_bottom)) != (0) Waiting on the tracer thread failed (errno %d). Could not get regset %p from thread %d (errno %d). out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_coverage_libcdep_new.cpp <empty stack> -- %zu ) armv6 ((i)) < ((modules_.size())) invalid-builtin-use invalid-shift-exponent print_stacktrace silence_unsigned_overflow offset poison_heap ((((unsigned int)len) < sizeof(name))) != (0) is inside ERROR: AddressSanitizer: attempting free on address which was not malloc()-ed: %p in thread %s stack-use-after-scope poison_array_cookie allocator_frees_and_returns_null_on_realloc_zero === ID %d; %p %p strpbrk vfscanf wait tempnam lgammal getresgid fopen atoi ((!was_called_once)) != (0) mlock Duplicate or unsorted ioctl request id %x >= %x (%s vs %s) FIOASYNC TIOCGETD EVIOCGID FDSETMAXERRS SNDCTL_SEQ_RESETSAMPLES SOUND_MIXER_READ_RECLEV TCSBRK TCSBRKP ((frame_descr)) != (0) ABORTING double-free alloc-dealloc-mismatch out/llvm-project/compiler-rt/lib/asan/asan_stats.cpp Stats: %zuM really freed by %zu calls CIE ID is not zero out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_allocator.cpp ((0U)) == ((map_[idx])) If set, use the online symbolizer from common sanitizer runtime to turn virtual addresses to file/line locations. Write logs to "log_path.pid". The special values are "stdout" and "stderr". If unspecified, defaults to "stderr". Deprecated. True has no effect, use handle_sigbus=1. If false, handle_*=1 will be upgraded to handle_*=2. Intercept __tls_get_addr. If set, uses a wrapper for memmem() to find more errors. suppress_equal_pcs ((buffer[sizeof(buffer) - 1])) == (('\0')) ((n_flags_)) < ((kMaxFlags)) allocate noreserve FPE AppendNumber buffer overflow out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_suppressions.cpp ThreadRegistry ((tid)) != ((kUnknownTid)) SANCOV_OPTIONS --inlines Cannot use internal symbolizer: out of memory Root set: include thread registers ((!param->success)) != (0) Scanning leaked chunks. %Lg nullptr-with-offset implicit-signed-integer-truncation unreachable-call ((isMemoryLocation())) != (0) _Nonnull binding to clz() addition of unsigned offset to %0 overflowed to %1 ((size)) >= ((sizeof(QuarantineBatch))) T%d ERROR: AddressSanitizer: pvalloc parameters overflow: size 0x%zx rounded up to system page size 0x%zx cannot be represented in type size_t (thread %s) ERROR: AddressSanitizer: invalid alignment requested in aligned_alloc: %zd, alignment must be a power of two and the requested size 0x%zx must be a multiple of alignment (thread %s) ERROR: AddressSanitizer: invalid alignment requested in posix_memalign: %zd, alignment must be a power of two and a multiple of sizeof(void*) == %zd (thread %s) stack-buffer-underflow ACCESS %s: please use either 'quarantine_size' (deprecated) or quarantine_size_mb, but not both malloc_fill_byte Number of seconds to sleep after AddressSanitizer is initialized. Useful for debugging purposes (e.g. when one needs to attach gdb). Report errors on malloc/delete, new/free, new/delete[], etc. strrchr asctime_r vsprintf cs[ BLKROSET CDROMVOLREAD EVIOCGABS EVIOCGRAB HDIO_GET_MULTCOUNT PPPIOCSDEBUG SIOCADDRT SIOCSIFHWADDR SNDCTL_FM_4OP_ENABLE SNDCTL_SEQ_NRMIDIS TCGETS VT_GETSTATE VT_SENDSIG ((IsAligned(end, (1ULL << kDefaultShadowScale)))) != (0) [1m [36m || `[%p, %p]` || MidMem || asan_mapping.h:%zd -- %zd out/llvm-project/compiler-rt/lib/asan/asan_thread.cpp ((t->context())) == ((AsanTSDGet())) control flow integrity check for type %0 failed during %1 (vtable address %2) unsupported x86 register libunwind: malformed DW_CFA_def_cfa_register DWARF unwind, reg too big Can't binary search on variable length encoded data. SizeClassAllocator ((x)) != ((0U)) ((!empty())) != (0) FATAL: %s: internal allocator is out of memory trying to allocate 0x%zx bytes out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_common.cpp %s %s.%s.%zu Experimental heap profiler, asan-only If set, uses custom wrappers for strlen and strnlen functions to find more errors. exitcode ((count)) <= ((arr_size - 1)) Process memory map follows: %p-%p %s out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_common_libcdep.cpp ((to >= from)) != (0) Could not attach to thread %zu (errno %d). RemoveDieCallback(TracerThreadDieCallback) ((max_depth)) >= ((2)) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace_libcdep.cpp armv7 ((outfd)) != (0) Consider pointers found in poisoned memory to be valid. Stack at %p-%p (SP = %p). : integer-divide-by-zero alignment implicit-signed-integer-truncation,implicit-integer-sign-change constructor call on ((0 && "unexpected error type!")) != (0) assumption of %0 byte alignment (with offset of %1 byte) for pointer of type %2 failed load of value %0, which is not a valid value for type %1 implicit conversion from type %0 of value %1 (%2-bit, %3signed) to type %4 changed the value to %5 (%6-bit, %7signed) un ((getType().isSignedIntegerTy())) != (0) ' stack-use-after-return Heap left redzone: Array cookie: ((f->min_uar_stack_size_log)) <= ((f->max_uar_stack_size_log)) unmap_shadow_on_exit Check position of ASan runtime in library list (needs to be disabled when other library has to be preloaded system-wide) strncasecmp strchr recvmsg ptsname_r lgamma_r out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors_format.inc SIOCGIFBRDADDR SIOCSIFADDR EVIOCGNAME FDFMTEND PPPIOCSXASYNCMAP SOUND_MIXER_READ_TREBLE TCXONC ((tsd_key_inited)) != (0) AppendToErrorMessageBuffer ((!asan_init_is_running && "ASan init calls itself!")) != (0) ((((kMidMemBeg ? (((kMidMemBeg) >> kDefaultShadowScale) + (__asan_shadow_memory_dynamic_address)) : (((((((kHighMemEnd) >> kDefaultShadowScale) + (__asan_shadow_memory_dynamic_address)) + 1)) >> kDefaultShadowScale) + (__asan_shadow_memory_dynamic_address))) - 1))) == (((((((((kHighMemEnd) >> kDefaultShadowScale) + (__asan_shadow_memory_dynamic_address)) + 1)) >> kDefaultShadowScale) + (__asan_shadow_memory_dynamic_address)) - 1)) Stats: %zuM malloced (%zuM for red zones) by %zu calls getRegister DW_EH_PE_datarel is invalid with a datarelBase of 0 unknown register out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_allocator_secondary.h %s Strips this prefix from file paths in error reports. handle_ioctl Controls custom tool's SIGABRT handler (0 - do not registers the handler, 1 - register the handler and allow user to set own, 2 - registers the handler and block user from changing it). Format string used to render stack frames. See sanitizer_stacktrace_printer.h for the format description. Use DEFAULT to get default format. Generate html coverage report. If true, dump values of CPU registers when SEGV happens. Only available on OS X for now. /proc/self/environ UNKNOWN SIGNAL ERROR: unknown pc 0x%x (may happen if dlclose is used) 0x%zx WARNING: Command buffer too small WARNING: Failed to use and restart external symbolizer! out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_posix_libcdep.cpp swift_demangle ----------------------------------------------------- pointer-overflow nullability-assign nonnull-attribute downcast of null pointer returned from function declared to never return null ((res.trace)) != (0) ((stack)) != (0) ((IsAligned(needed_size, min_alignment))) != (0) ((rz_size)) == ((RZLog2Size(res))) thread_local_quarantine_size_kb ((free_stack->size)) > ((0)) ERROR: AddressSanitizer: attempting to call malloc_usable_size() for pointer which is not owned: %p container-overflow Freed heap region: Use mmap with 'noreserve' flag to allocate fake stack. If set, mprotect the shadow gap Print various statistics after printing an error message or if atexit=1. print_legend Print the scariness score. Experimental. atexit new_delete_type_mismatch If >= 2, detect operations like <, <=, >, >= and - on invalid pointer pairs (e.g. when pointers belong to different objects); If == 1, detect invalid operations only when both pointers are non-null. '%s' is ascii string '%s' resides in another non-instrumented module. fgets ctime_r clock_getcpuclockid opendir strtoumax fclose wcscat wcsxfrm_l strcpy mlockall TIOCOUTQ TIOCSCTTY EVIOCGEFFECTS EVIOCGKEYCODE FDSETEMSGTRESH SIOCGRARP SIOCSRARP SNDCTL_SEQ_NRSYNTHS TIOCGLCKTRMIOS TIOCSERGETLSR sigaction ((0)) == ((pthread_setspecific(tsd_key, tsd))) negative-size-param ((AddrIsInMem(stack_top_ - 1))) != (0) possibly invalid vptr libunwind: malformed DW_CFA_offset DWARF unwind, reg (%llu) out of range DW_OP_piece not implemented "@ , , U " "@ > > C C > C C C C C C C C C C C C C C C C C C > C C C C C C C C C C C > C C C C C C C C C C C C C > PPid: t! t! t! t! t! t! t! t! t! t! t! t! t! t! t! t! t! t! t! t! t! t! t! t! t! t! 0C ?2 . n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n 7 n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n n ) 2 D U c n  l x ?? ??:0 :DEADLYSIGNAL : nested bug in the same thread, aborting. stack-overflow leak:*tls_get_addr* leak ld # # $ $ * * + -+ @+ v* vptr_check ` ` ` ` ` X X X X p & @ P ` p 8 8 n n ` ; ; ; ; H Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y H Y _ Y Y Y Y H Y Y P Y Y Y Y Y P H : : : : : : : : : : : : : : 2 : : : : : : : : : : : : : : " " : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : H H H : * B " * H H : " * 2 R * : J Z j z - - - . . $. =. N. _. p. . . . . . . / (/ I/ b/ {/ / / / / 0 0 *0 ;0 E0 V0 o0 - 0 0 0 0 0 0 0 1 11 J1 c1 |1 interceptor_name interceptor_via_fun interceptor_via_lib odr_violation @ P X ` " ' , 1 6 ; @ 3 8 = V [ ` 3 e j o 9 p w 8 V K t ] K E 5 J . ] 1 d k r . y 2 ( N N N N ( \ j x h 9 e U G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G G R G G G R R ] ] h ( ( = . P ; [ H Y ` g t l , y 9 E Q f k c c c c % . 7 @ I # w . 9 # D O Z . 9 # D O Z I + + + T + ' + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + u d _ j } } } } u d _ j
T k 64 M ` H @ $ D , X 4 P T t ( RT QT !T PT 1 2 ! " T T $T T T T T T T "T T T T T #T T T T @E E E E E E E E E E @ E E E E E E @ E @ E,@ E @ E @a ` c b ^ ] _ S S S S S S S S S S S S S S S S S S S S S S A C @K G I H @ X 4 F E 4 X T X@J L @B @Y V $ & # ! % " m Xt At Zt Vt Pt Wt @@t @Yt @Qt @Rt @Ot @ S ` T % ' p ) a U & $ q 0 b C C C C C C C C C @ C @ P P P P P P T T T %T T T T T VT T T T ST YT TT UT WT T V V V V V m m @ P P P P P P P P P P P Q @ Q(@ Qt m Q Q Q Q Q Q @ Q Q @ Q Q @ Q Q @ Q @ Q Q T @ T @ T T T M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M V V V V V V p p &b b b b b W W % C W s 5G H N # W L 7 3 - = - 9b u q x - z - 7X Kb Kb - hN u u v %v $
Android (7485623, based on r416183b1) clang version 12.0.7 (https://android.googlesource.com/toolchain/llvm-project c935d99d7cf2016289302412d708641d52d2f7ee) Linker: LLD 12.0.7 (/buildbot/src/android/llvm-r416183/out/llvm-project/lld c935d99d7cf2016289302412d708641d52d2f7ee) Android (7211189, based on r416183) clang version 12.0.4 (https://android.googlesource.com/toolchain/llvm-project c935d99d7cf2016289302412d708641d52d2f7ee)
dlsym GenericScopedLock RawInternalAlloc atomic_store<__sanitizer::atomic_uintptr_t> RoundUpMapSize GetBlockBegin UpdateProcessName mask removeEdgesFrom FormatString internal_memcmp internal_ftruncate GetEnviron ThreadLister ReportMmapFailureAndDie GetType MmapNoReserveOrDie MmapFixedImpl out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_printf.cpp MmapFixedNoReserve MmapFixedNoAccess ScopedAllocatorErrorReport StackDepotPut ExtractUptr SleepForMillis ChooseChunk QuarantineCallback SetAllocContext ReportCallocOverflow GetAsanChunkByAddrFastLocked UpdateAllocationStack RePoisonChunk EnsureSortedChunks Allocation GetFakeStackFast OnMalloc __asan_stack_malloc_5 __asan_stack_free_5 internal_uname AddrHashMap __interceptor_memmem __interceptor_asctime_r __interceptor_recvmmsg __interceptor_pthread_attr_getscope __interceptor_wcsncat __sanitizer_syscall_pre_impl_symlinkat __interceptor_aligned_alloc __asan_address_is_poisoned __asan_unpoison_stack_memory ErrorAllocTypeMismatch ReportMacMzReallocUnknown GetThreadLocked SetThreadStackAndTls out/llvm-project/compiler-rt/lib/ubsan/ubsan_type_hash_itanium.cpp Reallocate ReadLongProcessName internal_memmove DD indexToNode findEdge is_space ll_strndup parse_flags internal_fstat internal_close IsAlive GetHandleSignalMode DumpListOfModules SetThreadUserId SetShadowRegionHugePageMode StripPathPrefix ParseSymbolizeFrameOutput GetLinker GetThreadRegistryLocked CheckForLeaksCallback ~ScopedReport isFloatTy AtomicContextStore ReportAllocationSizeTooBig requested_size __asan_update_allocation_context PrintGlobalLocation GetFrame RequiredSize __asan_stack_malloc_0 __asan_stack_free_8 write_mntent __interceptor_strlen __interceptor_strchr __interceptor___wait4 __interceptor_strerror __sanitizer_syscall_pre_impl_delete_module __sanitizer_syscall_pre_impl_lsetxattr __sanitizer_syscall_pre_impl_access __sanitizer_syscall_pre_impl_sysctl __interceptor_calloc PoisonShadowPartialRightRedzone __asan_unpoison_memory_region ReportInvalidPointerPair AsanCheckDynamicRTPrereqs AsanInitializer AsanDie ProtectGap __sanitizer_finish_switch_fiber IsAligned push_front internal_memcpy AllocateBatch getAndClearFirstOne CreateLogicalThread __sanitizer_get_report_path atomic_load<__sanitizer::atomic_uintptr_t> internal_mmap TranslateDigit IsHex procmapsInit ScopedSetTracerPID MprotectNoAccess SanitizerDumpCoverage WriteModuleCoverage Default inc_use_count_unsafe length out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer.cpp full_name SymbolizeFrame DemangleSwiftAndCXX ReportStackOverflowImpl ReportDeadlySignalImpl MemoryByte out/llvm-project/compiler-rt/lib/lsan/lsan_common.cpp Leak ClassifyAllChunks ProcessGlobalRegions CheckForLeaks PrintSummary IgnoredSuppressedCb InitializePlatformEarly getSourceLocation AddrIsAtLeft GetAllocatorCache GetMallocContextSize Log2 ReportSanitizerGetAllocatedSizeNotOwned UserRequestedAlignment Enqueue AsShadow out/llvm-project/compiler-rt/lib/asan/asan_flags.cpp __asan_register_globals scanf_parse_next __interceptor_vfscanf unpoison_passwd read_msghdr __interceptor_sendmmsg __interceptor_mbsrtowcs __interceptor_sem_getvalue write_protoent __sanitizer_syscall_pre_impl_lgetxattr __sanitizer_syscall_pre_impl_io_submit __sanitizer_syscall_pre_impl_swapoff __sanitizer_syscall_pre_impl_getrandom MemToShadowSize ErrorReallocArrayOverflow IsInvalidPointerPair ErrorInvalidPointerPair __asan_describe_address CheckASLR InitializeAllocator UnpoisonDefaultStack __cxx_global_var_init DeleteFakeStack getSubobjectTypeName isDerivedFromAtOffset Android (7485623, based on r416183b1) clang version 12.0.7 (https://android.googlesource.com/toolchain/llvm-project c935d99d7cf2016289302412d708641d52d2f7ee) atomic_exchange<__sanitizer::atomic_uint8_t> Lock CacheBinaryName InstallMallocFreeHooks MutexEnsureID addLock internal_atoll internal_strlcat IsPcInstrumented MemoryMappedSegment out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_procmaps_common.cpp __sanitizer_set_death_callback pthread_attr_getstack IsProcessRunning KillAllThreads SignalContext TracePcGuard hash ExtractSptr SupportsColoredOutput ReportSupportsColors Warning UnsuppressedLeakCount __lsan_unregister_root_region IsPCSuppressed InitializeFlags InitAsPlugin handleTypeMismatchImpl out/llvm-project/compiler-rt/lib/ubsan/ubsan_value.cpp GetOptions AtomicallySetQuarantineFlagIfAllocated FreeTid asan_calloc ioctl_lookup ioctl_table_lookup FixRealStrtolEndptr StrstrCheck __interceptor_puts __interceptor_pthread_attr_getdetachstate __interceptor_sincosl __interceptor_listxattr __interceptor_wcslen __sanitizer_syscall_pre_impl_sched_setaffinity __asan_poison_memory_region ScopedInErrorReport IsValid context MergeFrom FillMallocStatistics __sanitizer_get_heap_size __sanitizer_get_free_bytes MergeThreadStats stack_size AsanTSDGet UnlockThreadRegistry operator delete handleFunctionTypeMismatch Unlock internal_sched_yield onLockAfter next removeNode findPath SetReportPath operator new out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_libignore.cpp OnLibraryLoaded internal_stat GetKernelAreaSize ParseDecimal Suppression real_pthread_attr_getstack Bottom get Swap<__sanitizer::StackDepotReverseMap::IdDescPair> PlatformInit ~ScopedErrorReportLock IgnoreObjectLocked ScanRootRegion ProcessPlatformSpecificAllocations ApplySuppressions MaybePrintStackTrace InitializeCoverage handleInvalidObjCCast handlePointerOverflowImpl GetStackTraceFromId GetAsanChunkByAddr ReportInvalidFree OverheadSize FindHeapChunkByAddress asan_memalign asan_mz_force_unlock OnExit __interceptor_poll __interceptor_pthread_attr_getschedparam __interceptor_tmpnam __interceptor_fopen __interceptor_readlink __sanitizer_syscall_pre_impl_symlink __sanitizer_syscall_pre_impl_lchown __sanitizer_syscall_pre_impl_epoll_pwait __sanitizer_syscall_pre_impl_readlinkat __interceptor_posix_memalign PoisonAlignedStackMemory ErrorMallocUsableSizeNotOwned ErrorOutOfMemory ~ScopedUnwinding GetStackVariableShadowStart HandleDynamicTypeCacheMiss ComputeRegionId removeEdgesTo setAll getNumLocks copyFrom MutexDestroy CheckLocked FileExists Format IsInRange GetArgsAndEnv GetHandleSignalModeImpl IntervalsAreSeparate LoadFromCache GetMemoryProfile SetCreated SetUserDieCallback out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_allocator_checks.cpp pthread_self getlim ParseSymbolizeDataOutput ~CheckForLeaksParam Decorator handleShiftOutOfBoundsImpl handleMissingReturnImpl isInlineFloat SetRssLimitExceeded append_back SizeSub AdjacentShadowValuesAreFullyPoisoned RangesOverlap ioctl_common_pre HasReportedLeaks __interceptor_strcasecmp __interceptor_fwrite __interceptor_fprintf __interceptor_getnameinfo __interceptor_wcstombs __interceptor_initgroups __interceptor_recv __sanitizer_syscall_pre_impl_write __sanitizer_syscall_pre_impl_utimensat format_get_value_size __asan_poison_stack_memory CheckForInvalidPointerPair InitializePlatformExceptionHandlers AsanTSDInit CreateMainThread AsanTSDSet FinishSwitchFiber DynamicTypeInfo AllocationSizeRequiredForNElements MaxCachedHint push_back Refill reserve ReadFromFile internal_sigfillset out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_posix.cpp LoadedModule ParseHex SetThreadNameByUserId Trap __sanitizer_dump_coverage SanitizerCommonDecorator GetCanonicFrame UnwindFast __sanitizer_symbolize_global New LateInitializeTools arch SymbolizerProcess MaybeReportNonExecRegion ReportDeadlySignal HandleLeaks ~LeakReport GetSuppressionForStack AddLeakedChunk out/llvm-project/compiler-rt/lib/lsan/lsan_common_linux.cpp Range GetSize AsanChunkView AllocationSize IsAllocated AsanSoftRssLimitExceededCallback GetStackAddressInformation has_fake_stack __asan_stack_malloc_1 __asan_stack_malloc_3 __asan_stack_free_6 HaveStackTraceBasedSuppressions ReportStringFunctionMemoryRangesOverlap MlockIsUnsupported MemcmpInterceptorCommon __interceptor_ioctl __interceptor_clock_getcpuclockid __interceptor_waitpid __interceptor_sysinfo __interceptor_getcwd __interceptor_lgamma_r __interceptor_fclose __asan_memcpy Insert MemoryProfileCB ProcessChunk __sanitizer_contiguous_container_find_bad_address PrintCmdline operator delete[] ~GenericScopedLock Size StripModuleName ReportErrorSummary nodeToIndex Swap<__sanitizer::DeadlockDetectorTLS<__sanitizer::TwoLevelBitVector<1> >::LockWithContext> newNode FlagHandlerInclude RegisterFlag<bool> Verbosity mem_is_zero AndroidDetectApiLevel internal_read Write StripPrefix ScopedStackSpaceWithGuard internal_clone SuspendAllThreads alloc PrintAll out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_libcdep.cpp Restart LLVMSymbolizer PlatformDemangle SupportsColors ScopedErrorReportLock Min<unsigned int> LeakSuppressionContext Swap<__lsan::Leak> getTypeName SetCommonFlagsDefaults isInlineInt ReportNewDeleteTypeMismatch asan_malloc_usable_size AddressDescription PrintGlobalNameIfASCII DescribeAddressIfStack GetDescription ErrorGeneric FlagsOffset __asan_stack_malloc_6 __asan_stack_free_9 maybe_parse_length_modifier __interceptor_vsscanf printf_parse_next Min<int> GetInterceptorMetadata Handle atomic_compare_exchange_weak<__sanitizer::atomic_uint32_t> __interceptor_frexpf printf_common __interceptor_clock_settime __interceptor_ftime __interceptor_wcsdup __interceptor_setvbuf __sanitizer_syscall_pre_impl_setxattr FindDynamicShadowStart IsInDlsymAllocPool out/llvm-project/compiler-rt/lib/asan/asan_rtl.cpp MaybeStartBackgroudThread TSDDtor out/llvm-project/compiler-rt/lib/ubsan/ubsan_handlers_cxx.cpp out/llvm-project/compiler-rt/lib/ubsan/ubsan_type_hash.cpp Count PopulateFreeList CreateBatch findShortestPath findPathToLock internal_getpid GetProcessName out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_flags.cpp GetArgv MemoryRangeIsAvailable AddAddressRanges WriteOneLineToSyslog openlog AddressSpaceIsUnlimited TracerThread InitializeSancovFlags __sanitizer_cov_trace_pc_guard is_valid StackDepotReverseMap ParseSymbolizePCOutput InitializePlatformSpecificModules atomic_load_relaxed<__sanitizer::atomic_uint32_t> PrintMemorySnippet Diag atomic_store<__sanitizer::atomic_uint16_t> ForceLock PrintStats ReportMallocUsableSizeNotOwned out/llvm-project/compiler-rt/lib/asan/asan_activation.cpp FindInfoForStackVar DescribeThread PrintShadowMemoryForAddress AddrIsAlignedByGranularity atomic_compare_exchange_strong<__sanitizer::atomic_uint32_t> __interceptor_getgrnam __interceptor_getsockname __interceptor_munlockall __interceptor_strxfrm __interceptor_uname __sanitizer_syscall_pre_impl_add_key Sort<__asan::AllocationSite, (lambda at out/llvm-project/compiler-rt/lib/asan/asan_memory_profile.cpp:52:10)> ~ScopedInErrorReport SetCheckFailedCallback __sanitizer_get_current_allocated_bytes AsanThreadContext GetPthreadDestructorIterations ThreadStart MostSignificantSetBitIndex EnsureSpace MaxCached internal_strdup LeastSignificantSetBitIndex getAvailableNode ParseStringFromEnv ReserveStandardFds fallbackInit out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_posix_libcdep.cpp SetStackSizeLimitInBytes TracerThreadDieCallback out/llvm-project/compiler-rt/lib/sanitizer_common/sancov_flags.cpp id IdComparator ModuleNameOwner Symbolizer ExtractToken LLVMSymbolizerProcess InternalLowerBound<__sanitizer::InternalMmapVector<unsigned long long>, __sanitizer::CompareLess<unsigned long long> > GetCacheSize RZLog2Size SizeAdd can_merge GetFreeStack asan_mz_size DescribeAddressIfGlobal ToLower ReadUnlock __interceptor_time __interceptor_localtime_r __interceptor_asctime __interceptor_waitid __interceptor_setlocale __interceptor_ether_aton __interceptor_pthread_condattr_getpshared __interceptor___wcsxfrm_l __sanitizer_syscall_pre_impl_link __sanitizer_syscall_pre_impl_chdir __sanitizer_syscall_pre_impl_ppoll Min<signed char> __asan_get_report_address Init UnmapOrDie containsAddress DecreaseTotalMmap ReadBinaryNameCached ensureCurrentEpoch Swap<__sanitizer::DeadlockDetector<__sanitizer::TwoLevelBitVector<1> >::Edge> ReopenIfNecessary internal_strnlen Min<unsigned long long> internal_iserror ReadNullSepFileToArray RemoveANSIEscapeSequencesFromString TracerThreadArgument InternalLowerBound<__sanitizer::InternalMmapVector<__sanitizer::StackDepotReverseMap::IdDescPair>, bool (*)(const __sanitizer::StackDepotReverseMap::IdDescPair &, const __sanitizer::StackDepotReverseMap::IdDescPair &)> IsValidFrame Flush FormatAndSendCommand LockStuffAndStopTheWorld LazyInit PrintLeakedObjectsForLeak InternalLowerBound<__sanitizer::InternalMmapVector<unsigned int>, __sanitizer::CompareLess<unsigned int> > RegisterLsanFlags GetSuppressionForAddr __lsan_do_leak_check ~UndefinedBehaviorReport RenderLocation Highlight RenderSourceLocation isDisabled handleImplicitConversion isSourceLocation out/llvm-project/compiler-rt/lib/asan/asan_allocator.cpp AtomicContextLoad GetAllocContext ForceUnlock SwallowCache SetFreeContext asan_reallocarray SetShadow __asan_stack_malloc_7 __asan_addr_is_in_fake_stack __asan_unregister_globals ScopedInterceptorDisabler __interceptor_strncmp __interceptor_memcpy __interceptor_pwrite __interceptor_localtime scanf_common __interceptor_sscanf __interceptor_vsprintf __interceptor_printf __interceptor_wait3 __interceptor_pthread_rwlockattr_getpshared __interceptor_getxattr __sanitizer_syscall_pre_impl_io_getevents ReadLockSlow release ErrorDoubleFree ErrorInvalidPosixMemalignAlignment operator new[] InitLinkerInitialized Die operator[] GetHeader atomic_fetch_add<__sanitizer::atomic_uintptr_t> isHeld onLockFast intersectsWith ReportDeadlock RegisterFlag<unsigned long> internal_strlcpy atomic_exchange<__sanitizer::atomic_uint32_t> InitPcSpBp Match FindThread pthread_attr_setstacksize operator() ReleaseMemoryPagesToOS internal_sigaction_norestorer PrintHintAllocatorCannotReturnNull RenderNeedsSymbolization SendCommandImpl GetModuleNameAndOffsetForPC Unwind_GetIP InitializeSuppressions IndirectUnsuppressedLeakCount addNoOverflow OverrideCommonFlags SourceLocation ReportReallocArrayOverflow ReportPvallocOverflow QuarantineCache EnqueueBatch merge QuarantineChunk GetThreadContextByTidLocked RegisterAsanFlags exists __interceptor_strpbrk __interceptor_mlockall __interceptor_mincore __interceptor_eventfd_read __sanitizer_syscall_pre_impl_capget __sanitizer_syscall_pre_impl_truncate __sanitizer_syscall_pre_impl_fchmodat __sanitizer_syscall_pre_impl_sigaction __interceptor_strdup __interceptor_atoll out/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp SetAbortMessage ErrorSanitizerGetAllocatedSizeNotOwned ErrorStringFunctionSizeOverflow PlatformUnpoisonStacks UnwindImpl UnsetAlternateSignalStack SetAlternateSignalStack tls_end getTypeCacheHashTableBucket Clear InternalRealloc hasEdge isReachable removeLock CloseFile internal_strcspn ListOfModules IsDecimal InitAligned MmapNoAccess AddDieCallback TracerThreadSignalHandler Red Get RenderFrame SymbolizedStack RefreshModules FindModuleForAddress DemangleCXXABI pipe Addr2LinePool Addr2LineProcess GetUserBegin EnsureMainThreadIDIsCorrect ReportUnsuspendedThreads ProcessThreads ForEachExtraStackRange __lsan_do_recoverable_leak_check PrintResults isSignedIntegerTy isMinusOne looksLikeFloatCastOverflowDataV1 UsedSize atomic_compare_exchange_strong<__sanitizer::atomic_uint8_t> atomic_store<__sanitizer::atomic_uint64_t> ReportDoubleFree ComputeRZLog AddrIsInMem Calloc extract DrainAndRecycle AddrIsInHighShadow PrintShadowBytes PrintLegend GetFakeStack AddressIsPoisoned char_is_one_of __interceptor_vfprintf __interceptor_memchr write_iovec __interceptor_gmtime_r __interceptor_vasprintf write_hostent __interceptor_gethostbyname_r __interceptor_mbstowcs __interceptor_flistxattr __interceptor_pthread_setcanceltype __interceptor_setbuffer __sanitizer_syscall_pre_impl_recvmsg __sanitizer_syscall_pre_impl_newstat __sanitizer_syscall_pre_impl_lstat64 __sanitizer_syscall_pre_impl_removexattr __sanitizer_syscall_pre_impl_fchownat __sanitizer_unaligned_load64 ErrorNewDeleteTypeMismatch ErrorInvalidAlignedAllocAlignment ErrorBadParamsToAnnotateContiguousContainer out/llvm-project/compiler-rt/lib/asan/asan_suppressions.cpp set_context DTLS_Destroy StartSwitchFiber IsVptrCheckSuppressed out/llvm-project/compiler-rt/lib/interception/interception_linux.cpp GetFuncAddr InterceptFunction PointerIsMine Realloc ReadBinaryName RegisterFlag<int> IsDigit internal_open real_pthread_create ListThreads ParseNumber ReadProcMaps SetThreadName DetachThread pthread_attr_destroy GetMmapGranularity MaybeInstallSigaction out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cpp __sanitizer_dump_trace_pc_guard_coverage out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace.cpp AddressInfo InternalSymbolizer atomic_store_relaxed<__sanitizer::atomic_uintptr_t> ProcessRootRegions getText handleNonNullArg UndefinedBehaviorReport GetAsanChunk CommitBack SetUsedSize AddrIsInHighMem AddrIsInShadowGap CheckOptions SetCanPoisonMemory AsanDeactivate AsanActivate GetGlobalAddressInformation GetShadowAddressInformation __asan_stack_free_1 ReportStringFunctionSizeOverflow CharCaseCmp printf_get_value_size read_msghdr_control InitializePlatformInterceptors __interceptor_frexp __interceptor_frexpl __interceptor_accept __interceptor_sigprocmask __interceptor_ptsname_r __interceptor_sem_timedwait __sanitizer_syscall_pre_impl_futimesat __interceptor_strcat out/llvm-project/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cpp out/llvm-project/compiler-rt/lib/asan/asan_poisoning.cpp out/llvm-project/compiler-rt/lib/asan/asan_report.cpp out/llvm-project/compiler-rt/lib/asan/asan_shadow_setup.cpp ScopedUnwinding ClearShadowForThreadStackAndTLS AddRange checkDynamicType atomic_store<__sanitizer::atomic_uint8_t> CheckFailed RoundUpTo LockSlow clearBit out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_file.cpp size run_handler stat64_to_stat SuppressionAt getrlimit pthread_attr_init ShouldLogAfterPrintf internal_dup2 RegisterSancovFlags LockAll IsAllocatorOutOfMemory CheckForLeaksParam GetThreadRangesLocked PrintReportForLeak IsLinker getMemoryLocation ~SymbolizedStackHolder CommonStandaloneInit GetFlag Value handleBuiltinUnreachableImpl handleInvalidBuiltin AddrIsAtRight ReportFreeNotMalloced CheckForPvallocOverflow AllocTid FindHeapChunkByAllocBeg asan_malloc asan_valloc LockAllocator stack_size_log SizeRequiredForFrames NumberOfFrames ReserveShadowMemoryRange GlobalFilename CheckODRViolationViaPoisoning parse_number maybe_parse_number __interceptor_fputs __interceptor_lgetxattr __interceptor_strlcat __sanitizer_syscall_pre_impl_read __sanitizer_syscall_pre_impl_uselib __sanitizer_syscall_pre_impl_mkdirat __interceptor_reallocarray ShadowSegmentEndpoint ReplaceSystemMalloc AsanStats GetStackBounds GetStackFrameAccessByAddr asan_delete getVtablePrefix atomic_store_relaxed<__sanitizer::atomic_uint8_t> GetSizeClassInfo InternalMmapVector clear OpenFile Parse FindFile GetPathAssumingFileIsRelativeToExec out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_tls_get_addr.cpp SetFinished SetStarted out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_linux_libcdep.cpp GetOrInit Demangle pop_back Sort<unsigned int, __sanitizer::CompareLess<unsigned int> > AddArg Note ConvertTypeToFlagName ignoreReport ComputeUserAlignment DoRecycle Access fake_stack GC ~ScopedInterceptorDisabler __interceptor_strcmp __interceptor_strerror_r __interceptor_sigwait __interceptor__exit __interceptor_getmntent __interceptor_pthread_mutexattr_gettype __interceptor_remquof __interceptor_pthread_setcancelstate __sanitizer_syscall_pre_impl_lstat __sanitizer_syscall_pre_impl_getxattr __sanitizer_syscall_pre_impl_listxattr UseLocalPool __sanitizer_unaligned_load32 __sanitizer_unaligned_store32 Atexit InitTlsSize AsyncSignalSafeLazyInitFakeStack isValid __ubsan_handle_cfi_bad_type out/lib/compiler-rt-i386 SetAllocatorOutOfMemory pop_front internal_strlen IncreaseTotalMmap setDifference FindPathToBinary ~ThreadLister out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_procmaps_linux.cpp GetDestroyed RunCallbackForEachThreadLocked SleepForSeconds internal_fork sysconf MmapFixedSuperNoReserve StartSubprocess sched_yield valid UnlockAll SymbolizeData Magenta GetModuleNameForPc Swap<unsigned long long> getObjCClassName handleIntegerOverflowImpl<__ubsan::Value> ComputeUserRequestedAlignmentLog RunMallocHooks ReportInvalidAlignedAllocAlignment GetBlockBeginFastLocked FastPoisonShadowPartialRightRedzone asan_mz_force_lock UnlockAllocator RegisterActivationFlags BytesInSizeClass ModuloNumberOfFrames CharCmpX format_get_char_size EnableInThisThread __interceptor_mktime __interceptor_clock_gettime __interceptor_inet_aton __interceptor_ether_ntoa __interceptor_remquol __interceptor_strxfrm_l __sanitizer_syscall_pre_impl_capset __sanitizer_syscall_pre_impl_fsetxattr __sanitizer_syscall_pre_impl_chmod __sanitizer_syscall_pre_impl_open AllocateFromLocalPool __asan_region_is_poisoned MaybeReexec internal_memset CheckForCallocOverflow AllocateRegion internal_allocator Destroy SpinMutex Printf out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_platform_limits_posix.cpp SetName ContainsTid ThreadSuspender StopTheWorld GetRegistersAndSP Sort<unsigned long, __sanitizer::CompareLess<unsigned long> > InitTracePcGuard out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stackdepot.cpp LocatePcInTrace out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace_printer.cpp ChooseExternalSymbolizer ReportTopLeaks __lsan_ignore_object Black InitAsStandaloneIfNecessary operator<< handleVLABoundNotPositive handleFloatCastOverflow getUIntValue getSIntValue Beg AsanInitFromRtl IsItaniumABIArrayCookie RZSize2Log __asan_locate_address GetShadowKind GetGlobalsForAddress AddrIsInFakeStack SavedFlagPtr __asan_stack_free_7 IsODRViolationSuppressed StopInitOrderChecking QuickCheckForUnpoisonedRegion scanf_get_value_size RealStrLen __interceptor_fread unpoison_tm __interceptor_modfl __interceptor_fdopen __sanitizer_syscall_pre_impl_clock_nanosleep __sanitizer_syscall_pre_impl_semtimedop __sanitizer_syscall_pre_impl_move_pages __sanitizer_syscall_pre_impl_linkat __interceptor_pthread_create InitializeAsanInterceptors SetSoftRssLimitExceededCallback CanUnwind __sanitizer_print_stack_trace GetAsanThreadContext empty GetUser ReportInternalAllocatorOutOfMemory hasAllEdges RoundDownTo internal_strstr internal_sigprocmask DecorateMapping internal_dup IsAbsolutePath HasSuppressionType QuarantinePop SetDestroyed AndroidLogInit WaitForProcess Append ThreadCount ~ScopedSetTracerPID out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_unwind_linux_libcdep.cpp WordIsPoisoned GetSanititizerToolName Location handleDivremOverflowImpl atomic_load<__sanitizer::atomic_uint64_t> SharedInitCode atomic_load_relaxed<__sanitizer::atomic_uintptr_t> Max<unsigned int> tid FlushUnneededASanShadowMemory PrintInternalAllocatorStats Recycle out/llvm-project/compiler-rt/lib/asan/asan_globals.cpp write_pollfd InitializeSignalInterceptors __interceptor_strndup __interceptor_pthread_getschedparam __interceptor_pthread_attr_getschedpolicy __interceptor_tempnam __sanitizer_syscall_pre_impl_fremovexattr __sanitizer_syscall_pre_impl_pivot_root __interceptor_free __interceptor_malloc __interceptor_realloc AsanPoisonOrUnpoisonIntraObjectRedzone AsanCheckFailed setUnwinding dtls getDynamicTypeInfoFromObject RawInternalFree Add CopyToArray set setBit internal_snprintf InitializeCommonFlags ~ListOfModules internal_filesize GetCodeRangeForFile Describe AppendPointer internal_memchr Next internal_ptrace SetDefaults StackDepotUnlockAll WriteToSymbolizer ParseFileLineInfo CanBeAHeapPointer ~StackDepotReverseMap atomic_store_relaxed<__sanitizer::atomic_uint32_t> Sort<unsigned long long, __sanitizer::CompareLess<unsigned long long> > PrintMatchedSuppressions isIntegerTy IsQuarantined Unwind AddrIsInMidMem PoisonShadow CheckAlignedAllocAlignmentAndSize ReportInvalidPosixMemalignAlignment Purge AddrIsInLowShadow GetCurrentTidOrInvalid ForEachFakeFrame __asan_stack_free_0 ReportODRViolation format_is_float_conv __interceptor_vprintf GetTid MaybeRealStrnlen calcHash __interceptor_strptime __interceptor_vsnprintf __interceptor_getsockopt __interceptor_readdir_r __interceptor_stat __interceptor_wcscat __interceptor_regcomp __interceptor_regfree __sanitizer_syscall_pre_impl_fgetxattr __sanitizer_syscall_pre_impl_io_setup __sanitizer_syscall_pre_impl_migrate_pages __sanitizer_syscall_pre_impl_perf_event_open __interceptor_strcpy __interceptor_valloc __sanitizer_unaligned_store16 AsanInitInternal __asan_extra_spill_area out/llvm-project/compiler-rt/lib/asan/asan_stack.cpp PrintMallocStatsArray AddrIsInStack LockThreadRegistry Report Max<unsigned long> Allocate MmapAlignedOrDieOnFatalError __sanitizer_install_malloc_and_free_hooks out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_deadlock_detector1.cpp nodeToEpoch skip_whitespace parse_flag MemoryMappingLayout SuppressionCount GetMatched out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_thread_registry.cpp GetTls MapDynamicShadow internal__exit internal_waitpid SuspendThread add lock tryAlloc store out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_libbacktrace.cpp StartSymbolizerSubprocess IsReadable ScanRangeForPointers CollectLeaksCb GetFreeContext GetCurrentThread quarantined_size __sanitizer_get_ownership ReInitializeAllocator AsanGetStack __asan_stack_malloc_2 __asan_stack_free_2 PoisonRedZones RegisterGlobal __asan_before_dynamic_init out/llvm-project/compiler-rt/lib/asan/asan_interceptors.cpp ioctl_request_fixup __interceptor_strcspn __interceptor_inet_pton __interceptor_wcsxfrm_l __interceptor_popen __interceptor_pclose __sanitizer_syscall_pre_impl_llistxattr __sanitizer_syscall_pre_impl_swapon __sanitizer_syscall_pre_impl_spu_create __sanitizer_syscall_pre_impl_unlinkat __sanitizer_syscall_pre_impl_newfstatat __sanitizer_syscall_pre_impl_fstatat64 out/llvm-project/compiler-rt/lib/asan/asan_memory_profile.cpp __sanitizer_unaligned_load16 __sanitizer_annotate_contiguous_container __asan_set_error_report_callback FlushToDeadThreadStats __sanitizer_start_switch_fiber atomic_load<__sanitizer::atomic_uint8_t> TryLock ClassIdToSize check_idx onFirstLock Swap<unsigned long> RegisterFlag<__sanitizer::HandleSignalMode> SetVerbosity InitializePlatformCommonFlags out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_flag_parser.cpp atomic_load<__sanitizer::atomic_uint32_t> ParseString IsSpace dl_iterate_phdr internal_start_thread CallPrintfAndReportCallback LogMessageOnPrintf SuppressionContext my_pthread_attr_getstack init internal_sigaltstack Dump ~ScopedAllocatorErrorReport storage_size Put FindModuleNameAndOffsetForAddress LateInitialize dlopen UnwindSlow Bold handleNegateOverflowImpl out/llvm-project/compiler-rt/lib/ubsan/ubsan_monitor.cpp atomic_load<__sanitizer::atomic_uint16_t> AllocatorMayReturnNull RssLimitExceeded GetCurrentThreadStats out/llvm-project/compiler-rt/lib/asan/asan_debugging.cpp out/llvm-project/compiler-rt/lib/asan/asan_fake_stack.cpp __asan_stack_free_4 __interceptor_memset __interceptor_memmove __interceptor_getpeername __interceptor_pthread_mutexattr_getpshared __interceptor_ttyname_r __interceptor_sincos __interceptor_getresuid __sanitizer_syscall_pre_impl_recvmmsg __sanitizer_syscall_pre_impl_unlink __sanitizer_syscall_pre_impl_mknodat __interceptor_strncat __interceptor_atoi __asan_memmove asan_free AsanOnDeadlySignal stack_top checkTypeInfoEquality IsPowerOfTwo InitCache Initialize ~InternalMmapVector ReadProcessName ReadFileToBuffer atomic_store<__sanitizer::atomic_uint32_t> internal_readlink out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_linux.cpp syscall data IsWritable FindThreadContextByOsIDLocked internal_sigaction SetAddressSpaceUnlimited MaybeCallSancovDefaultOptions Error PersistentAlloc __sanitizer_get_module_and_offset_for_pc StripFunctionName MaybeDumpInstructionBytes ForEachChunk Sort<__lsan::Leak, bool (*)(const __lsan::Leak &, const __lsan::Leak &)> Blue ReportIfNotSuspended isMemoryLocation __ubsan_get_current_report_data RunFreeHooks ReportAllocTypeMismatch ReportRssLimitExceeded asan_pvalloc __asan_stack_free_10 __asan_get_current_fake_stack IsAddressNearGlobal UnregisterGlobal DisableInThisThread __interceptor_fgets __interceptor_modf __interceptor_fgetxattr __interceptor_strlcpy __sanitizer_syscall_pre_impl_stat64 __sanitizer_syscall_pre_impl_chroot __sanitizer_syscall_pre_impl_rename __sanitizer_syscall_pre_impl_openat __sanitizer_syscall_pre_impl_rt_sigaction __interceptor_strncpy InitializeCommonInterceptors __interceptor_pvalloc ErrorDescription DisableCoreDumperIfNecessary UnpoisonStack UnpoisonFakeStack GetAccumulatedStats OnCreated ThreadStackContainsAddress CanAllocate DestroyBatch Min<unsigned long> resize idx0 check_node Iterator FlagHandler out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_libc.cpp capacity RoundUpToPowerOfTwo GetRandom internal_prctl SetJoined QuarantinePush StackSizeIsUnlimited __sanitizer_cov_dump __sanitizer_cov_reset eq use_count GetModuleAndOffsetForPc ClearAll SearchForModule DemangleSwift PrintMemoryByte PointsIntoChunk ProcessRootRegion InitCommonLsan getauxval MaybeReportErrorSummary out/llvm-project/compiler-rt/lib/ubsan/ubsan_init.cpp handleAlignmentAssumptionImpl isUnsignedIntegerTy getFloatValue asan_realloc Transfer GetAllocStack ParseFrameDescription Address PrintShadowByte __asan_stack_free_3 ReadLock Swap<ioctl_desc> __interceptor_strtok __interceptor_strrchr __interceptor_scanf __interceptor_clock_getres __interceptor_pthread_attr_getstack __interceptor_getresgid MaybeInDlsym PosixMemalignFromLocalPool SuppressErrorReport ErrorDeadlySignal __cxx_global_var_init.23 stack_bottom GetActuallyAllocatedSize idx1 hasNext RegisterIncludeFlags IsExecutable SharedPrintfCodeNoBuffer Reset ThreadContextBase JoinThread GetThreadStackTopAndBottom Sort<__sanitizer::StackDepotReverseMap::IdDescPair, bool (*)(const __sanitizer::StackDepotReverseMap::IdDescPair &, const __sanitizer::StackDepotReverseMap::IdDescPair &)> Print GetThreadSelf __invoke InitAsStandalone out/llvm-project/compiler-rt/lib/ubsan/ubsan_handlers.cpp SetErrnoToENOMEM AddrIsInLowMem ReportOutOfMemory IsSpecialCaseOfOperatorNew0 ReInitialize ErrorBase PoisonAll __asan_alloca_poison PoisonShadowForGlobal created __interceptor_pread __interceptor_write __interceptor_getaddrinfo __interceptor_sigpending __interceptor_freopen __interceptor_munlock __sanitizer_syscall_pre_impl_rmdir asan_thread_start out/llvm-project/compiler-rt/lib/asan/asan_linux.cpp DeallocateFromLocalPool Swap<__asan::AllocationSite> ReportError SetPrintfAndReportCallback GetAsanThreadByOsIDLocked RawInternalRealloc GetSizeClass MmapOrDieOnFatalError SetFromArray InternalCalloc internal_strncpy onLockBefore nodeToIndexUnchecked MutexAfterLock ReadFileToVector ReportUnrecognizedFlags internal_write internal_lstat internal_munmap MapFileToMemory AppendNumber FindThreadContextLocked FinishThread UnmapFromTo find GetPreviousInstructionPc SendCommand CatastrophicErrorWrite pointer_alignment GetCallerPC GetSortedSuppressedStacks LeakComparator ubsan_GetStackTrace getSymbolizedLocation handleNonNullReturn MemToShadow OnMap out/llvm-project/compiler-rt/lib/asan/asan_descriptions.cpp __asan_stack_malloc_8 read_pollfd DeleteInterceptorMetadata atomic_fetch_sub<__sanitizer::atomic_uint32_t> __interceptor_inet_ntop __interceptor_wcsrtombs __interceptor_pthread_sigmask __interceptor_remquo __interceptor_lgamma __interceptor_wcsxfrm __sanitizer_syscall_pre_impl_lremovexattr __sanitizer_syscall_pre_impl_faccessat ReallocFromLocalPool __sanitizer_unaligned_store64 MmapOrDieQuietly ErrorInvalidAllocationAlignment SetLowLevelAllocateCallback InstallDeadlySignalHandlers isUnwinding Deallocate PopulateBatches InternalAlloc InternalReallocArray DeallocateBatch getLocks Create internal_strcmp internal_strncat TemplateMatch GetMaxUserVirtualAddress internal_strncmp DumpProcessMap AppendChar AppendString append CacheMemoryMappings FindThreadContextByOsIdCallback CreateThread GetTlsSize ~RunOnDestruction internal_getppid __sanitizer_cov_trace_pc_guard_init ColorizeReports atomic_compare_exchange_weak<__sanitizer::atomic_uintptr_t> load StackTrace SymbolizerTool InitializeSwiftDemangler SanitizerInitializeUnwinder GetSuppressionContext DoRecoverableLeakCheck PrintStackTraceById FloodFillTag out/llvm-project/compiler-rt/lib/ubsan/ubsan_diag.cpp getType BufferedStackTrace ScopedReport acquire isNegative getIntegerBitWidth handleCFIBadIcall GetAllocStackId CheckPosixMemalignAlignment AddrIsInside MergeBatches out/llvm-project/compiler-rt/lib/asan/asan_errors.cpp AddrIsInMidShadow GetFlags SanitizerBreakOptimization CheckODRViolationViaIndicator ioctl_common_post format_is_integer_conv __interceptor_strspn __interceptor_gethostbyaddr __interceptor_modff __interceptor_readdir __interceptor_realpath __interceptor_llistxattr __interceptor_send __interceptor_wcsnlen __sanitizer_syscall_pre_impl_chown __sanitizer_syscall_pre_impl_timerfd_settime __interceptor___cxa_atexit ErrorCallocOverflow getDynamicTypeInfoFromVtable MmapOrDie RawWrite internal_strrchr __sanitizer_acquire_crash_state onUnlock addEdges RegisterFlag<const char *> internal_simple_strtoll back AndroidGetApiLevel MmapNamed AppendUnsigned ParseFromFile pthread_getattr_np internal_execve ResumeAllThreads ~StopTheWorldScope atomic_compare_exchange_strong<__sanitizer::atomic_uintptr_t> RenderData ModuleArchToString GetOwnedCopy LocalInfo IsAccessibleMemoryRange DoLeakCheck ConvertTypeToString CommonInit handleLoadInvalidValue getFloatBitWidth Set asan_posix_memalign PrintAccessAndVarIntersection AddrIsInShadow SizeRequiredForFlags OnFree __asan_stack_malloc_10 __interceptor_read __interceptor_opendir StrtolFixAndCheck __interceptor_pthread_attr_getguardsize __interceptor_lgammaf __interceptor_lgammal __interceptor_mlock __sanitizer_syscall_pre_impl_timer_settime __sanitizer_syscall_pre_impl_sigaltstack ReportBadParamsToAnnotateContiguousContainer out/llvm-project/compiler-rt/lib/asan/asan_posix.cpp ErrorStringFunctionMemoryRangesOverlap StackDepotGetStats __asan_print_accumulated_stats proc_yield SetAllocatorMayReturnNull InternalScopedString nodeBelongsToCurrentEpoch getLock RegisterCommonFlags instrumented internal_getdents StartThread WriteToSyslog AdjustStackSize ~ScopedStackSpaceWithGuard SuspendedThreadsListLinux RemoveDieCallback out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_coverage_libcdep_new.cpp out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_allocator_report.cpp IsSameModule ExtractInt CreateTwoHighNumberedPipes dlerror SortAndDedup<__sanitizer::InternalMmapVector<unsigned int>, __sanitizer::CompareLess<unsigned int> > isInvalid Green ~Diag GetFreeStackId CanPoisonMemory End SetErrnoOnNull DisabledInThisThread ReportInvalidAllocationAlignment DequeueBatch OnUnmap GetAllocatorOptions allocated stack_trace_id __asan_stack_malloc_4 __asan_stack_malloc_9 maybe_parse_param_index __interceptor_prctl __interceptor_gmtime __interceptor_getgroups __interceptor_pthread_attr_getstacksize __interceptor_sincosf __interceptor_lgammaf_r __interceptor___strxfrm_l __interceptor_setbuf __interceptor_regexec __sanitizer_syscall_pre_impl_clock_settime __sanitizer_syscall_pre_impl_init_module __sanitizer_syscall_pre_impl_stat __sanitizer_syscall_pre_impl_pwrite64 __sanitizer_syscall_pre_impl_mkdir __sanitizer_syscall_pre_impl_request_key __sanitizer_syscall_pre_impl_renameat ErrorAllocationSizeTooBig InitializeHighMemEnd InitializeShadowMemory out/llvm-project/compiler-rt/lib/asan/asan_stats.cpp out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_allocator.cpp ClassID front InternalFree operator!= check setIntersection MutexBeforeLock internal_strchrnul ParseFile end ShouldMockFailureToOpen internal_lseek out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_suppressions.cpp ThreadRegistry out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_termination.cpp dl_iterate_phdr_cb internal_madvise ~SuspendedThreadsListLinux ~ThreadSuspender StackDepotLockAll RenderModuleLocation SymbolizePC MaybeDumpRegisters Unwind_Trace InitializeRootRegions Swap<unsigned int> subtractNoOverflow upperBound out/llvm-project/compiler-rt/lib/ubsan/ubsan_flags.cpp handleOutOfBoundsImpl asan_aligned_alloc DescribeAddressRelativeToGlobal PrintContainerOverflowHint __asan_after_dynamic_init IsInterceptorSuppressed IsStackTraceSuppressed ReportGenericError __interceptor_strncasecmp __interceptor_ctime __interceptor_ctime_r __interceptor_getpwnam __interceptor_getitimer __interceptor_wait write_msghdr __interceptor_times __interceptor_sendto __interceptor_readlinkat __interceptor_getprotobyname __interceptor_regerror __interceptor_sigaltstack __sanitizer_syscall_pre_impl_mknod __sanitizer_syscall_pre_impl_readlink Sort<ioctl_desc, ioctl_desc_compare> __interceptor_memalign PrintZoneForPointer AsanCheckIncompatibleRT extra_spill_area out/llvm-project/compiler-rt/lib/asan/asan_thread.cpp DTLS_Get tls_begin Sub SetLowLevelAllocateMinAlignment out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_common.cpp AddressRange getBit GetReportPath internal_strchr IsPathSeparator AppendSignedDecimal GetNumberOfThreads atomic_fetch_add<__sanitizer::atomic_uint32_t> out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_common_libcdep.cpp clearOrInit GetThreadStackAndTls internal_sigdelset MurMur2HashBuilder Distance out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace_libcdep.cpp __sanitizer_symbolize_pc out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_report.cpp LeakReport Initializer RegisterUbsanFlags getPositiveIntValue malloc_storage __sanitizer_get_allocated_size asanThreadRegistry AsanThreadIdAndName GetAccessToHeapChunkInformation FindThreadByStackAddress GetHeapAddressInformation PrintAddressDescription OnStackUnwind ReportGlobal FindRegistrationSite __interceptor_vscanf ioctl_decode ~Handle SetCurrentThread ioctl_init __interceptor_memrchr __interceptor_fscanf __interceptor_setitimer __sanitizer_syscall_pre_impl_creat __sanitizer_syscall_pre_impl_quotactl __sanitizer_syscall_pre_impl_msgsnd __sanitizer_syscall_pre_impl_inotify_add_watch DTLS_on_libc_memalign __interceptor___libc_memalign HeapProfile ~HeapProfile StartReportDeadlySignal ErrorFreeNotMalloced DescribeAddressIfHeap AppendToErrorMessageBuffer AsanDoesNotSupportStaticLinkage PrintAddressSpaceLayout PrintAccumulatedStats Drain atomic_fetch_sub<__sanitizer::atomic_uintptr_t> addAddressRange setUnion findLockContext getData MutexBeforeUnlock WriteToFile GetEnv ParseBool AddIgnoredLibrary GetPcSpBp VSNPrintf SetDead GetMaxAliveThreads MmapFixed GetThreadID StopTheWorldScope GetCoverageFilename unlock out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_posix_libcdep.cpp ChooseSymbolizerTools StackDepotGet ProcessPC MarkInvalidPCCb DoRecoverableLeakCheckVoid __lsan_register_root_region getKind getCallerLocation RegisterUndefinedBehaviorReport FromPrimary __sanitizer_purge_allocator SetMallocContextSize OverrideFromActivationFlags PrintHeapChunkAccess MaybeDemangleGlobalName DescribeAddressIfShadow Scare FastPoisonShadow maybe_parse_number_or_star __interceptor_strnlen __interceptor_strchrnul read_iovec unpoison_group __interceptor_fflush __interceptor_recvfrom __sanitizer_syscall_pre_impl_acct __sanitizer_syscall_pre_impl_sched_setparam __sanitizer_syscall_pre_impl_rt_sigtimedwait __sanitizer_syscall_pre_impl_newlstat __interceptor_atol __asan_memset Max<signed char> ErrorPvallocOverflow ErrorRssLimitExceeded ErrorODRViolation __asan_handle_no_return SetTLSFakeStack out/llvm-project/compiler-rt/lib/asan/asan_new_delete.cpp
.note.android.ident .note.gnu.build-id .dynsym .gnu.version .gnu.version_r .gnu.hash .dynstr .rel.dyn .rel.plt .rodata .eh_frame_hdr .eh_frame .text .plt .tbss .data.rel.ro .fini_array .init_array .dynamic .got .got.plt .data .bss .comment .debug_abbrev .debug_info .debug_str .debug_line .debug_ranges .debug_aranges .symtab .shstrtab .strtab
crtbegin_so.c __dso_handle_const __on_dlclose __on_dlclose_late ndk_build_number ndk_version note_android_ident note_data note_end note_name interception_linux.cpp interception_mac.cpp interception_win.cpp interception_type_test.cpp sanitizer_allocator.cpp _ZN11__sanitizerL22internal_alloc_init_muE _ZN11__sanitizerL23allocator_out_of_memoryE _ZN11__sanitizerL24internal_allocator_cacheE _ZN11__sanitizerL24low_level_alloc_callbackE _ZN11__sanitizerL25allocator_may_return_nullE _ZN11__sanitizerL26internal_alloc_placeholderE _ZN11__sanitizerL27internal_allocator_cache_muE _ZN11__sanitizerL29low_level_alloc_min_alignmentE _ZN11__sanitizerL30internal_allocator_initializedE _ZN11__sanitizerL34ReportInternalAllocatorOutOfMemoryEm sanitizer_common.cpp _ZN11__sanitizerL14g_total_mmapedE _ZN11__sanitizerL21binary_name_cache_strE _ZN11__sanitizerL22process_name_cache_strE _ZN11__sanitizerL7MFHooksE _ZZ31__sanitizer_acquire_crash_stateE14in_crash_state _ZZN11__sanitizer23ReportMmapFailureAndDieEmPKcS1_ibE15recursion_count sanitizer_deadlock_detector1.cpp sanitizer_deadlock_detector2.cpp sanitizer_errno.cpp sanitizer_file.cpp sanitizer_flags.cpp sanitizer_flag_parser.cpp sanitizer_fuchsia.cpp sanitizer_libc.cpp sanitizer_libignore.cpp sanitizer_linux.cpp _ZN11__sanitizerL17android_api_levelE _ZN11__sanitizerL23dl_iterate_phdr_test_cbEP12dl_phdr_infojPv _ZZN11__sanitizer12ThreadLister7IsAliveEiE7kPrefix _ZZN11__sanitizer6GetEnvEPKcE3len _ZZN11__sanitizer6GetEnvEPKcE6inited _ZZN11__sanitizer6GetEnvEPKcE7environ sanitizer_linux_s390.cpp sanitizer_mac.cpp sanitizer_netbsd.cpp sanitizer_persistent_allocator.cpp sanitizer_platform_limits_freebsd.cpp sanitizer_platform_limits_linux.cpp sanitizer_platform_limits_netbsd.cpp sanitizer_platform_limits_posix.cpp sanitizer_platform_limits_solaris.cpp sanitizer_posix.cpp sanitizer_printf.cpp _ZN11__sanitizerL12AppendNumberEPPcPKcyhhbbb _ZN11__sanitizerL16SharedPrintfCodeEbPKcPc _ZN11__sanitizerL23PrintfAndReportCallbackE _ZN11__sanitizerL24SharedPrintfCodeNoBufferEbPciPKcS0_ sanitizer_procmaps_common.cpp _ZN11__sanitizerL10cache_lockE _ZN11__sanitizerL21cached_proc_self_mapsE sanitizer_procmaps_bsd.cpp sanitizer_procmaps_fuchsia.cpp sanitizer_procmaps_linux.cpp sanitizer_procmaps_mac.cpp sanitizer_procmaps_solaris.cpp sanitizer_rtems.cpp sanitizer_solaris.cpp sanitizer_stoptheworld_fuchsia.cpp sanitizer_stoptheworld_mac.cpp sanitizer_suppressions.cpp sanitizer_tls_get_addr.cpp sanitizer_thread_registry.cpp sanitizer_type_traits.cpp sanitizer_win.cpp sanitizer_termination.cpp _ZN11__sanitizerL15UserDieCallbackE _ZN11__sanitizerL19CheckFailedCallbackE _ZN11__sanitizerL20InternalDieCallbacksE _ZZN11__sanitizer11CheckFailedEPKciS1_yyE9num_calls sanitizer_common_libcdep.cpp _ZN11__sanitizerL19sandboxing_callbackE _ZN11__sanitizerL28SoftRssLimitExceededCallbackE sanitizer_allocator_checks.cpp sanitizer_linux_libcdep.cpp _ZN11__sanitizerL18dl_iterate_phdr_cbEP12dl_phdr_infojPv _ZN11__sanitizerL23android_log_initializedE sanitizer_mac_libcdep.cpp sanitizer_posix_libcdep.cpp _ZN11__sanitizerL21MaybeInstallSigactionEiPFviPvS0_E _ZN11__sanitizerL6setlimEim sanitizer_stoptheworld_linux_libcdep.cpp _ZN11__sanitizerL10old_sigsetE _ZN11__sanitizerL12TracerThreadEPv _ZN11__sanitizerL14blocked_sigsetE _ZN11__sanitizerL23TracerThreadDieCallbackEv _ZN11__sanitizerL25TracerThreadSignalHandlerEiPNS_19__sanitizer_siginfoEPv _ZN11__sanitizerL25thread_suspender_instanceE _ZZNK11__sanitizer25SuspendedThreadsListLinux17GetRegistersAndSPEmPNS_18InternalMmapVectorImEEPmENK3$_0clEm sanitizer_stoptheworld_netbsd_libcdep.cpp sancov_flags.cpp sanitizer_coverage_fuchsia.cpp sanitizer_coverage_libcdep_new.cpp _ZN8__sancov12_GLOBAL__N_119WriteModuleCoverageEPcPKcPKmm _ZN8__sancov12_GLOBAL__N_119pc_guard_controllerE _ZN8__sancov12_GLOBAL__N_15MagicE _ZZN11__sanitizer18InitializeCoverageEbPKcE16coverage_enabled sanitizer_coverage_win_sections.cpp sanitizer_allocator_report.cpp sanitizer_stackdepot.cpp _ZN11__sanitizerL8theDepotE sanitizer_stacktrace.cpp sanitizer_stacktrace_libcdep.cpp sanitizer_stacktrace_printer.cpp _ZN11__sanitizerL14kDefaultFormatE sanitizer_stacktrace_sparc.cpp sanitizer_symbolizer.cpp sanitizer_symbolizer_libbacktrace.cpp sanitizer_symbolizer_libcdep.cpp _ZN11__sanitizerL17ParseFileLineInfoEPNS_11AddressInfoEPKc sanitizer_symbolizer_mac.cpp sanitizer_symbolizer_markup.cpp sanitizer_symbolizer_posix_libcdep.cpp _ZN11__sanitizerL16swift_demangle_fE sanitizer_symbolizer_report.cpp _ZN11__sanitizerL16reporting_threadE _ZN11__sanitizerL26CommonSanitizerReportMutexE _ZZN11__sanitizer21ScopedErrorReportLockC1EvE3msg _ZZN11__sanitizer23StartReportDeadlySignalEvE13kDeadlySignal _ZZN11__sanitizerL23ReportStackOverflowImplERKNS_13SignalContextEjPFvS2_PKvPNS_18BufferedStackTraceEES4_E12kDescription sanitizer_symbolizer_win.cpp sanitizer_unwind_linux_libcdep.cpp _ZN11__sanitizer12_GLOBAL__N_112Unwind_TraceEP15_Unwind_ContextPv sanitizer_unwind_win.cpp lsan_common.cpp _ZN6__lsanL11ResetTagsCbEmPv _ZN6__lsanL12PrintResultsERNS_10LeakReportE _ZN6__lsanL12root_regionsE _ZN6__lsanL13CheckForLeaksEv _ZN6__lsanL14CollectLeaksCbEmPv _ZN6__lsanL15MarkInvalidPCCbEmPv _ZN6__lsanL15suppression_ctxE _ZN6__lsanL16CollectIgnoredCbEmPv _ZN6__lsanL16kStdSuppressionsE _ZN6__lsanL16kSuppressionLeakE _ZN6__lsanL17kSuppressionTypesE _ZN6__lsanL18has_reported_leaksE _ZN6__lsanL19IgnoredSuppressedCbEmPv _ZN6__lsanL20ReportIfNotSuspendedEPN11__sanitizer17ThreadContextBaseEPv _ZN6__lsanL21CheckForLeaksCallbackERKN11__sanitizer20SuspendedThreadsListEPv _ZN6__lsanL22MarkIndirectlyLeakedCbEmPv _ZN6__lsanL23suppression_placeholderE _ZZN6__lsan11DoLeakCheckEvE12already_done _ZZN6__lsan21InitializeRootRegionsEvE11placeholder _ZZN6__lsanL14ProcessThreadsERKN11__sanitizer20SuspendedThreadsListEPNS0_18InternalMmapVectorImEEEN3$_08__invokeEPvS8_mS8_ lsan_common_fuchsia.cpp lsan_common_linux.cpp _ZN6__lsanL11kLinkerNameE _ZN6__lsanL18linker_placeholderE _ZN6__lsanL28ProcessGlobalRegionsCallbackEP12dl_phdr_infojPv _ZN6__lsanL32LockStuffAndStopTheWorldCallbackEP12dl_phdr_infojPv _ZN6__lsanL6linkerE lsan_common_mac.cpp ubsan_diag.cpp _ZL10RenderTextPN11__sanitizer20InternalScopedStringEPKcPKN7__ubsan4Diag3ArgE _ZL10kVptrCheck _ZL10upperBoundmPN7__ubsan5RangeEj _ZL15suppression_ctx _ZL17kSuppressionTypes _ZL23suppression_placeholder ubsan_init.cpp _ZL13ubsan_init_mu _ZL17ubsan_initialized ubsan_flags.cpp ubsan_handlers.cpp _ZL16handleNonNullArgPN7__ubsan14NonNullArgDataENS_13ReportOptionsEb _ZL17handleCFIBadIcallPN7__ubsan16CFICheckFailDataEmNS_13ReportOptionsE _ZL19handleNonNullReturnPN7__ubsan17NonNullReturnDataEPNS_14SourceLocationENS_13ReportOptionsEb _ZL20handleInvalidBuiltinPN7__ubsan18InvalidBuiltinDataENS_13ReportOptionsE _ZL21handleInvalidObjCCastPN7__ubsan15InvalidObjCCastEmNS_13ReportOptionsE _ZL21handleOutOfBoundsImplPN7__ubsan15OutOfBoundsDataEmNS_13ReportOptionsE _ZL22handleLoadInvalidValuePN7__ubsan16InvalidValueDataEmNS_13ReportOptionsE _ZL22handleTypeMismatchImplPN7__ubsan16TypeMismatchDataEmNS_13ReportOptionsE _ZL23handleFloatCastOverflowPvmN7__ubsan13ReportOptionsE _ZL23handleMissingReturnImplPN7__ubsan15UnreachableDataENS_13ReportOptionsE _ZL24handleDivremOverflowImplPN7__ubsan12OverflowDataEmmNS_13ReportOptionsE _ZL24handleImplicitConversionPN7__ubsan22ImplicitConversionDataENS_13ReportOptionsEmm _ZL24handleNegateOverflowImplPN7__ubsan12OverflowDataEmNS_13ReportOptionsE _ZL25handleIntegerOverflowImplIN7__ubsan5ValueEEvPNS0_12OverflowDataEmPKcT_NS0_13ReportOptionsE _ZL25handlePointerOverflowImplPN7__ubsan19PointerOverflowDataEmmNS_13ReportOptionsE _ZL25handleVLABoundNotPositivePN7__ubsan12VLABoundDataEmNS_13ReportOptionsE _ZL26handleShiftOutOfBoundsImplPN7__ubsan20ShiftOutOfBoundsDataEmmNS_13ReportOptionsE _ZL28handleBuiltinUnreachableImplPN7__ubsan15UnreachableDataENS_13ReportOptionsE _ZL29handleAlignmentAssumptionImplPN7__ubsan23AlignmentAssumptionDataEmmmNS_13ReportOptionsE ubsan_monitor.cpp _ZL10CurrentUBR ubsan_value.cpp asan_allocator.cpp _ZN6__asanL10RZSize2LogEj _ZN6__asanL8instanceE asan_activation.cpp _ZN6__asanL19asan_is_deactivatedE _ZN6__asanL22asan_deactivated_flagsE asan_debugging.cpp _ZN12_GLOBAL__N_112AsanGetStackEmPmjPjb asan_descriptions.cpp _ZN6__asanL11ShadowNamesE asan_errors.cpp _ZN6__asanL13OnStackUnwindERKN11__sanitizer13SignalContextEPKvPNS0_18BufferedStackTraceE _ZZN6__asan22ErrorAllocTypeMismatch5PrintEvE11alloc_names _ZZN6__asan22ErrorAllocTypeMismatch5PrintEvE13dealloc_names asan_fake_stack.cpp _ZN6__asanL11MemToShadowEm asan_flags.cpp asan_fuchsia.cpp asan_globals.cpp _ZN6__asanL14mu_for_globalsE _ZN6__asanL19list_of_all_globalsE _ZN6__asanL20dynamic_init_globalsE _ZN6__asanL21allocator_for_globalsE _ZN6__asanL31global_registration_site_vectorE asan_globals_win.cpp asan_interceptors.cpp _ZL10read_iovecPvPN11__sanitizer17__sanitizer_iovecEmm _ZL11AtCxaAtexitPv _ZL11StrstrCheckPvPcPKcS2_ _ZL11ioctl_table _ZL11read_msghdrPvPN11__sanitizer18__sanitizer_msghdrEl _ZL11unpoison_tmPvPN11__sanitizer14__sanitizer_tmE _ZL11write_iovecPvPN11__sanitizer17__sanitizer_iovecEmm _ZL12scanf_commonPvibPKcPc _ZL12write_msghdrPvPN11__sanitizer18__sanitizer_msghdrEl _ZL13printf_commonPvPKcPc _ZL13write_hostentPvPN11__sanitizer19__sanitizer_hostentE _ZL14unpoison_groupPvPN11__sanitizer17__sanitizer_groupE _ZL14write_protoentPvPN11__sanitizer20__sanitizer_protoentE _ZL15unpoison_passwdPvPN11__sanitizer18__sanitizer_passwdE _ZL16ioctl_table_fillv _ZL16ioctl_table_size _ZL17StrtolFixAndCheckPvPKcPPcS2_i _ZL17asan_thread_startPv _ZL17ioctl_initialized _ZL21format_get_value_sizecPKcb _ZL24interceptor_metadata_map _ZL28InitializeCommonInterceptorsv _ZN6__asanL29QuickCheckForUnpoisonedRegionEmm _ZZL13printf_commonPvPKcPcE12ReportedOnce _ZZL18MlockIsUnsupportedvE7printed _ZZL28InitializeCommonInterceptorsvE12metadata_mem _ZZL28InitializeSignalInterceptorsvE15was_called_once _ZZN6__asan26InitializeAsanInterceptorsEvE15was_called_once asan_interceptors_memintrinsics.cpp asan_linux.cpp asan_mac.cpp asan_malloc_linux.cpp _ZL19allocated_for_dlsym _ZL22alloc_memory_for_dlsym _ZL22asan_malloc_dispatch_k _ZL22asan_malloc_dispatch_l _ZL30last_dlsym_alloc_size_in_words asan_malloc_mac.cpp asan_malloc_win.cpp asan_memory_profile.cpp _ZN6__asanL13ChunkCallbackEmPv _ZN6__asanL15MemoryProfileCBERKN11__sanitizer20SuspendedThreadsListEPv asan_poisoning.cpp _ZN6__asanL17can_poison_memoryE asan_posix.cpp _ZN6__asanL14tsd_key_initedE _ZN6__asanL7tsd_keyE asan_premap_shadow.cpp asan_report.cpp _ZN6__asanL15AsanBuggyPcPoolE _ZN6__asanL20error_message_bufferE _ZN6__asanL21error_report_callbackE _ZN6__asanL23error_message_buf_mutexE _ZN6__asanL24ReportInvalidPointerPairEmmmmm _ZN6__asanL24error_message_buffer_posE _ZN6__asanL26CheckForInvalidPointerPairEPvS0_ asan_rtems.cpp asan_rtl.cpp _GLOBAL__sub_I_asan_rtl.cpp _ZN6__asanL11asan_atexitEv _ZN6__asanL15AsanCheckFailedEPKciS1_yy _ZN6__asanL16AsanInitInternalEv _ZN6__asanL18OnLowLevelAllocateEmm _ZN6__asanL23force_interface_symbolsEv _ZN6__asanL7AsanDieEv _ZZN6__asan13UnpoisonStackEmmPKcE16reported_warning _ZZN6__asanL15AsanCheckFailedEPKciS1_yyE9num_calls _ZZN6__asanL7AsanDieEvE9num_calls asan_shadow_setup.cpp asan_stack.cpp _ZN6__asanL19malloc_context_sizeE asan_stats.cpp _ZN6__asanL10print_lockE _ZN6__asanL16MergeThreadStatsEPN11__sanitizer17ThreadContextBaseEPv _ZN6__asanL18dead_threads_statsE _ZN6__asanL19GetAccumulatedStatsEPNS_9AsanStatsE _ZN6__asanL19max_malloced_memoryE _ZN6__asanL20unknown_thread_statsE _ZN6__asanL23dead_threads_stats_lockE asan_suppressions.cpp _ZN6__asanL13kODRViolationE _ZN6__asanL15suppression_ctxE _ZN6__asanL16kInterceptorNameE _ZN6__asanL17kSuppressionTypesE _ZN6__asanL22kInterceptorViaLibraryE _ZN6__asanL23kInterceptorViaFunctionE _ZN6__asanL23suppression_placeholderE asan_thread.cpp _ZN6__asanL20GetAsanThreadContextEj _ZN6__asanL20asan_thread_registryE _ZN6__asanL21mu_for_thread_contextE _ZN6__asanL26ThreadStackContainsAddressEPN11__sanitizer17ThreadContextBaseEPv _ZN6__asanL27thread_registry_placeholderE _ZN6__asanL28allocator_for_thread_contextE _ZZN6__asan18asanThreadRegistryEvE11initialized asan_win.cpp asan_new_delete.cpp dummy.cpp ubsan_handlers_cxx.cpp _ZL26HandleDynamicTypeCacheMissPN7__ubsan24DynamicTypeCacheMissDataEmmNS_13ReportOptionsE _ZN7__ubsanL26handleFunctionTypeMismatchEPNS_24FunctionTypeMismatchDataEmmmNS_13ReportOptionsE ubsan_type_hash.cpp ubsan_type_hash_itanium.cpp _ZL16findBaseAtOffsetPKN10__cxxabiv117__class_type_infoEl _ZL21isDerivedFromAtOffsetPKN10__cxxabiv117__class_type_infoES2_l _ZZL27getTypeCacheHashTableBucketmE21__ubsan_vptr_hash_set ubsan_type_hash_win.cpp UnwindLevel1.c unwind_phase2 libunwind.cpp _ZN9libunwindL24findUnwindSectionsByPhdrEP12dl_phdr_infojPv UnwindLevel1-gcc-ext.c __FRAME_END__ _GLOBAL_OFFSET_TABLE_ __atexit_handler_wrapper __cxa_atexit __cxa_finalize __dso_handle __emutls_unregister_key __register_atfork atexit pthread_atfork _ZN14__interception17InterceptFunctionEPKcPmmm dlsym _ZN11__sanitizer10UnmapOrDieEPvm _ZN11__sanitizer11CheckFailedEPKciS1_yy _ZN11__sanitizer12InternalFreeEPvPNS_30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32INS_4AP32EEEEE _ZN11__sanitizer13InternalAllocEmPNS_30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32INS_4AP32EEEEEm _ZN11__sanitizer15StaticSpinMutex8LockSlowEv _ZN11__sanitizer15internal_memcpyEPvPKvm _ZN11__sanitizer15internal_memsetEPvim _ZN11__sanitizer17CombinedAllocatorINS_20SizeClassAllocator32INS_4AP32EEENS_32LargeMmapAllocatorPtrArrayStaticEE8AllocateEPNS_30SizeClassAllocator32LocalCacheIS3_EEmm _ZN11__sanitizer17LowLevelAllocator8AllocateEm _ZN11__sanitizer17SanitizerToolNameE _ZN11__sanitizer18LargeMmapAllocatorINS_20NoOpMapUnmapCallbackENS_32LargeMmapAllocatorPtrArrayStaticENS_21LocalAddressSpaceViewEE10DeallocateEPNS_14AllocatorStatsEPv _ZN11__sanitizer18LargeMmapAllocatorINS_20NoOpMapUnmapCallbackENS_32LargeMmapAllocatorPtrArrayStaticENS_21LocalAddressSpaceViewEE8AllocateEPNS_14AllocatorStatsEmm _ZN11__sanitizer18internal_allocatorEv _ZN11__sanitizer20PrimaryAllocatorNameE _ZN11__sanitizer20SizeClassAllocator32INS_4AP32EE13AllocateBatchEPNS_14AllocatorStatsEPNS_30SizeClassAllocator32LocalCacheIS2_EEm _ZN11__sanitizer20SizeClassAllocator32INS_4AP32EE15DeallocateBatchEPNS_14AllocatorStatsEmPNS2_13TransferBatchE _ZN11__sanitizer20SizeClassAllocator32INS_4AP32EE16PopulateFreeListEPNS_14AllocatorStatsEPNS_30SizeClassAllocator32LocalCacheIS2_EEPNS2_13SizeClassInfoEm _ZN11__sanitizer20internal_sched_yieldEv _ZN11__sanitizer21MmapOrDieOnFatalErrorEmPKc _ZN11__sanitizer22AllocatorMayReturnNullEv _ZN11__sanitizer22IsAllocatorOutOfMemoryEv _ZN11__sanitizer22SecondaryAllocatorNameE _ZN11__sanitizer23SetAllocatorOutOfMemoryEv _ZN11__sanitizer25SetAllocatorMayReturnNullEb _ZN11__sanitizer27SetLowLevelAllocateCallbackEPFvmmE _ZN11__sanitizer28MmapAlignedOrDieOnFatalErrorEmmPKc _ZN11__sanitizer30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32INS_4AP32EEEE10DeallocateEPS3_mPv _ZN11__sanitizer30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32INS_4AP32EEEE11CreateBatchEmPS3_PNS3_13TransferBatchE _ZN11__sanitizer30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32INS_4AP32EEEE5DrainEPNS4_8PerClassEPS3_m _ZN11__sanitizer30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32INS_4AP32EEEE6RefillEPNS4_8PerClassEPS3_m _ZN11__sanitizer31SetLowLevelAllocateMinAlignmentEm _ZN11__sanitizer34PrintHintAllocatorCannotReturnNullEv _ZN11__sanitizer3DieEv _ZN11__sanitizer6ReportEPKcz _ZN11__sanitizer8RawWriteEPKc _ZN11__sanitizer9MmapOrDieEmPKcb _ZN11__sanitizer12LoadedModule15addAddressRangeEmmbbPKc _ZN11__sanitizer12LoadedModule3setEPKcm _ZN11__sanitizer12LoadedModule5clearEv _ZN11__sanitizer12PrintCmdlineEv _ZN11__sanitizer12RunFreeHooksEPKv _ZN11__sanitizer13TemplateMatchEPKcS1_ _ZN11__sanitizer14DumpProcessMapEv _ZN11__sanitizer14GetProcessNameEv _ZN11__sanitizer14ReadBinaryNameEPcm _ZN11__sanitizer14RunMallocHooksEPKvm _ZN11__sanitizer15CacheBinaryNameEv _ZN11__sanitizer15StripModuleNameEPKc _ZN11__sanitizer15StripPathPrefixEPKcS1_ _ZN11__sanitizer15internal_strchrEPKci _ZN11__sanitizer15internal_strdupEPKc _ZN11__sanitizer15internal_strlenEPKc _ZN11__sanitizer15internal_strstrEPKcS1_ _ZN11__sanitizer16internal_memmoveEPvPKvm _ZN11__sanitizer16internal_strncpyEPcPKcm _ZN11__sanitizer16internal_strrchrEPKci _ZN11__sanitizer17DecreaseTotalMmapEm _ZN11__sanitizer17IncreaseTotalMmapEm _ZN11__sanitizer17UpdateProcessNameEv _ZN11__sanitizer17current_verbosityE _ZN11__sanitizer18ReportErrorSummaryEPKcS1_ _ZN11__sanitizer18internal_strchrnulEPKci _ZN11__sanitizer19ReadLongProcessNameEPcm _ZN11__sanitizer20InternalScopedString6appendEPKcz _ZN11__sanitizer20ReadBinaryNameCachedEPcm _ZN11__sanitizer21common_flags_dont_useE _ZN11__sanitizer23ReportMmapFailureAndDieEmPKcS1_ib _ZN11__sanitizer23stoptheworld_tracer_pidE _ZN11__sanitizer24stoptheworld_tracer_ppidE _ZN11__sanitizer35RemoveANSIEscapeSequencesFromStringEPc _ZN11__sanitizer6PrintfEPKcz _ZN11__sanitizer7GetArgvEv _ZNK11__sanitizer12LoadedModule15containsAddressEm __sanitizer_acquire_crash_state __sanitizer_install_malloc_and_free_hooks __sanitizer_report_error_summary _ZN11__sanitizer10FileExistsEPKc _ZN11__sanitizer10ReportFile13SetReportPathEPKc _ZN11__sanitizer10ReportFile17ReopenIfNecessaryEv _ZN11__sanitizer10ReportFile5WriteEPKcm _ZN11__sanitizer11WriteToFileEiPKvmPmPi _ZN11__sanitizer11report_fileE _ZN11__sanitizer12ReadFromFileEiPvmPmPi _ZN11__sanitizer14report_file_muE _ZN11__sanitizer15internal_getpidEv _ZN11__sanitizer15internal_strcmpEPKcS1_ _ZN11__sanitizer16FindPathToBinaryEPKc _ZN11__sanitizer16ReadFileToBufferEPKcPPcPmS4_mPi _ZN11__sanitizer16ReadFileToVectorEPKcPNS_24InternalMmapVectorNoCtorIcEEmPi _ZN11__sanitizer17internal_snprintfEPcmPKcz _ZN11__sanitizer22CatastrophicErrorWriteEPKcm _ZN11__sanitizer24InternalMmapVectorNoCtorIcE7ReallocEm _ZN11__sanitizer6GetEnvEPKc _ZN11__sanitizer8OpenFileEPKcNS_14FileAccessModeEPi _ZN11__sanitizer9CloseFileEi __sanitizer_get_report_path __sanitizer_set_report_fd __sanitizer_set_report_path _ZN11__sanitizer10FlagParser15RegisterHandlerEPKcPNS_15FlagHandlerBaseES2_ _ZN11__sanitizer10FlagParser5AllocE _ZN11__sanitizer10FlagParser9ParseFileEPKcb _ZN11__sanitizer11CommonFlags11SetDefaultsEv _ZN11__sanitizer11CommonFlags8CopyFromERKS0_ _ZN11__sanitizer11FlagHandlerINS_16HandleSignalModeEE5ParseEPKc _ZN11__sanitizer11FlagHandlerINS_16HandleSignalModeEE6FormatEPcm _ZN11__sanitizer11FlagHandlerIPKcE5ParseES2_ _ZN11__sanitizer11FlagHandlerIPKcE6FormatEPcm _ZN11__sanitizer11FlagHandlerIbE5ParseEPKc _ZN11__sanitizer11FlagHandlerIbE6FormatEPcm _ZN11__sanitizer11FlagHandlerIiE5ParseEPKc _ZN11__sanitizer11FlagHandlerIiE6FormatEPcm _ZN11__sanitizer11FlagHandlerImE5ParseEPKc _ZN11__sanitizer11FlagHandlerImE6FormatEPcm _ZN11__sanitizer18FlagHandlerInclude5ParseEPKc _ZN11__sanitizer18FlagHandlerInclude6FormatEPcm _ZN11__sanitizer19RegisterCommonFlagsEPNS_10FlagParserEPNS_11CommonFlagsE _ZN11__sanitizer20RegisterIncludeFlagsEPNS_10FlagParserEPNS_11CommonFlagsE _ZN11__sanitizer21InitializeCommonFlagsEPNS_11CommonFlagsE _ZN11__sanitizer22SubstituteForFlagValueEPKcPcm _ZN11__sanitizer23internal_simple_strtollEPKcPS1_i _ZN11__sanitizer29InitializePlatformCommonFlagsEPNS_11CommonFlagsE _ZTVN11__sanitizer11FlagHandlerINS_16HandleSignalModeEEE _ZTVN11__sanitizer11FlagHandlerIPKcEE _ZTVN11__sanitizer11FlagHandlerIbEE _ZTVN11__sanitizer11FlagHandlerIiEE _ZTVN11__sanitizer11FlagHandlerImEE _ZTVN11__sanitizer18FlagHandlerIncludeE _ZN11__sanitizer10FlagParser10parse_flagEPKc _ZN11__sanitizer10FlagParser11ParseStringEPKcS2_ _ZN11__sanitizer10FlagParser11fatal_errorEPKc _ZN11__sanitizer10FlagParser15skip_whitespaceEv _ZN11__sanitizer10FlagParser18ParseStringFromEnvEPKc _ZN11__sanitizer10FlagParser21PrintFlagDescriptionsEv _ZN11__sanitizer10FlagParserC1Ev _ZN11__sanitizer10FlagParserC2Ev _ZN11__sanitizer13unknown_flagsE _ZN11__sanitizer16internal_strnlenEPKcm _ZN11__sanitizer23ReportUnrecognizedFlagsEv _ZN11__sanitizer11mem_is_zeroEPKcm _ZN11__sanitizer14internal_atollEPKc _ZN11__sanitizer15internal_memchrEPKvim _ZN11__sanitizer15internal_memcmpEPKvS1_m _ZN11__sanitizer16internal_strcspnEPKcS1_ _ZN11__sanitizer16internal_strlcatEPcPKcm _ZN11__sanitizer16internal_strlcpyEPcPKcm _ZN11__sanitizer16internal_strncatEPcPKcm _ZN11__sanitizer16internal_strncmpEPKcS1_m _ZN11__sanitizer13BlockingMutex4LockEv _ZN11__sanitizer13BlockingMutex6UnlockEv _ZN11__sanitizer13BlockingMutexC1Ev _ZN11__sanitizer13ListOfModules4initEv _DYNAMIC _ZN11__sanitizer10GetEnvironEv _ZN11__sanitizer11MaybeReexecEv _ZN11__sanitizer12ThreadLister11ListThreadsEPNS_18InternalMmapVectorIyEE _ZN11__sanitizer12ThreadLister7IsAliveEi _ZN11__sanitizer12ThreadListerC1Ei _ZN11__sanitizer12ThreadListerC2Ei _ZN11__sanitizer12ThreadListerD1Ev _ZN11__sanitizer12ThreadListerD2Ev _ZN11__sanitizer12internal_dupEi _ZN11__sanitizer13BlockingMutex11CheckLockedEv _ZN11__sanitizer13BlockingMutexC2Ev _ZN11__sanitizer13SignalContext10InitPcSpBpEv _ZN11__sanitizer13SignalContext16DumpAllRegistersEPv _ZN11__sanitizer13internal_dup2Eii _ZN11__sanitizer13internal_forkEv _ZN11__sanitizer13internal_mmapEPvmiiiy _ZN11__sanitizer13internal_openEPKcij _ZN11__sanitizer13internal_readEiPvm _ZN11__sanitizer14internal__exitEi _ZN11__sanitizer14internal_cloneEPFiPvES0_iS0_PiS0_S3_ _ZN11__sanitizer14internal_closeEi _ZN11__sanitizer14internal_prctlEimmmm _ZN11__sanitizer14internal_unameEP7utsname _ZN11__sanitizer14internal_writeEiPKvm _ZN11__sanitizer15internal_execveEPKcPKPcS4_ _ZN11__sanitizer15internal_munmapEPvm _ZN11__sanitizer15internal_ptraceEiiPvS0_ _ZN11__sanitizer16internal_getppidEv _ZN11__sanitizer16internal_iserrorEmPi _ZN11__sanitizer16internal_madviseEmmi _ZN11__sanitizer16internal_waitpidEiPii _ZN11__sanitizer17internal_mprotectEPvmi _ZN11__sanitizer17real_pthread_joinEPvPS0_ _ZN11__sanitizer18AndroidGetApiLevelEv _ZN11__sanitizer18internal_sigdelsetEPmi _ZN11__sanitizer19GetHandleSignalModeEi _ZN11__sanitizer19MemoryMappingLayout4NextEPNS_19MemoryMappedSegmentE _ZN11__sanitizer19MemoryMappingLayoutC1Eb _ZN11__sanitizer19MemoryMappingLayoutD1Ev _ZN11__sanitizer19internal_sigfillsetEPm _ZN11__sanitizer19real_pthread_createEPvS0_PFS0_S0_ES0_ _ZN11__sanitizer20internal_sigaltstackEPKvPv _ZN11__sanitizer20internal_sigprocmaskEiPmS0_ _ZN11__sanitizer21internal_start_threadEPFPvS0_ES0_ _ZN11__sanitizer23InitializePlatformEarlyEv _ZN11__sanitizer23ShouldMockFailureToOpenEPKc _ZN11__sanitizer24GetMaxUserVirtualAddressEv _ZN11__sanitizer24InternalMmapVectorNoCtorIyE7ReallocEm _ZN11__sanitizer24InternalMmapVectorNoCtorIyE9push_backERKy _ZN11__sanitizer29internal_sigaction_norestorerEiPKvPv _ZN11__sanitizer6GetTidEv _ZN11__sanitizer9CheckASLREv _ZNK11__sanitizer13SignalContext12GetWriteFlagEv _ZNK11__sanitizer13SignalContext21IsTrueFaultingAddressEv _ZNK11__sanitizer19MemoryMappingLayout5ErrorEv __errno __libc_stack_end dl_iterate_phdr syscall _ZN11__sanitizer22thePersistentAllocatorE _ZN11__sanitizer10timeval_szE _ZN11__sanitizer12IOCTL_TCFLSHE _ZN11__sanitizer12IOCTL_TCGETSE _ZN11__sanitizer12IOCTL_TCSBRKE _ZN11__sanitizer12IOCTL_TCSETSE _ZN11__sanitizer12IOCTL_TCXONCE _ZN11__sanitizer12mbstate_t_szE _ZN11__sanitizer12siginfo_t_szE _ZN11__sanitizer13IOCTL_FDFLUSHE _ZN11__sanitizer13IOCTL_FDMSGONE _ZN11__sanitizer13IOCTL_FDRESETE _ZN11__sanitizer13IOCTL_FIOCLEXE _ZN11__sanitizer13IOCTL_FIONBIOE _ZN11__sanitizer13IOCTL_TCSBRKPE _ZN11__sanitizer13IOCTL_TCSETSFE _ZN11__sanitizer13IOCTL_TCSETSWE _ZN11__sanitizer13IOCTL_TIOCINQE _ZN11__sanitizer13IOCTL_TIOCPKTE _ZN11__sanitizer13IOCTL_TIOCSTIE _ZN11__sanitizer13struct_tms_szE _ZN11__sanitizer14IOCTL_BLKRAGETE _ZN11__sanitizer14IOCTL_BLKRASETE _ZN11__sanitizer14IOCTL_BLKROGETE _ZN11__sanitizer14IOCTL_BLKROSETE _ZN11__sanitizer14IOCTL_EVIOCGIDE _ZN11__sanitizer14IOCTL_EVIOCGSWE _ZN11__sanitizer14IOCTL_EVIOCSFFE _ZN11__sanitizer14IOCTL_FDCLRPRME _ZN11__sanitizer14IOCTL_FDDEFPRME _ZN11__sanitizer14IOCTL_FDFMTBEGE _ZN11__sanitizer14IOCTL_FDFMTENDE _ZN11__sanitizer14IOCTL_FDFMTTRKE _ZN11__sanitizer14IOCTL_FDGETPRME _ZN11__sanitizer14IOCTL_FDMSGOFFE _ZN11__sanitizer14IOCTL_FDRAWCMDE _ZN11__sanitizer14IOCTL_FDSETPRME _ZN11__sanitizer14IOCTL_FIOASYNCE _ZN11__sanitizer14IOCTL_FIONCLEXE _ZN11__sanitizer14IOCTL_MTIOCGETE _ZN11__sanitizer14IOCTL_MTIOCPOSE _ZN11__sanitizer14IOCTL_MTIOCTOPE _ZN11__sanitizer14IOCTL_SIOCDARPE _ZN11__sanitizer14IOCTL_SIOCGARPE _ZN11__sanitizer14IOCTL_SIOCSARPE _ZN11__sanitizer14IOCTL_TIOCCONSE _ZN11__sanitizer14IOCTL_TIOCEXCLE _ZN11__sanitizer14IOCTL_TIOCGETDE _ZN11__sanitizer14IOCTL_TIOCMBICE _ZN11__sanitizer14IOCTL_TIOCMBISE _ZN11__sanitizer14IOCTL_TIOCMGETE _ZN11__sanitizer14IOCTL_TIOCMSETE _ZN11__sanitizer14IOCTL_TIOCNXCLE _ZN11__sanitizer14IOCTL_TIOCOUTQE _ZN11__sanitizer14IOCTL_TIOCSETDE _ZN11__sanitizer14si_SEGV_ACCERRE _ZN11__sanitizer14si_SEGV_MAPERRE _ZN11__sanitizer14struct_mtop_szE _ZN11__sanitizer14struct_stat_szE _ZN11__sanitizer15IOCTL_BLKFLSBUFE _ZN11__sanitizer15IOCTL_BLKRRPARTE _ZN11__sanitizer15IOCTL_CDROMSEEKE _ZN11__sanitizer15IOCTL_CDROMSTOPE _ZN11__sanitizer15IOCTL_EVIOCGABSE _ZN11__sanitizer15IOCTL_EVIOCGBITE _ZN11__sanitizer15IOCTL_EVIOCGKEYE _ZN11__sanitizer15IOCTL_EVIOCGLEDE _ZN11__sanitizer15IOCTL_EVIOCGRABE _ZN11__sanitizer15IOCTL_EVIOCGREPE _ZN11__sanitizer15IOCTL_EVIOCGSNDE _ZN11__sanitizer15IOCTL_EVIOCRMFFE _ZN11__sanitizer15IOCTL_EVIOCSABSE _ZN11__sanitizer15IOCTL_EVIOCSREPE _ZN11__sanitizer15IOCTL_FDTWADDLEE _ZN11__sanitizer15IOCTL_FIOGETOWNE _ZN11__sanitizer15IOCTL_FIOSETOWNE _ZN11__sanitizer15IOCTL_SIOCADDRTE _ZN11__sanitizer15IOCTL_SIOCDELRTE _ZN11__sanitizer15IOCTL_SIOCDRARPE _ZN11__sanitizer15IOCTL_SIOCGPGRPE _ZN11__sanitizer15IOCTL_SIOCGRARPE _ZN11__sanitizer15IOCTL_SIOCSPGRPE _ZN11__sanitizer15IOCTL_SIOCSRARPE _ZN11__sanitizer15IOCTL_TIOCGPGRPE _ZN11__sanitizer15IOCTL_TIOCLINUXE _ZN11__sanitizer15IOCTL_TIOCNOTTYE _ZN11__sanitizer15IOCTL_TIOCSCTTYE _ZN11__sanitizer15IOCTL_TIOCSPGRPE _ZN11__sanitizer15IOCTL_VT_RESIZEE _ZN11__sanitizer15struct_ifreq_szE _ZN11__sanitizer15struct_mtget_szE _ZN11__sanitizer15struct_mtpos_szE _ZN11__sanitizer15struct_regex_szE _ZN11__sanitizer16IOCTL_BLKGETSIZEE _ZN11__sanitizer16IOCTL_CDROMEJECTE _ZN11__sanitizer16IOCTL_CDROMPAUSEE _ZN11__sanitizer16IOCTL_CDROMRESETE _ZN11__sanitizer16IOCTL_CDROMSTARTE _ZN11__sanitizer16IOCTL_EVIOCGNAMEE _ZN11__sanitizer16IOCTL_EVIOCGPHYSE _ZN11__sanitizer16IOCTL_EVIOCGUNIQE _ZN11__sanitizer16IOCTL_PPPIOCSMRUE _ZN11__sanitizer16IOCTL_SIOCATMARKE _ZN11__sanitizer16IOCTL_SIOCGIFMAPE _ZN11__sanitizer16IOCTL_SIOCGIFMEME _ZN11__sanitizer16IOCTL_SIOCGIFMTUE _ZN11__sanitizer16IOCTL_SIOCGSTAMPE _ZN11__sanitizer16IOCTL_SIOCSIFMAPE _ZN11__sanitizer16IOCTL_SIOCSIFMEME _ZN11__sanitizer16IOCTL_SIOCSIFMTUE _ZN11__sanitizer16IOCTL_TIOCGWINSZE _ZN11__sanitizer16IOCTL_TIOCSWINSZE _ZN11__sanitizer16IOCTL_VT_GETMODEE _ZN11__sanitizer16IOCTL_VT_OPENQRYE _ZN11__sanitizer16IOCTL_VT_RELDISPE _ZN11__sanitizer16IOCTL_VT_RESIZEXE _ZN11__sanitizer16IOCTL_VT_SENDSIGE _ZN11__sanitizer16IOCTL_VT_SETMODEE _ZN11__sanitizer16struct_arpreq_szE _ZN11__sanitizer16struct_rusage_szE _ZN11__sanitizer17IOCTL_CDROMRESUMEE _ZN11__sanitizer17IOCTL_FDGETDRVPRME _ZN11__sanitizer17IOCTL_FDGETDRVTYPE _ZN11__sanitizer17IOCTL_FDSETDRVPRME _ZN11__sanitizer17IOCTL_FDWERRORCLRE _ZN11__sanitizer17IOCTL_FDWERRORGETE _ZN11__sanitizer17IOCTL_HDIO_GETGEOE _ZN11__sanitizer17IOCTL_NOT_PRESENTE _ZN11__sanitizer17IOCTL_PPPIOCGUNITE _ZN11__sanitizer17IOCTL_SIOCGIFADDRE _ZN11__sanitizer17IOCTL_SIOCGIFCONFE _ZN11__sanitizer17IOCTL_SIOCGIFNAMEE _ZN11__sanitizer17IOCTL_SIOCSIFADDRE _ZN11__sanitizer17IOCTL_SIOCSIFLINKE _ZN11__sanitizer17IOCTL_VT_ACTIVATEE _ZN11__sanitizer17IOCTL_VT_GETSTATEE _ZN11__sanitizer17struct_rtentry_szE _ZN11__sanitizer17struct_stack_t_szE _ZN11__sanitizer17struct_sysinfo_szE _ZN11__sanitizer17struct_termios_szE _ZN11__sanitizer17struct_utsname_szE _ZN11__sanitizer17struct_vt_mode_szE _ZN11__sanitizer17struct_vt_stat_szE _ZN11__sanitizer17struct_winsize_szE _ZN11__sanitizer18IOCTL_CDROMPLAYMSFE _ZN11__sanitizer18IOCTL_CDROMREADRAWE _ZN11__sanitizer18IOCTL_CDROMSUBCHNLE _ZN11__sanitizer18IOCTL_CDROMVOLCTRLE _ZN11__sanitizer18IOCTL_CDROMVOLREADE _ZN11__sanitizer18IOCTL_FDGETDRVSTATE _ZN11__sanitizer18IOCTL_FDGETFDCSTATE _ZN11__sanitizer18IOCTL_FDGETMAXERRSE _ZN11__sanitizer18IOCTL_FDSETMAXERRSE _ZN11__sanitizer18IOCTL_HDIO_GET_DMAE _ZN11__sanitizer18IOCTL_HDIO_SET_DMAE _ZN11__sanitizer18IOCTL_PPPIOCGDEBUGE _ZN11__sanitizer18IOCTL_PPPIOCGFLAGSE _ZN11__sanitizer18IOCTL_PPPIOCSDEBUGE _ZN11__sanitizer18IOCTL_PPPIOCSFLAGSE _ZN11__sanitizer18IOCTL_SIOCADDMULTIE _ZN11__sanitizer18IOCTL_SIOCDELMULTIE _ZN11__sanitizer18IOCTL_SIOCGIFENCAPE _ZN11__sanitizer18IOCTL_SIOCGIFFLAGSE _ZN11__sanitizer18IOCTL_SIOCGIFSLAVEE _ZN11__sanitizer18IOCTL_SIOCSIFENCAPE _ZN11__sanitizer18IOCTL_SIOCSIFFLAGSE _ZN11__sanitizer18IOCTL_SIOCSIFSLAVEE _ZN11__sanitizer18IOCTL_TIOCGSOFTCARE _ZN11__sanitizer18IOCTL_TIOCSERGWILDE _ZN11__sanitizer18IOCTL_TIOCSERSWILDE _ZN11__sanitizer18IOCTL_TIOCSSOFTCARE _ZN11__sanitizer18__sanitizer_bufsizE _ZN11__sanitizer18struct_cdrom_ti_szE _ZN11__sanitizer18struct_copr_msg_szE _ZN11__sanitizer18struct_input_id_szE _ZN11__sanitizer18struct_regmatch_szE _ZN11__sanitizer18struct_timespec_szE _ZN11__sanitizer18struct_vt_sizes_szE _ZN11__sanitizer19IOCTL_CDROMEJECT_SWE _ZN11__sanitizer19IOCTL_CDROM_GET_UPCE _ZN11__sanitizer19IOCTL_EVIOCGEFFECTSE _ZN11__sanitizer19IOCTL_EVIOCGKEYCODEE _ZN11__sanitizer19IOCTL_EVIOCGVERSIONE _ZN11__sanitizer19IOCTL_EVIOCSKEYCODEE _ZN11__sanitizer19IOCTL_FDPOLLDRVSTATE _ZN11__sanitizer19IOCTL_PPPIOCSMAXCIDE _ZN11__sanitizer19IOCTL_SIOCGIFHWADDRE _ZN11__sanitizer19IOCTL_SIOCGIFMETRICE _ZN11__sanitizer19IOCTL_SIOCSIFHWADDRE _ZN11__sanitizer19IOCTL_SIOCSIFMETRICE _ZN11__sanitizer19IOCTL_TIOCSERCONFIGE _ZN11__sanitizer19IOCTL_TIOCSERGETLSRE _ZN11__sanitizer19IOCTL_VT_WAITACTIVEE _ZN11__sanitizer19struct_cdrom_msf_szE _ZN11__sanitizer19struct_ff_effect_szE _ZN11__sanitizer19struct_itimerval_szE _ZN11__sanitizer19struct_midi_info_szE _ZN11__sanitizer20IOCTL_CDROMREADAUDIOE _ZN11__sanitizer20IOCTL_CDROMREADMODE1E _ZN11__sanitizer20IOCTL_CDROMREADMODE2E _ZN11__sanitizer20IOCTL_FDSETEMSGTRESHE _ZN11__sanitizer20IOCTL_HDIO_DRIVE_CMDE _ZN11__sanitizer20IOCTL_HDIO_GET_32BITE _ZN11__sanitizer20IOCTL_HDIO_SET_32BITE _ZN11__sanitizer20IOCTL_SIOCGIFBRDADDRE _ZN11__sanitizer20IOCTL_SIOCGIFDSTADDRE _ZN11__sanitizer20IOCTL_SIOCGIFNETMASKE _ZN11__sanitizer20IOCTL_SIOCSIFBRDADDRE _ZN11__sanitizer20IOCTL_SIOCSIFDSTADDRE _ZN11__sanitizer20IOCTL_SIOCSIFNETMASKE _ZN11__sanitizer20IOCTL_TIOCGLCKTRMIOSE _ZN11__sanitizer20IOCTL_TIOCSLCKTRMIOSE _ZN11__sanitizer20IOCTL_VT_DISALLOCATEE _ZN11__sanitizer20struct_hd_driveid_szE _ZN11__sanitizer20struct_itimerspec_szE _ZN11__sanitizer20struct_synth_info_szE _ZN11__sanitizer20struct_vt_consize_szE _ZN11__sanitizer21IOCTL_CDROMPLAYTRKINDE _ZN11__sanitizer21IOCTL_CDROMREADCOOKEDE _ZN11__sanitizer21IOCTL_CDROMREADTOCHDRE _ZN11__sanitizer21IOCTL_HDIO_GET_NOWERRE _ZN11__sanitizer21IOCTL_HDIO_SET_NOWERRE _ZN11__sanitizer21IOCTL_PPPIOCGASYNCMAPE _ZN11__sanitizer21IOCTL_PPPIOCSASYNCMAPE _ZN11__sanitizer21IOCTL_SNDCTL_COPR_RUNE _ZN11__sanitizer21IOCTL_SNDCTL_DSP_POSTE _ZN11__sanitizer21IOCTL_SNDCTL_DSP_SYNCE _ZN11__sanitizer21IOCTL_SNDCTL_SEQ_SYNCE _ZN11__sanitizer21struct_copr_buffer_szE _ZN11__sanitizer21struct_hd_geometry_szE _ZN11__sanitizer21struct_sched_param_szE _ZN11__sanitizer22IOCTL_PPPIOCGXASYNCMAPE _ZN11__sanitizer22IOCTL_PPPIOCSXASYNCMAPE _ZN11__sanitizer22IOCTL_SNDCTL_COPR_HALTE _ZN11__sanitizer22IOCTL_SNDCTL_COPR_LOADE _ZN11__sanitizer22IOCTL_SNDCTL_DSP_RESETE _ZN11__sanitizer22IOCTL_SNDCTL_DSP_SPEEDE _ZN11__sanitizer22IOCTL_SNDCTL_MIDI_INFOE _ZN11__sanitizer22IOCTL_SNDCTL_SEQ_PANICE _ZN11__sanitizer22IOCTL_SNDCTL_SEQ_RESETE _ZN11__sanitizer22IOCTL_SNDCTL_TMR_TEMPOE _ZN11__sanitizer22__sanitizer_in_addr_szEi _ZN11__sanitizer22struct_cdrom_tochdr_szE _ZN11__sanitizer22struct_format_descr_szE _ZN11__sanitizer23IOCTL_CDROMMULTISESSIONE _ZN11__sanitizer23IOCTL_CDROMREADTOCENTRYE _ZN11__sanitizer23IOCTL_HDIO_GET_IDENTITYE _ZN11__sanitizer23IOCTL_SNDCTL_COPR_RCODEE _ZN11__sanitizer23IOCTL_SNDCTL_COPR_RDATAE _ZN11__sanitizer23IOCTL_SNDCTL_COPR_RESETE _ZN11__sanitizer23IOCTL_SNDCTL_COPR_WCODEE _ZN11__sanitizer23IOCTL_SNDCTL_COPR_WDATAE _ZN11__sanitizer23IOCTL_SNDCTL_DSP_SETFMTE _ZN11__sanitizer23IOCTL_SNDCTL_DSP_STEREOE _ZN11__sanitizer23IOCTL_SNDCTL_SYNTH_INFOE _ZN11__sanitizer23IOCTL_SNDCTL_TMR_SELECTE _ZN11__sanitizer23IOCTL_SNDCTL_TMR_SOURCEE _ZN11__sanitizer23struct_cdrom_subchnl_szE _ZN11__sanitizer23struct_cdrom_volctrl_szE _ZN11__sanitizer23struct_floppy_struct_szE _ZN11__sanitizer23struct_input_absinfo_szE _ZN11__sanitizer23struct_seq_event_rec_szE _ZN11__sanitizer24IOCTL_HDIO_GET_MULTCOUNTE _ZN11__sanitizer24IOCTL_HDIO_SET_MULTCOUNTE _ZN11__sanitizer24IOCTL_SNDCTL_COPR_RCVMSGE _ZN11__sanitizer24IOCTL_SNDCTL_DSP_GETFMTSE _ZN11__sanitizer24IOCTL_SNDCTL_SEQ_NRMIDISE _ZN11__sanitizer24struct_cdrom_tocentry_szE _ZN11__sanitizer24struct_copr_debug_buf_szE _ZN11__sanitizer24struct_floppy_raw_cmd_szE _ZN11__sanitizer24struct_sbi_instrument_szE _ZN11__sanitizer25IOCTL_HDIO_GET_UNMASKINTRE _ZN11__sanitizer25IOCTL_HDIO_SET_UNMASKINTRE _ZN11__sanitizer25IOCTL_SNDCTL_COPR_SENDMSGE _ZN11__sanitizer25IOCTL_SNDCTL_DSP_NONBLOCKE _ZN11__sanitizer25IOCTL_SNDCTL_MIDI_PRETIMEE _ZN11__sanitizer25IOCTL_SNDCTL_SEQ_CTRLRATEE _ZN11__sanitizer25IOCTL_SNDCTL_SEQ_NRSYNTHSE _ZN11__sanitizer25IOCTL_SNDCTL_SEQ_PERCMODEE _ZN11__sanitizer25IOCTL_SNDCTL_SEQ_TESTMIDIE _ZN11__sanitizer25IOCTL_SNDCTL_SYNTH_MEMAVLE _ZN11__sanitizer25IOCTL_SNDCTL_TMR_TIMEBASEE _ZN11__sanitizer25IOCTL_SOUND_MIXER_READ_CDE _ZN11__sanitizer25IOCTL_SOUND_PCM_READ_BITSE _ZN11__sanitizer25IOCTL_SOUND_PCM_READ_RATEE _ZN11__sanitizer25__user_cap_data_struct_szE _ZN11__sanitizer26IOCTL_SNDCTL_DSP_SUBDIVIDEE _ZN11__sanitizer26IOCTL_SNDCTL_FM_4OP_ENABLEE _ZN11__sanitizer26IOCTL_SNDCTL_FM_LOAD_INSTRE _ZN11__sanitizer26IOCTL_SNDCTL_SEQ_OUTOFBANDE _ZN11__sanitizer26IOCTL_SNDCTL_SEQ_THRESHOLDE _ZN11__sanitizer26IOCTL_SNDCTL_TMR_METRONOMEE _ZN11__sanitizer26IOCTL_SOUND_MIXER_READ_MICE _ZN11__sanitizer26IOCTL_SOUND_MIXER_READ_PCME _ZN11__sanitizer26IOCTL_SOUND_MIXER_WRITE_CDE _ZN11__sanitizer26struct_cdrom_read_audio_szE _ZN11__sanitizer26struct_floppy_fdc_state_szE _ZN11__sanitizer27IOCTL_HDIO_GET_KEEPSETTINGSE _ZN11__sanitizer27IOCTL_HDIO_SET_KEEPSETTINGSE _ZN11__sanitizer27IOCTL_SNDCTL_DSP_GETBLKSIZEE _ZN11__sanitizer27IOCTL_SNDCTL_SEQ_GETINCOUNTE _ZN11__sanitizer27IOCTL_SOUND_MIXER_READ_BASSE _ZN11__sanitizer27IOCTL_SOUND_MIXER_READ_CAPSE _ZN11__sanitizer27IOCTL_SOUND_MIXER_READ_IMIXE _ZN11__sanitizer27IOCTL_SOUND_MIXER_READ_LINEE _ZN11__sanitizer27IOCTL_SOUND_MIXER_WRITE_MICE _ZN11__sanitizer27IOCTL_SOUND_MIXER_WRITE_PCME _ZN11__sanitizer27IOCTL_SOUND_PCM_READ_FILTERE _ZN11__sanitizer27__user_cap_header_struct_szE _ZN11__sanitizer27struct_floppy_max_errors_szE _ZN11__sanitizer28IOCTL_SNDCTL_DSP_SETFRAGMENTE _ZN11__sanitizer28IOCTL_SNDCTL_SEQ_GETOUTCOUNTE _ZN11__sanitizer28IOCTL_SOUND_MIXER_READ_IGAINE _ZN11__sanitizer28IOCTL_SOUND_MIXER_READ_LINE1E _ZN11__sanitizer28IOCTL_SOUND_MIXER_READ_LINE2E _ZN11__sanitizer28IOCTL_SOUND_MIXER_READ_LINE3E _ZN11__sanitizer28IOCTL_SOUND_MIXER_READ_OGAINE _ZN11__sanitizer28IOCTL_SOUND_MIXER_READ_SYNTHE _ZN11__sanitizer28IOCTL_SOUND_MIXER_WRITE_BASSE _ZN11__sanitizer28IOCTL_SOUND_MIXER_WRITE_IMIXE _ZN11__sanitizer28IOCTL_SOUND_MIXER_WRITE_LINEE _ZN11__sanitizer28IOCTL_SOUND_PCM_WRITE_FILTERE _ZN11__sanitizer28struct_cdrom_multisession_szE _ZN11__sanitizer29IOCTL_SNDCTL_SEQ_RESETSAMPLESE _ZN11__sanitizer29IOCTL_SOUND_MIXER_READ_ALTPCME _ZN11__sanitizer29IOCTL_SOUND_MIXER_READ_RECLEVE _ZN11__sanitizer29IOCTL_SOUND_MIXER_READ_RECSRCE _ZN11__sanitizer29IOCTL_SOUND_MIXER_READ_TREBLEE _ZN11__sanitizer29IOCTL_SOUND_MIXER_READ_VOLUMEE _ZN11__sanitizer29IOCTL_SOUND_MIXER_WRITE_IGAINE _ZN11__sanitizer29IOCTL_SOUND_MIXER_WRITE_LINE1E _ZN11__sanitizer29IOCTL_SOUND_MIXER_WRITE_LINE2E _ZN11__sanitizer29IOCTL_SOUND_MIXER_WRITE_LINE3E _ZN11__sanitizer29IOCTL_SOUND_MIXER_WRITE_OGAINE _ZN11__sanitizer29IOCTL_SOUND_MIXER_WRITE_SYNTHE _ZN11__sanitizer29IOCTL_SOUND_PCM_READ_CHANNELSE _ZN11__sanitizer29struct_floppy_drive_params_szE _ZN11__sanitizer29struct_floppy_drive_struct_szE _ZN11__sanitizer29struct_floppy_write_errors_szE _ZN11__sanitizer30IOCTL_SOUND_MIXER_READ_DEVMASKE _ZN11__sanitizer30IOCTL_SOUND_MIXER_READ_ENHANCEE _ZN11__sanitizer30IOCTL_SOUND_MIXER_READ_RECMASKE _ZN11__sanitizer30IOCTL_SOUND_MIXER_READ_SPEAKERE _ZN11__sanitizer30IOCTL_SOUND_MIXER_WRITE_ALTPCME _ZN11__sanitizer30IOCTL_SOUND_MIXER_WRITE_RECLEVE _ZN11__sanitizer30IOCTL_SOUND_MIXER_WRITE_RECSRCE _ZN11__sanitizer30IOCTL_SOUND_MIXER_WRITE_TREBLEE _ZN11__sanitizer30IOCTL_SOUND_MIXER_WRITE_VOLUMEE _ZN11__sanitizer30IOCTL_SOUND_PCM_WRITE_CHANNELSE _ZN11__sanitizer31IOCTL_SOUND_MIXER_WRITE_ENHANCEE _ZN11__sanitizer31IOCTL_SOUND_MIXER_WRITE_SPEAKERE _ZN11__sanitizer33IOCTL_SOUND_MIXER_READ_STEREODEVSE _ZN11__sanitizer7af_inetE _ZN11__sanitizer8gid_t_szE _ZN11__sanitizer8path_maxE _ZN11__sanitizer8pid_t_szE _ZN11__sanitizer8uid_t_szE _ZN11__sanitizer14IsAbsolutePathEPKc _ZN11__sanitizer16MprotectNoAccessEmm _ZN11__sanitizer18GetMmapGranularityEv _ZN11__sanitizer18MmapNoReserveOrDieEmPKc _ZN11__sanitizer19MprotectMallocZonesEPvi _ZN11__sanitizer9MmapNamedEPvmiiPKc _ZNK11__sanitizer13SignalContext10GetAddressEv _ZNK11__sanitizer13SignalContext14IsMemoryAccessEv _ZNK11__sanitizer13SignalContext8DescribeEv _ZN11__sanitizer18LogMessageOnPrintfEPKc _ZN11__sanitizer26SetPrintfAndReportCallbackEPFvPKcE _ZN11__sanitizer9VSNPrintfEPciPKcS0_ __sanitizer_on_print __udivdi3 _ZN11__sanitizer12ReadProcMapsEPNS_16ProcSelfMapsBuffE _ZN11__sanitizer19MemoryMappingLayout17DumpListOfModulesEPNS_24InternalMmapVectorNoCtorINS_12LoadedModuleEEE _ZN11__sanitizer19MemoryMappingLayout19CacheMemoryMappingsEv _ZN11__sanitizer19MemoryMappingLayoutC2Eb _ZN11__sanitizer19MemoryMappingLayoutD2Ev _ZN11__sanitizer24InternalMmapVectorNoCtorINS_12LoadedModuleEE7ReallocEm _ZN11__sanitizer24InternalMmapVectorNoCtorINS_12LoadedModuleEE9push_backERKS1_ _ZN11__sanitizer8ParseHexEPPKc _ZN11__sanitizer9IsDecimalEc _ZN11__sanitizer18SuppressionContext10GetMatchedEPNS_18InternalMmapVectorIPNS_11SuppressionEEE _ZN11__sanitizer18SuppressionContext13ParseFromFileEPKc _ZN11__sanitizer18SuppressionContext5MatchEPKcS2_PPNS_11SuppressionE _ZN11__sanitizer18SuppressionContext5ParseEPKc _ZN11__sanitizer18SuppressionContextC1EPPKci _ZN11__sanitizer18SuppressionContextC2EPPKci _ZN11__sanitizer24InternalMmapVectorNoCtorINS_11SuppressionEE7ReallocEm _ZN11__sanitizer24InternalMmapVectorNoCtorINS_11SuppressionEE9push_backERKS1_ _ZN11__sanitizer24InternalMmapVectorNoCtorIPNS_11SuppressionEE7ReallocEm _ZN11__sanitizer24InternalMmapVectorNoCtorIPNS_11SuppressionEE9push_backERKS2_ _ZNK11__sanitizer18SuppressionContext18HasSuppressionTypeEPKc _ZN11__sanitizer12DTLS_DestroyEv _ZN11__sanitizer21DTLS_on_libc_memalignEPvm _ZN11__sanitizer8DTLS_GetEv _ZN11__sanitizer14ThreadRegistry11StartThreadEjyNS_10ThreadTypeEPv _ZN11__sanitizer14ThreadRegistry12CreateThreadEmbjPv _ZN11__sanitizer14ThreadRegistry12FinishThreadEj _ZN11__sanitizer14ThreadRegistry13SetThreadNameEjPKc _ZN11__sanitizer14ThreadRegistry14QuarantinePushEPNS_17ThreadContextBaseE _ZN11__sanitizer14ThreadRegistry23FindThreadContextLockedEPFbPNS_17ThreadContextBaseEPvES3_ _ZN11__sanitizer14ThreadRegistry29FindThreadContextByOsIDLockedEy _ZN11__sanitizer14ThreadRegistry30RunCallbackForEachThreadLockedEPFvPNS_17ThreadContextBaseEPvES3_ _ZN11__sanitizer14ThreadRegistryC1EPFPNS_17ThreadContextBaseEjEjjj _ZN11__sanitizer14ThreadRegistryC2EPFPNS_17ThreadContextBaseEjEjjj _ZN11__sanitizer17ThreadContextBase10OnDetachedEPv _ZN11__sanitizer17ThreadContextBase10OnFinishedEv _ZN11__sanitizer17ThreadContextBase6OnDeadEv _ZN11__sanitizer17ThreadContextBase7OnResetEv _ZN11__sanitizer17ThreadContextBase8OnJoinedEPv _ZN11__sanitizer17ThreadContextBase9OnCreatedEPv _ZN11__sanitizer17ThreadContextBase9OnStartedEPv _ZN11__sanitizer17ThreadContextBaseC1Ej _ZN11__sanitizer17ThreadContextBaseC2Ej _ZTVN11__sanitizer17ThreadContextBaseE _ZN11__sanitizer14AddDieCallbackEPFvvE _ZN11__sanitizer15SleepForSecondsEi _ZN11__sanitizer17RemoveDieCallbackEPFvvE _ZN11__sanitizer18SetUserDieCallbackEPFvvE _ZN11__sanitizer22SetCheckFailedCallbackEPFvPKciS1_yyE _ZN11__sanitizer5AbortEv __sanitizer_set_death_callback _ZN11__sanitizer10ProtectGapEmmmm _ZN11__sanitizer13WriteToSyslogEPKc _ZN11__sanitizer14SleepForMillisEi _ZN11__sanitizer16BackgroundThreadEPv _ZN11__sanitizer17MmapFixedNoAccessEmmPKc _ZN11__sanitizer18MmapFixedNoReserveEmmPKc _ZN11__sanitizer18StackDepotGetStatsEv _ZN11__sanitizer20DontDumpShadowMemoryEmm _ZN11__sanitizer20WriteOneLineToSyslogEPKc _ZN11__sanitizer23MmapFixedSuperNoReserveEmmPKc _ZN11__sanitizer24ReserveShadowMemoryRangeEmmPKcb _ZN11__sanitizer25MaybeStartBackgroudThreadEv _ZN11__sanitizer28PlatformPrepareForSandboxingEP29__sanitizer_sandbox_arguments _ZN11__sanitizer31SetSoftRssLimitExceededCallbackEPFvbE _ZN11__sanitizer6GetRSSEv __sanitizer_print_memory_profile __sanitizer_sandbox_on_notify _ZN11__sanitizer16SetErrnoToENOMEMEv _ZN11__sanitizer11InitTlsSizeEv _ZN11__sanitizer12MmapNoAccessEm _ZN11__sanitizer13ListOfModules12fallbackInitEv _ZN11__sanitizer14AndroidLogInitEv _ZN11__sanitizer14real_sigactionEiPKvPv _ZN11__sanitizer15SetAbortMessageEPKc _ZN11__sanitizer16MapDynamicShadowEmmmRm _ZN11__sanitizer18internal_sigactionEiPKvPv _ZN11__sanitizer20GetThreadStackAndTlsEbPmS0_S0_S0_ _ZN11__sanitizer24my_pthread_attr_getstackEPvPS0_Pm _ZN11__sanitizer26GetThreadStackTopAndBottomEbPmS0_ __android_log_write __libc_get_static_tls_bounds android_set_abort_message async_safe_write_log clock_gettime getauxval getrlimit getrusage openlog pthread_attr_destroy pthread_attr_init pthread_getattr_np pthread_self sigaction syslog _ZN11__sanitizer13GetThreadSelfEv _ZN11__sanitizer15StartSubprocessEPKcPKS1_S3_iii _ZN11__sanitizer16IsProcessRunningEi _ZN11__sanitizer21SupportsColoredOutputEi _ZN11__sanitizer22ReleaseMemoryPagesToOSEmm _ZN11__sanitizer23IsAccessibleMemoryRangeEmm _ZN11__sanitizer23SetAlternateSignalStackEv _ZN11__sanitizer25UnsetAlternateSignalStackEv _ZN11__sanitizer27InstallDeadlySignalHandlersEPFviPvS0_E _ZN11__sanitizer28DisableCoreDumperIfNecessaryEv _ZN11__sanitizer6AtexitEPFvvE _ZNK11__sanitizer13SignalContext15IsStackOverflowEv abort isatty pipe pthread_attr_getstack real_pthread_attr_getstack setrlimit sigaltstack sleep sysconf usleep _ZN11__sanitizer12StopTheWorldEPFvRKNS_20SuspendedThreadsListEPvES3_ _ZN11__sanitizer15ThreadSuspender13SuspendThreadEy _ZN11__sanitizer15ThreadSuspender17SuspendAllThreadsEv _ZN11__sanitizer24InternalMmapVectorNoCtorImE7ReallocEm _ZNK11__sanitizer25SuspendedThreadsListLinux11GetThreadIDEm _ZNK11__sanitizer25SuspendedThreadsListLinux11ThreadCountEv _ZNK11__sanitizer25SuspendedThreadsListLinux17GetRegistersAndSPEmPNS_18InternalMmapVectorImEEPm _ZTVN11__sanitizer25SuspendedThreadsListLinuxE sched_yield _ZN8__sancov21InitializeSancovFlagsEv _ZN8__sancov30sancov_flags_dont_use_directlyE __sancov_default_options _ZN11__sanitizer18InitializeCoverageEbPKc __sancov_lowest_stack __sanitizer_cov_8bit_counters_init __sanitizer_cov_bool_flag_init __sanitizer_cov_dump __sanitizer_cov_pcs_init __sanitizer_cov_reset __sanitizer_cov_trace_cmp __sanitizer_cov_trace_cmp1 __sanitizer_cov_trace_cmp2 __sanitizer_cov_trace_cmp4 __sanitizer_cov_trace_cmp8 __sanitizer_cov_trace_const_cmp1 __sanitizer_cov_trace_const_cmp2 __sanitizer_cov_trace_const_cmp4 __sanitizer_cov_trace_const_cmp8 __sanitizer_cov_trace_div4 __sanitizer_cov_trace_div8 __sanitizer_cov_trace_gep __sanitizer_cov_trace_pc_guard __sanitizer_cov_trace_pc_guard_init __sanitizer_cov_trace_pc_indir __sanitizer_cov_trace_switch __sanitizer_dump_coverage __sanitizer_dump_trace_pc_guard_coverage __sanitizer_get_module_and_offset_for_pc _ZN11__sanitizer15ColorizeReportsEv _ZN11__sanitizer18ReportErrorSummaryEPKcPKNS_10StackTraceES1_ _ZN11__sanitizer21ScopedErrorReportLockC1Ev _ZN11__sanitizer21ScopedErrorReportLockD1Ev _ZNK11__sanitizer10StackTrace5PrintEv _ZN11__sanitizer13StackDepotGetEj _ZN11__sanitizer13StackDepotPutENS_10StackTraceE _ZN11__sanitizer14StackDepotBaseINS_14StackDepotNodeELi1ELi16EE3GetEj _ZN11__sanitizer14StackDepotBaseINS_14StackDepotNodeELi1ELi16EE3PutENS_10StackTraceEPb _ZN11__sanitizer20StackDepotReverseMap3GetEj _ZN11__sanitizer20StackDepotReverseMapC1Ev _ZN11__sanitizer20StackDepotReverseMapC2Ev _ZN11__sanitizer24InternalMmapVectorNoCtorINS_20StackDepotReverseMap10IdDescPairEE7ReallocEm _ZN11__sanitizer24InternalMmapVectorNoCtorINS_20StackDepotReverseMap10IdDescPairEE9push_backERKS2_ _ZN11__sanitizer10StackTrace12GetCurrentPcEv _ZN11__sanitizer10StackTrace20GetNextInstructionPcEm _ZN11__sanitizer18BufferedStackTrace10UnwindFastEmmmmj _ZN11__sanitizer18BufferedStackTrace14PopStackFramesEm _ZN11__sanitizer18BufferedStackTrace15LocatePcInTraceEm _ZN11__sanitizer10RenderDataEPNS_20InternalScopedStringEPKcPKNS_8DataInfoES3_ _ZN11__sanitizer10Symbolizer11SymbolizePCEm _ZN11__sanitizer10Symbolizer13SymbolizeDataEmPNS_8DataInfoE _ZN11__sanitizer10Symbolizer27GetModuleNameAndOffsetForPCEmPPKcPm _ZN11__sanitizer10Symbolizer9GetOrInitEv _ZN11__sanitizer11RenderFrameEPNS_20InternalScopedStringEPKcimPKNS_11AddressInfoEbS3_S3_ _ZN11__sanitizer15SymbolizedStack3NewEm _ZN11__sanitizer15SymbolizedStack8ClearAllEv _ZN11__sanitizer18BufferedStackTrace10UnwindSlowEmPvj _ZN11__sanitizer18BufferedStackTrace10UnwindSlowEmj _ZN11__sanitizer18BufferedStackTrace6UnwindEjmmPvmmb _ZN11__sanitizer24RenderNeedsSymbolizationEPKc _ZN11__sanitizer8DataInfoC1Ev __sanitizer_symbolize_global __sanitizer_symbolize_pc _ZN11__sanitizer20RenderModuleLocationEPNS_20InternalScopedStringEPKcmNS_10ModuleArchES3_ _ZN11__sanitizer20RenderSourceLocationEPNS_20InternalScopedStringEPKciibS3_ _ZN11__sanitizer10Symbolizer11symbolizer_E _ZN11__sanitizer10Symbolizer15ModuleNameOwner12GetOwnedCopyEPKc _ZN11__sanitizer10Symbolizer15SymbolizerScopeC1EPKS0_ _ZN11__sanitizer10Symbolizer15SymbolizerScopeC2EPKS0_ _ZN11__sanitizer10Symbolizer15SymbolizerScopeD1Ev _ZN11__sanitizer10Symbolizer15SymbolizerScopeD2Ev _ZN11__sanitizer10Symbolizer19LateInitializeToolsEv _ZN11__sanitizer10Symbolizer21symbolizer_allocator_E _ZN11__sanitizer10Symbolizer8init_mu_E _ZN11__sanitizer10SymbolizerC1ENS_13IntrusiveListINS_14SymbolizerToolEEE _ZN11__sanitizer10SymbolizerC2ENS_13IntrusiveListINS_14SymbolizerToolEEE _ZN11__sanitizer11AddressInfo14FillModuleInfoEPKcmNS_10ModuleArchE _ZN11__sanitizer11AddressInfo5ClearEv _ZN11__sanitizer11AddressInfoC1Ev _ZN11__sanitizer11AddressInfoC2Ev _ZN11__sanitizer24InternalMmapVectorNoCtorIPKcE7ReallocEm _ZN11__sanitizer24InternalMmapVectorNoCtorIPKcE9push_backERKS2_ _ZN11__sanitizer8DataInfo5ClearEv _ZN11__sanitizer8DataInfoC2Ev _ZN11__sanitizer14SymbolizerTool14LateInitializeEv _ZN11__sanitizer14SymbolizerTool14SymbolizeFrameEmPNS_9FrameInfoE _ZN11__sanitizer14SymbolizerTool5FlushEv _ZN11__sanitizer22LibbacktraceSymbolizer3getEPNS_17LowLevelAllocatorE _ZN11__sanitizer10Symbolizer12PlatformInitEv _ZN11__sanitizer10Symbolizer16PlatformDemangleEPKc _ZN11__sanitizer10Symbolizer20FindModuleForAddressEm _ZN11__sanitizer10Symbolizer8DemangleEPKc _ZN11__sanitizer14LLVMSymbolizer11SymbolizePCEmPNS_15SymbolizedStackE _ZN11__sanitizer14LLVMSymbolizer13SymbolizeDataEmPNS_8DataInfoE _ZN11__sanitizer14LLVMSymbolizer14SymbolizeFrameEmPNS_9FrameInfoE _ZN11__sanitizer14LLVMSymbolizer20FormatAndSendCommandEPKcS2_mNS_10ModuleArchE _ZN11__sanitizer14LLVMSymbolizerC1EPKcPNS_17LowLevelAllocatorE _ZN11__sanitizer14LLVMSymbolizerC2EPKcPNS_17LowLevelAllocatorE _ZN11__sanitizer14SymbolizerTool8DemangleEPKc _ZN11__sanitizer17SymbolizerProcess11SendCommandEPKc _ZN11__sanitizer17SymbolizerProcess18ReadFromSymbolizerEPcm _ZN11__sanitizer17SymbolizerProcess25StartSymbolizerSubprocessEv _ZN11__sanitizer17SymbolizerProcess7GetEnvPEv _ZN11__sanitizer17SymbolizerProcessC1EPKcb _ZN11__sanitizer17SymbolizerProcessC2EPKcb _ZN11__sanitizer22ParseSymbolizePCOutputEPKcPNS_15SymbolizedStackE _ZN11__sanitizer24InternalMmapVectorNoCtorINS_9LocalInfoEE7ReallocEm _ZN11__sanitizer24InternalMmapVectorNoCtorINS_9LocalInfoEE9push_backERKS1_ _ZN11__sanitizer24ParseSymbolizeDataOutputEPKcPNS_8DataInfoE _ZNK11__sanitizer21LLVMSymbolizerProcess18ReachedEndOfOutputEPKcm _ZNK11__sanitizer21LLVMSymbolizerProcess7GetArgVEPKcRA6_S2_ _ZTVN11__sanitizer14LLVMSymbolizerE _ZTVN11__sanitizer17SymbolizerProcessE _ZTVN11__sanitizer21LLVMSymbolizerProcessE _ZN11__sanitizer10Symbolizer14LateInitializeEv _ZN11__sanitizer13Addr2LinePool11SendCommandEPKcm _ZN11__sanitizer13Addr2LinePool11SymbolizePCEmPNS_15SymbolizedStackE _ZN11__sanitizer13Addr2LinePool13SymbolizeDataEmPNS_8DataInfoE _ZN11__sanitizer16Addr2LineProcess18ReadFromSymbolizerEPcm _ZN11__sanitizer16Addr2LineProcess18output_terminator_E _ZN11__sanitizer18InternalSymbolizer11SymbolizePCEmPNS_15SymbolizedStackE _ZN11__sanitizer18InternalSymbolizer13SymbolizeDataEmPNS_8DataInfoE _ZN11__sanitizer18InternalSymbolizer5FlushEv _ZN11__sanitizer18InternalSymbolizer8DemangleEPKc _ZN11__sanitizer24InternalMmapVectorNoCtorIPNS_16Addr2LineProcessEE7ReallocEm _ZN11__sanitizer24InternalMmapVectorNoCtorIPNS_16Addr2LineProcessEE9push_backERKS2_ _ZNK11__sanitizer16Addr2LineProcess18ReachedEndOfOutputEPKcm _ZNK11__sanitizer16Addr2LineProcess7GetArgVEPKcRA6_S2_ _ZNK11__sanitizer17SymbolizerProcess18ReachedEndOfOutputEPKcm _ZNK11__sanitizer17SymbolizerProcess7GetArgVEPKcRA6_S2_ _ZTVN11__sanitizer13Addr2LinePoolE _ZTVN11__sanitizer16Addr2LineProcessE _ZTVN11__sanitizer18InternalSymbolizerE __cxa_demangle __sanitizer_symbolize_code __sanitizer_symbolize_data __sanitizer_symbolize_demangle __sanitizer_symbolize_flush dlerror _ZN11__sanitizer18ReportDeadlySignalERKNS_13SignalContextEjPFvS2_PKvPNS_18BufferedStackTraceEES4_ _ZN11__sanitizer18ReportErrorSummaryEPKcRKNS_11AddressInfoES1_ _ZN11__sanitizer19ReportMmapWriteExecEi _ZN11__sanitizer21ScopedErrorReportLock11CheckLockedEv _ZN11__sanitizer21ScopedErrorReportLockC2Ev _ZN11__sanitizer21ScopedErrorReportLockD2Ev _ZN11__sanitizer23StartReportDeadlySignalEv _Unwind_Backtrace _Unwind_GetIP _ZN11__sanitizer27SanitizerInitializeUnwinderEv acquire_my_map_info_list dlopen release_my_map_info_list unwind_backtrace_signal_arch _ZN11__sanitizer12SortAndDedupINS_18InternalMmapVectorIjEENS_11CompareLessIjEEEEvRT_T0_ _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__lsan10RootRegionEE7ReallocEm _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__lsan10RootRegionEE9push_backERKS2_ _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__lsan12LeakedObjectEE7ReallocEm _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__lsan12LeakedObjectEE9push_backERKS2_ _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__lsan4LeakEE7ReallocEm _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__lsan4LeakEE9push_backERKS2_ _ZN11__sanitizer24InternalMmapVectorNoCtorIjE7ReallocEm _ZN11__sanitizer24InternalMmapVectorNoCtorIjE9push_backERKj _ZN11__sanitizer24InternalMmapVectorNoCtorImE9push_backERKm _ZN6__lsan10LeakReport12PrintSummaryEv _ZN6__lsan10LeakReport14AddLeakedChunkEmjmNS_8ChunkTagE _ZN6__lsan10LeakReport14ReportTopLeaksEm _ZN6__lsan10LeakReport17ApplySuppressionsEv _ZN6__lsan10LeakReport18PrintReportForLeakEm _ZN6__lsan10lsan_flagsE _ZN6__lsan11DoLeakCheckEv _ZN6__lsan11HandleLeaksEv _ZN6__lsan12ForEachChunkEPFvmPvES0_ _ZN6__lsan12GetUserBeginEm _ZN6__lsan12LsanMetadata7set_tagENS_8ChunkTagE _ZN6__lsan12LsanMetadataC1Em _ZN6__lsan12global_mutexE _ZN6__lsan14InitCommonLsanEv _ZN6__lsan14WordIsPoisonedEm _ZN6__lsan15PointsIntoChunkEPv _ZN6__lsan15ScanGlobalRangeEmmPN11__sanitizer18InternalMmapVectorImEE _ZN6__lsan16HasReportedLeaksEv _ZN6__lsan17RegisterLsanFlagsEPN11__sanitizer10FlagParserEPNS_5FlagsE _ZN6__lsan18EnableInThisThreadEv _ZN6__lsan18IgnoreObjectLockedEPKv _ZN6__lsan19DisableInThisThreadEv _ZN6__lsan20ProcessGlobalRegionsEPN11__sanitizer18InternalMmapVectorImEE _ZN6__lsan20ScanRangeForPointersEmmPN11__sanitizer18InternalMmapVectorImEEPKcNS_8ChunkTagE _ZN6__lsan21GetThreadRangesLockedEyPmS0_S0_S0_S0_S0_PPN11__sanitizer4DTLSE _ZN6__lsan22ForEachExtraStackRangeEyPFvmmPvES0_ _ZN6__lsan22LeakSuppressionContext21GetSuppressionForAddrEm _ZN6__lsan22LeakSuppressionContext22GetSuppressionForStackEj _ZN6__lsan22LeakSuppressionContext24PrintMatchedSuppressionsEv _ZN6__lsan23DisableCounterUnderflowEv _ZN6__lsan23GetAllocatorGlobalRangeEPmS0_ _ZN6__lsan23GetThreadRegistryLockedEv _ZN6__lsan24ForEachExtraStackRangeCbEmmPv _ZN6__lsan24LockStuffAndStopTheWorldEPFvRKN11__sanitizer20SuspendedThreadsListEPvEPNS_18CheckForLeaksParamE _ZN6__lsan26DoRecoverableLeakCheckVoidEv _ZN6__lsan27EnsureMainThreadIDIsCorrectEv _ZN6__lsan33InitializePlatformSpecificModulesEv _ZN6__lsan34ProcessPlatformSpecificAllocationsEPN11__sanitizer18InternalMmapVectorImEE _ZN6__lsan5Flags11SetDefaultsEv _ZN6__lsan9GetLinkerEv _ZNK6__lsan12LsanMetadata14requested_sizeEv _ZNK6__lsan12LsanMetadata14stack_trace_idEv _ZNK6__lsan12LsanMetadata3tagEv _ZNK6__lsan12LsanMetadata9allocatedEv __libc_iterate_dynamic_tls __lsan_default_options __lsan_default_suppressions __lsan_disable __lsan_do_leak_check __lsan_do_recoverable_leak_check __lsan_enable __lsan_ignore_object __lsan_is_turned_off __lsan_register_root_region __lsan_unregister_root_region _ZN6__lsan13LockAllocatorEv _ZN6__lsan15UnlockAllocatorEv _ZN6__lsan15disable_counterE _ZN6__lsan18LockThreadRegistryEv _ZN6__lsan20DisabledInThisThreadEv _ZN6__lsan20UnlockThreadRegistryEv _ZN7__ubsan11ubsan_flagsE _ZN7__ubsan12ScopedReportC1ENS_13ReportOptionsENS_8LocationENS_9ErrorTypeE _ZN7__ubsan12ScopedReportC2ENS_13ReportOptionsENS_8LocationENS_9ErrorTypeE _ZN7__ubsan12ScopedReportD1Ev _ZN7__ubsan12ScopedReportD2Ev _ZN7__ubsan14IsPCSuppressedENS_9ErrorTypeEmPKc _ZN7__ubsan21IsVptrCheckSuppressedEPKc _ZN7__ubsan21getSymbolizedLocationEm _ZN7__ubsan22GetSanititizerToolNameEv _ZN7__ubsan22InitializeSuppressionsEv _ZN7__ubsan23UndefinedBehaviorReportC1EPKcRNS_8LocationERN11__sanitizer20InternalScopedStringE _ZN7__ubsan27InitAsStandaloneIfNecessaryEv _ZN7__ubsan4DiagD1Ev _ZN7__ubsan4DiagD2Ev _ZN7__ubsan4DiaglsERKNS_14TypeDescriptorE _ZN7__ubsan4DiaglsERKNS_5ValueE _ZNK7__ubsan5Value12getSIntValueEv _ZNK7__ubsan5Value12getUIntValueEv _ZNK7__ubsan5Value13getFloatValueEv snprintf _ZN7__ubsan12InitAsPluginEv _ZN7__ubsan15InitializeFlagsEv _ZN7__ubsan16InitAsStandaloneEv _ZN7__ubsan18RegisterUbsanFlagsEPN11__sanitizer10FlagParserEPNS_5FlagsE _ZN7__ubsan5Flags11SetDefaultsEv __ubsan_default_options _ZN7__ubsan12ignoreReportENS_14SourceLocationENS_13ReportOptionsENS_9ErrorTypeE _ZN7__ubsan14TypeCheckKindsE _ZN7__ubsan16getObjCClassNameEm _ZNK7__ubsan5Value19getPositiveIntValueEv __ubsan_handle_add_overflow __ubsan_handle_add_overflow_abort __ubsan_handle_alignment_assumption __ubsan_handle_alignment_assumption_abort __ubsan_handle_builtin_unreachable __ubsan_handle_cfi_bad_type __ubsan_handle_cfi_check_fail __ubsan_handle_cfi_check_fail_abort __ubsan_handle_divrem_overflow __ubsan_handle_divrem_overflow_abort __ubsan_handle_float_cast_overflow __ubsan_handle_float_cast_overflow_abort __ubsan_handle_implicit_conversion __ubsan_handle_implicit_conversion_abort __ubsan_handle_invalid_builtin __ubsan_handle_invalid_builtin_abort __ubsan_handle_invalid_objc_cast __ubsan_handle_invalid_objc_cast_abort __ubsan_handle_load_invalid_value __ubsan_handle_load_invalid_value_abort __ubsan_handle_missing_return __ubsan_handle_mul_overflow __ubsan_handle_mul_overflow_abort __ubsan_handle_negate_overflow __ubsan_handle_negate_overflow_abort __ubsan_handle_nonnull_arg __ubsan_handle_nonnull_arg_abort __ubsan_handle_nonnull_return_v1 __ubsan_handle_nonnull_return_v1_abort __ubsan_handle_nullability_arg __ubsan_handle_nullability_arg_abort __ubsan_handle_nullability_return_v1 __ubsan_handle_nullability_return_v1_abort __ubsan_handle_out_of_bounds __ubsan_handle_out_of_bounds_abort __ubsan_handle_pointer_overflow __ubsan_handle_pointer_overflow_abort __ubsan_handle_shift_out_of_bounds __ubsan_handle_shift_out_of_bounds_abort __ubsan_handle_sub_overflow __ubsan_handle_sub_overflow_abort __ubsan_handle_type_mismatch_v1 __ubsan_handle_type_mismatch_v1_abort __ubsan_handle_vla_bound_not_positive __ubsan_handle_vla_bound_not_positive_abort _ZN7__ubsan23UndefinedBehaviorReportC2EPKcRNS_8LocationERN11__sanitizer20InternalScopedStringE __ubsan_get_current_report_data __ubsan_on_report _ZN11__sanitizer10QuarantineIN6__asan18QuarantineCallbackENS1_9AsanChunkEE15DrainAndRecycleEPNS_15QuarantineCacheIS2_EES2_ _ZN11__sanitizer10QuarantineIN6__asan18QuarantineCallbackENS1_9AsanChunkEE5DrainEPNS_15QuarantineCacheIS2_EES2_ _ZN11__sanitizer10QuarantineIN6__asan18QuarantineCallbackENS1_9AsanChunkEE7RecycleEmS2_ _ZN11__sanitizer10QuarantineIN6__asan18QuarantineCallbackENS1_9AsanChunkEE9DoRecycleEPNS_15QuarantineCacheIS2_EES2_ _ZN11__sanitizer15QuarantineCacheIN6__asan18QuarantineCallbackEE12MergeBatchesEPS3_ _ZN11__sanitizer15QuarantineCacheIN6__asan18QuarantineCallbackEE7EnqueueES2_Pvm _ZN11__sanitizer17CombinedAllocatorINS_20SizeClassAllocator32IN6__asan4AP32INS_21LocalAddressSpaceViewEEEEENS_32LargeMmapAllocatorPtrArrayStaticEE8AllocateEPNS_30SizeClassAllocator32LocalCacheIS6_EEmm _ZN11__sanitizer18BufferedStackTrace10UnwindImplEmmPvbj _ZN11__sanitizer18LargeMmapAllocatorIN6__asan20AsanMapUnmapCallbackENS_32LargeMmapAllocatorPtrArrayStaticENS_21LocalAddressSpaceViewEE10DeallocateEPNS_14AllocatorStatsEPv _ZN11__sanitizer18LargeMmapAllocatorIN6__asan20AsanMapUnmapCallbackENS_32LargeMmapAllocatorPtrArrayStaticENS_21LocalAddressSpaceViewEE12ForEachChunkEPFvmPvES6_ _ZN11__sanitizer18LargeMmapAllocatorIN6__asan20AsanMapUnmapCallbackENS_32LargeMmapAllocatorPtrArrayStaticENS_21LocalAddressSpaceViewEE13GetBlockBeginEPKv _ZN11__sanitizer18LargeMmapAllocatorIN6__asan20AsanMapUnmapCallbackENS_32LargeMmapAllocatorPtrArrayStaticENS_21LocalAddressSpaceViewEE18EnsureSortedChunksEv _ZN11__sanitizer18LargeMmapAllocatorIN6__asan20AsanMapUnmapCallbackENS_32LargeMmapAllocatorPtrArrayStaticENS_21LocalAddressSpaceViewEE23GetBlockBeginFastLockedEPv _ZN11__sanitizer18LargeMmapAllocatorIN6__asan20AsanMapUnmapCallbackENS_32LargeMmapAllocatorPtrArrayStaticENS_21LocalAddressSpaceViewEE8AllocateEPNS_14AllocatorStatsEmm _ZN11__sanitizer20SizeClassAllocator32IN6__asan4AP32INS_21LocalAddressSpaceViewEEEE13AllocateBatchEPNS_14AllocatorStatsEPNS_30SizeClassAllocator32LocalCacheIS5_EEm _ZN11__sanitizer20SizeClassAllocator32IN6__asan4AP32INS_21LocalAddressSpaceViewEEEE14AllocateRegionEPNS_14AllocatorStatsEm _ZN11__sanitizer20SizeClassAllocator32IN6__asan4AP32INS_21LocalAddressSpaceViewEEEE15DeallocateBatchEPNS_14AllocatorStatsEmPNS5_13TransferBatchE _ZN11__sanitizer20SizeClassAllocator32IN6__asan4AP32INS_21LocalAddressSpaceViewEEEE16PopulateFreeListEPNS_14AllocatorStatsEPNS_30SizeClassAllocator32LocalCacheIS5_EEPNS5_13SizeClassInfoEm _ZN11__sanitizer30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32IN6__asan4AP32INS_21LocalAddressSpaceViewEEEEEE10DeallocateEPS6_mPv _ZN11__sanitizer30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32IN6__asan4AP32INS_21LocalAddressSpaceViewEEEEEE11CreateBatchEmPS6_PNS6_13TransferBatchE _ZN11__sanitizer30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32IN6__asan4AP32INS_21LocalAddressSpaceViewEEEEEE5DrainEPNS7_8PerClassEPS6_m _ZN11__sanitizer30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32IN6__asan4AP32INS_21LocalAddressSpaceViewEEEEEE6RefillEPNS7_8PerClassEPS6_m _ZN14__interception11real_memcpyE _ZN14__interception11real_memsetE _ZN6__asan10kMidMemBegE _ZN6__asan10kMidMemEndE _ZN6__asan11asan_callocEmmPN11__sanitizer18BufferedStackTraceE _ZN6__asan11asan_deleteEPvmmPN11__sanitizer18BufferedStackTraceENS_9AllocTypeE _ZN6__asan11asan_initedE _ZN6__asan11asan_mallocEmPN11__sanitizer18BufferedStackTraceE _ZN6__asan11asan_vallocEmPN11__sanitizer18BufferedStackTraceE _ZN6__asan11kHighMemEndE _ZN6__asan12PoisonShadowEmmh _ZN6__asan12asan_pvallocEmPN11__sanitizer18BufferedStackTraceE _ZN6__asan12asan_reallocEPvmPN11__sanitizer18BufferedStackTraceE _ZN6__asan13asan_memalignEmmPN11__sanitizer18BufferedStackTraceENS_9AllocTypeE _ZN6__asan15AsanInitFromRtlEv _ZN6__asan15CanPoisonMemoryEv _ZN6__asan16AllocatorOptions6CopyToEPNS_5FlagsEPN11__sanitizer11CommonFlagsE _ZN6__asan16AllocatorOptions7SetFromEPKNS_5FlagsEPKN11__sanitizer11CommonFlagsE _ZN6__asan16GetCurrentThreadEv _ZN6__asan16ReportDoubleFreeEmPN11__sanitizer18BufferedStackTraceE _ZN6__asan17ReportOutOfMemoryEmPN11__sanitizer18BufferedStackTraceE _ZN6__asan17asan_reallocarrayEPvmmPN11__sanitizer18BufferedStackTraceE _ZN6__asan18QuarantineCallback7RecycleEPNS_9AsanChunkE _ZN6__asan18asan_aligned_allocEmmPN11__sanitizer18BufferedStackTraceE _ZN6__asan19GetAllocatorOptionsEPNS_16AllocatorOptionsE _ZN6__asan19InitializeAllocatorERKNS_16AllocatorOptionsE _ZN6__asan19asan_posix_memalignEPPvmmPN11__sanitizer18BufferedStackTraceE _ZN6__asan20GetMallocContextSizeEv _ZN6__asan20ReportCallocOverflowEmmPN11__sanitizer18BufferedStackTraceE _ZN6__asan21GetCurrentThreadStatsEv _ZN6__asan21ReInitializeAllocatorERKNS_16AllocatorOptionsE _ZN6__asan21ReportFreeNotMallocedEmPN11__sanitizer18BufferedStackTraceE _ZN6__asan21ReportPvallocOverflowEmPN11__sanitizer18BufferedStackTraceE _ZN6__asan22FindHeapChunkByAddressEm _ZN6__asan22ReportRssLimitExceededEPN11__sanitizer18BufferedStackTraceE _ZN6__asan23FindHeapChunkByAllocBegEm _ZN6__asan23ReportAllocTypeMismatchEmPN11__sanitizer18BufferedStackTraceENS_9AllocTypeES3_ _ZN6__asan23asan_malloc_usable_sizeEPKvmm _ZN6__asan26ReportAllocationSizeTooBigEmmmPN11__sanitizer18BufferedStackTraceE _ZN6__asan26ReportReallocArrayOverflowEmmPN11__sanitizer18BufferedStackTraceE _ZN6__asan27PrintInternalAllocatorStatsEv _ZN6__asan27ReportNewDeleteTypeMismatchEmmmPN11__sanitizer18BufferedStackTraceE _ZN6__asan28AsanThreadLocalMallocStorage10CommitBackEv _ZN6__asan28asan_flags_dont_use_directlyE _ZN6__asan29FlushUnneededASanShadowMemoryEmm _ZN6__asan30ReportMallocUsableSizeNotOwnedEmPN11__sanitizer18BufferedStackTraceE _ZN6__asan32AsanSoftRssLimitExceededCallbackEb _ZN6__asan32ReportInvalidAllocationAlignmentEmPN11__sanitizer18BufferedStackTraceE _ZN6__asan34ReportInvalidAlignedAllocAlignmentEmmPN11__sanitizer18BufferedStackTraceE _ZN6__asan35ReportInvalidPosixMemalignAlignmentEmPN11__sanitizer18BufferedStackTraceE _ZN6__asan39ReportSanitizerGetAllocatedSizeNotOwnedEmPN11__sanitizer18BufferedStackTraceE _ZN6__asan9Allocator10DeallocateEPvmmPN11__sanitizer18BufferedStackTraceENS_9AllocTypeE _ZN6__asan9Allocator10ReallocateEPvmPN11__sanitizer18BufferedStackTraceE _ZN6__asan9Allocator12ReInitializeERKNS_16AllocatorOptionsE _ZN6__asan9Allocator13RePoisonChunkEm _ZN6__asan9Allocator15QuarantineChunkEPNS_9AsanChunkEPvPN11__sanitizer18BufferedStackTraceE _ZN6__asan9Allocator21InitLinkerInitializedERKNS_16AllocatorOptionsE _ZN6__asan9Allocator21UpdateAllocationStackEmPN11__sanitizer18BufferedStackTraceE _ZN6__asan9Allocator22FindHeapChunkByAddressEm _ZN6__asan9Allocator8AllocateEmmPN11__sanitizer18BufferedStackTraceENS_9AllocTypeEb _ZN6__asan9FakeStack17AddrIsInFakeStackEmPmS1_ _ZN6__asan9asan_freeEPvPN11__sanitizer18BufferedStackTraceENS_9AllocTypeE _ZN6__lsan12LsanMetadataC2Em _ZNK6__asan13AsanChunkView11IsAllocatedEv _ZNK6__asan13AsanChunkView12GetAllocTypeEv _ZNK6__asan13AsanChunkView12GetFreeStackEv _ZNK6__asan13AsanChunkView13GetAllocStackEv _ZNK6__asan13AsanChunkView13IsQuarantinedEv _ZNK6__asan13AsanChunkView14GetFreeStackIdEv _ZNK6__asan13AsanChunkView15GetAllocStackIdEv _ZNK6__asan13AsanChunkView22UserRequestedAlignmentEv _ZNK6__asan13AsanChunkView3BegEv _ZNK6__asan13AsanChunkView3EndEv _ZNK6__asan13AsanChunkView7FreeTidEv _ZNK6__asan13AsanChunkView7IsValidEv _ZNK6__asan13AsanChunkView8AllocTidEv _ZNK6__asan13AsanChunkView8UsedSizeEv _ZNK6__asan9Allocator12CheckOptionsERKNS_16AllocatorOptionsE __asan_shadow_memory_dynamic_address __asan_update_allocation_context __sanitizer_free_hook __sanitizer_get_allocated_size __sanitizer_get_estimated_allocated_size __sanitizer_get_ownership __sanitizer_malloc_hook __sanitizer_purge_allocator _ZN6__asan12AsanActivateEv _ZN6__asan14AsanDeactivateEv _ZN6__asan18SetCanPoisonMemoryEb _ZN6__asan20AsanDeactivatedFlags23RegisterActivationFlagsEPN11__sanitizer10FlagParserEPNS_5FlagsEPNS1_11CommonFlagsE _ZN6__asan20AsanDeactivatedFlags27OverrideFromActivationFlagsEv _ZN6__asan20SetMallocContextSizeEj _ZN6__asan18AddressDescriptionC2Emmb _ZN6__asan21ParseFrameDescriptionEPKcPN11__sanitizer18InternalMmapVectorINS_13StackVarDescrEEE __asan_get_alloc_stack __asan_get_free_stack __asan_get_shadow_mapping __asan_locate_address _ZN6__asan10AsanThread25GetStackFrameAccessByAddrEmPNS0_16StackFrameAccessE _ZN6__asan14DescribeThreadEPNS_17AsanThreadContextE _ZN6__asan18AddressDescriptionC1Emmb _ZN6__asan18asanThreadRegistryEv _ZN6__asan19AsanThreadIdAndNameC1Ej _ZN6__asan19AsanThreadIdAndNameC2Ej _ZN6__asan19PrintGlobalLocationEPN11__sanitizer20InternalScopedStringERK13__asan_global _ZN6__asan20GetGlobalsForAddressEmP13__asan_globalPji _ZN6__asan22PrintGlobalNameIfASCIIEPN11__sanitizer20InternalScopedStringERK13__asan_global _ZN6__asan23MaybeDemangleGlobalNameEPKc _ZN6__asan23PrintAddressDescriptionEmmPKc _ZN6__asan24FindThreadByStackAddressEm _ZN6__asan25GetHeapAddressInformationEmmPNS_22HeapAddressDescriptionE _ZN6__asan27GetGlobalAddressInformationEmmPNS_24GlobalAddressDescriptionE _ZN6__asan27GetShadowAddressInformationEmPNS_24ShadowAddressDescriptionE _ZN6__asan27GetThreadContextByTidLockedEj _ZNK6__asan22HeapAddressDescription5PrintEv _ZNK6__asan23StackAddressDescription5PrintEv _ZNK6__asan24GlobalAddressDescription27PointsInsideTheSameVariableERKS0_ _ZNK6__asan24GlobalAddressDescription5PrintEPKc _ZNK6__asan24ShadowAddressDescription5PrintEv _ZN6__asan12ErrorGeneric5PrintEv _ZN6__asan12ErrorGenericC1Ejmmmmbm _ZN6__asan12ErrorGenericC2Ejmmmmbm _ZN6__asan15ErrorDoubleFree5PrintEv _ZN6__asan15PrintMemoryByteEPN11__sanitizer20InternalScopedStringEPKchbS4_ _ZN6__asan16ErrorOutOfMemory5PrintEv _ZN6__asan17ErrorDeadlySignal5PrintEv _ZN6__asan17ErrorODRViolation5PrintEv _ZN6__asan19ErrorCallocOverflow5PrintEv _ZN6__asan20ErrorFreeNotMalloced5PrintEv _ZN6__asan20ErrorPvallocOverflow5PrintEv _ZN6__asan21ErrorRssLimitExceeded5PrintEv _ZN6__asan22ErrorAllocTypeMismatch5PrintEv _ZN6__asan23ErrorInvalidPointerPair5PrintEv _ZN6__asan25ErrorAllocationSizeTooBig5PrintEv _ZN6__asan25ErrorReallocArrayOverflow5PrintEv _ZN6__asan26ErrorNewDeleteTypeMismatch5PrintEv _ZN6__asan29ErrorMallocUsableSizeNotOwned5PrintEv _ZN6__asan31ErrorInvalidAllocationAlignment5PrintEv _ZN6__asan31ErrorStringFunctionSizeOverflow5PrintEv _ZN6__asan33ErrorInvalidAlignedAllocAlignment5PrintEv _ZN6__asan34ErrorInvalidPosixMemalignAlignment5PrintEv _ZN6__asan38ErrorSanitizerGetAllocatedSizeNotOwned5PrintEv _ZN6__asan38ErrorStringFunctionMemoryRangesOverlap5PrintEv _ZN6__asan43ErrorBadParamsToAnnotateContiguousContainer5PrintEv _ZNK6__asan18AddressDescription5PrintEPKc _ZN6__asan10AsanThread32AsyncSignalSafeLazyInitFakeStackEv _ZN6__asan15SetTLSFakeStackEPNS_9FakeStackE _ZN6__asan22GetCurrentTidOrInvalidEv _ZN6__asan9FakeStack14HandleNoReturnEv _ZN6__asan9FakeStack16ForEachFakeFrameEPFvmmPvES1_ _ZN6__asan9FakeStack2GCEm _ZN6__asan9FakeStack6CreateEm _ZN6__asan9FakeStack7DestroyEi __asan_addr_is_in_fake_stack __asan_alloca_poison __asan_allocas_unpoison __asan_get_current_fake_stack __asan_option_detect_stack_use_after_return __asan_stack_free_0 __asan_stack_free_1 __asan_stack_free_10 __asan_stack_free_2 __asan_stack_free_3 __asan_stack_free_4 __asan_stack_free_5 __asan_stack_free_6 __asan_stack_free_7 __asan_stack_free_8 __asan_stack_free_9 __asan_stack_malloc_0 __asan_stack_malloc_1 __asan_stack_malloc_10 __asan_stack_malloc_2 __asan_stack_malloc_3 __asan_stack_malloc_4 __asan_stack_malloc_5 __asan_stack_malloc_6 __asan_stack_malloc_7 __asan_stack_malloc_8 __asan_stack_malloc_9 _ZN6__asan15InitializeFlagsEv __asan_default_options _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__asan13DynInitGlobalEE7ReallocEm _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__asan13DynInitGlobalEE9push_backERKS2_ _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__asan22GlobalRegistrationSiteEE7ReallocEm _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__asan22GlobalRegistrationSiteEE9push_backERKS2_ _ZN6__asan18AsanApplyToGlobalsEPFvP13__asan_globalmEPKv _ZN6__asan18ReportODRViolationEPK13__asan_globaljS2_j _ZN6__asan21StopInitOrderCheckingEv _ZN6__asan24IsODRViolationSuppressedEPKc __asan_after_dynamic_init __asan_before_dynamic_init __asan_region_is_poisoned __asan_register_elf_globals __asan_register_globals __asan_register_image_globals __asan_unregister_elf_globals __asan_unregister_globals __asan_unregister_image_globals _Unwind_RaiseException _Z23MemcmpInterceptorCommonPvPFiPKvS1_mES1_S1_m _ZN11__sanitizer11AddrHashMapI25CommonInterceptorMetadataLm31051EE7acquireEPNS2_6HandleE _ZN11__sanitizer11AddrHashMapI25CommonInterceptorMetadataLm31051EE7releaseEPNS2_6HandleE _ZN11__sanitizer4SortI10ioctl_desc18ioctl_desc_compareEEvPT_mT0_ _ZN11__sanitizer7RWMutex12ReadLockSlowEv _ZN11__sanitizer7RWMutex8LockSlowEv _ZN14__interception10real__exitE _ZN14__interception10real_atollE _ZN14__interception10real_ctimeE _ZN14__interception10real_fgetsE _ZN14__interception10real_fopenE _ZN14__interception10real_fputsE _ZN14__interception10real_freadE _ZN14__interception10real_frexpE _ZN14__interception10real_ftimeE _ZN14__interception10real_indexE _ZN14__interception10real_ioctlE _ZN14__interception10real_mlockE _ZN14__interception10real_modffE _ZN14__interception10real_modflE _ZN14__interception10real_popenE _ZN14__interception10real_prctlE _ZN14__interception10real_preadE _ZN14__interception10real_readvE _ZN14__interception10real_scanfE _ZN14__interception10real_timesE _ZN14__interception10real_unameE _ZN14__interception10real_vforkE _ZN14__interception10real_wait3E _ZN14__interception10real_writeE _ZN14__interception11real_acceptE _ZN14__interception11real_fcloseE _ZN14__interception11real_fdopenE _ZN14__interception11real_fflushE _ZN14__interception11real_frexpfE _ZN14__interception11real_frexplE _ZN14__interception11real_fscanfE _ZN14__interception11real_fwriteE _ZN14__interception11real_getcwdE _ZN14__interception11real_gmtimeE _ZN14__interception11real_lgammaE _ZN14__interception11real_memchrE _ZN14__interception11real_memcmpE _ZN14__interception11real_memmemE _ZN14__interception11real_mktimeE _ZN14__interception11real_pcloseE _ZN14__interception11real_printfE _ZN14__interception11real_pwriteE _ZN14__interception11real_remquoE _ZN14__interception11real_sendtoE _ZN14__interception11real_setbufE _ZN14__interception11real_signalE _ZN14__interception11real_sincosE _ZN14__interception11real_sscanfE _ZN14__interception11real_strcatE _ZN14__interception11real_strchrE _ZN14__interception11real_strcmpE _ZN14__interception11real_strcpyE _ZN14__interception11real_strdupE _ZN14__interception11real_strlenE _ZN14__interception11real_strspnE _ZN14__interception11real_strstrE _ZN14__interception11real_strtokE _ZN14__interception11real_strtolE _ZN14__interception11real_tmpnamE _ZN14__interception11real_vscanfE _ZN14__interception11real_waitidE _ZN14__interception11real_wcscatE _ZN14__interception11real_wcsdupE _ZN14__interception11real_wcslenE _ZN14__interception11real_writevE _ZN14__interception12real___wait4E _ZN14__interception12real_asctimeE _ZN14__interception12real_ctermidE _ZN14__interception12real_ctime_rE _ZN14__interception12real_fprintfE _ZN14__interception12real_freopenE _ZN14__interception12real_getutidE _ZN14__interception12real_lgammafE _ZN14__interception12real_lgammalE _ZN14__interception12real_longjmpE _ZN14__interception12real_memmoveE _ZN14__interception12real_memrchrE _ZN14__interception12real_mincoreE _ZN14__interception12real_munlockE _ZN14__interception12real_opendirE _ZN14__interception12real_ptsnameE _ZN14__interception12real_readdirE _ZN14__interception12real_recvmsgE _ZN14__interception12real_regcompE _ZN14__interception12real_regexecE _ZN14__interception12real_regfreeE _ZN14__interception12real_remquofE _ZN14__interception12real_remquolE _ZN14__interception12real_sendmsgE _ZN14__interception12real_setvbufE _ZN14__interception12real_sigwaitE _ZN14__interception12real_sincosfE _ZN14__interception12real_sincoslE _ZN14__interception12real_sprintfE _ZN14__interception12real_strcspnE _ZN14__interception12real_strlcatE _ZN14__interception12real_strlcpyE _ZN14__interception12real_strncatE _ZN14__interception12real_strncmpE _ZN14__interception12real_strncpyE _ZN14__interception12real_strndupE _ZN14__interception12real_strnlenE _ZN14__interception12real_strpbrkE _ZN14__interception12real_strrchrE _ZN14__interception12real_strtollE _ZN14__interception12real_strxfrmE _ZN14__interception12real_sysinfoE _ZN14__interception12real_tempnamE _ZN14__interception12real_ttynameE _ZN14__interception12real_vfscanfE _ZN14__interception12real_vprintfE _ZN14__interception12real_vsscanfE _ZN14__interception12real_waitpidE _ZN14__interception12real_wcsncatE _ZN14__interception12real_wcsnlenE _ZN14__interception12real_wcsxfrmE _ZN14__interception13real__longjmpE _ZN14__interception13real_asprintfE _ZN14__interception13real_getgrgidE _ZN14__interception13real_getgrnamE _ZN14__interception13real_getpwnamE _ZN14__interception13real_getpwuidE _ZN14__interception13real_getutentE _ZN14__interception13real_getxattrE _ZN14__interception13real_gmtime_rE _ZN14__interception13real_lgamma_rE _ZN14__interception13real_mbstowcsE _ZN14__interception13real_mlockallE _ZN14__interception13real_mprotectE _ZN14__interception13real_readlinkE _ZN14__interception13real_realpathE _ZN14__interception13real_recvfromE _ZN14__interception13real_recvmmsgE _ZN14__interception13real_regerrorE _ZN14__interception13real_sem_initE _ZN14__interception13real_sem_postE _ZN14__interception13real_sem_waitE _ZN14__interception13real_sendmmsgE _ZN14__interception13real_snprintfE _ZN14__interception13real_strerrorE _ZN14__interception13real_strptimeE _ZN14__interception13real_vfprintfE _ZN14__interception13real_vsprintfE _ZN14__interception13real_wcstombsE _ZN14__interception14real_asctime_rE _ZN14__interception14real_fgetxattrE _ZN14__interception14real_getgroupsE _ZN14__interception14real_getitimerE _ZN14__interception14real_getmntentE _ZN14__interception14real_getresgidE _ZN14__interception14real_getresuidE _ZN14__interception14real_getutlineE _ZN14__interception14real_inet_atonE _ZN14__interception14real_inet_ntopE _ZN14__interception14real_inet_ptonE _ZN14__interception14real_lgammaf_rE _ZN14__interception14real_lgetxattrE _ZN14__interception14real_listxattrE _ZN14__interception14real_localtimeE _ZN14__interception14real_mbsrtowcsE _ZN14__interception14real_ptsname_rE _ZN14__interception14real_readdir_rE _ZN14__interception14real_setbufferE _ZN14__interception14real_setitimerE _ZN14__interception14real_setlocaleE _ZN14__interception14real_sigactionE _ZN14__interception14real_strchrnulE _ZN14__interception14real_strtoimaxE _ZN14__interception14real_strtoumaxE _ZN14__interception14real_strxfrm_lE _ZN14__interception14real_ttyname_rE _ZN14__interception14real_vasprintfE _ZN14__interception14real_vsnprintfE _ZN14__interception14real_wcsrtombsE _ZN14__interception14real_wcsxfrm_lE _ZN14__interception15real_bsd_signalE _ZN14__interception15real_ether_atonE _ZN14__interception15real_ether_ntoaE _ZN14__interception15real_flistxattrE _ZN14__interception15real_gethostentE _ZN14__interception15real_getsockoptE _ZN14__interception15real_initgroupsE _ZN14__interception15real_llistxattrE _ZN14__interception15real_munlockallE _ZN14__interception15real_readlinkatE _ZN14__interception15real_setlinebufE _ZN14__interception15real_siglongjmpE _ZN14__interception15real_sigpendingE _ZN14__interception15real_strcasecmpE _ZN14__interception15real_strcasestrE _ZN14__interception15real_strerror_rE _ZN14__interception16real___cxa_throwE _ZN14__interception16real___strxfrm_lE _ZN14__interception16real___wcsxfrm_lE _ZN14__interception16real_getaddrinfoE _ZN14__interception16real_getnameinfoE _ZN14__interception16real_getpeernameE _ZN14__interception16real_getprotoentE _ZN14__interception16real_getsocknameE _ZN14__interception16real_localtime_rE _ZN14__interception16real_sem_destroyE _ZN14__interception16real_sem_trywaitE _ZN14__interception16real_sigaltstackE _ZN14__interception16real_sigprocmaskE _ZN14__interception16real_strncasecmpE _ZN14__interception17real___cxa_atexitE _ZN14__interception17real_clock_getresE _ZN14__interception17real_eventfd_readE _ZN14__interception17real_pthread_joinE _ZN14__interception17real_sem_getvalueE _ZN14__interception18real_clock_gettimeE _ZN14__interception18real_clock_settimeE _ZN14__interception18real_eventfd_writeE _ZN14__interception18real_gethostbyaddrE _ZN14__interception18real_gethostbynameE _ZN14__interception18real_sem_timedwaitE _ZN14__interception19real_gethostbyname2E _ZN14__interception19real_getprotobynameE _ZN14__interception19real_pthread_createE _ZN14__interception20real_gethostbyname_rE _ZN14__interception20real_pthread_sigmaskE _ZN14__interception21real_getprotobynumberE _ZN14__interception21real_process_vm_readvE _ZN14__interception22real_process_vm_writevE _ZN14__interception23real_pthread_mutex_lockE _ZN14__interception24real_clock_getcpuclockidE _ZN14__interception25real_pthread_mutex_unlockE _ZN14__interception26real_pthread_attr_getscopeE _ZN14__interception26real_pthread_attr_getstackE _ZN14__interception26real_pthread_getschedparamE _ZN14__interception26real_pthread_setcanceltypeE _ZN14__interception27real__Unwind_RaiseExceptionE _ZN14__interception27real_pthread_setcancelstateE _ZN14__interception30real_pthread_attr_getguardsizeE _ZN14__interception30real_pthread_attr_getstacksizeE _ZN14__interception30real_pthread_mutexattr_gettypeE _ZN14__interception31real_pthread_attr_getschedparamE _ZN14__interception32real_pthread_attr_getdetachstateE _ZN14__interception32real_pthread_attr_getschedpolicyE _ZN14__interception32real_pthread_condattr_getpsharedE _ZN14__interception33real_pthread_mutexattr_getpsharedE _ZN14__interception34real_pthread_rwlockattr_getpsharedE _ZN14__interception36real___cxa_rethrow_primary_exceptionE _ZN14__interception9real_atoiE _ZN14__interception9real_atolE _ZN14__interception9real_bcmpE _ZN14__interception9real_mmapE _ZN14__interception9real_modfE _ZN14__interception9real_pollE _ZN14__interception9real_putsE _ZN14__interception9real_readE _ZN14__interception9real_recvE _ZN14__interception9real_sendE _ZN14__interception9real_statE _ZN14__interception9real_timeE _ZN14__interception9real_waitE _ZN6__asan10AsanThread11ThreadStartEyPN11__sanitizer16atomic_uintptr_tE _ZN6__asan10AsanThread6CreateEPFPvS1_ES1_jPN11__sanitizer10StackTraceEb _ZN6__asan16SetCurrentThreadEPNS_10AsanThreadE _ZN6__asan18ReportGenericErrorEmmmmbmjb _ZN6__asan20asan_init_is_runningE _ZN6__asan22IsStackTraceSuppressedEPKN11__sanitizer10StackTraceE _ZN6__asan23IsInterceptorSuppressedEPKc _ZN6__asan26InitializeAsanInterceptorsEv _ZN6__asan27EnsureMainThreadIDIsCorrectEv _ZN6__asan30InitializePlatformInterceptorsEv _ZN6__asan31HaveStackTraceBasedSuppressionsEv _ZN6__asan32ReportStringFunctionSizeOverflowEmmPN11__sanitizer18BufferedStackTraceE _ZN6__asan39ReportStringFunctionMemoryRangesOverlapEPKcS1_mS1_mPN11__sanitizer18BufferedStackTraceE __asan_handle_no_return __cxa_rethrow_primary_exception __cxa_throw __interceptor__Unwind_RaiseException __interceptor___cxa_atexit __interceptor___cxa_rethrow_primary_exception __interceptor___cxa_throw __interceptor___strxfrm_l __interceptor___wait4 __interceptor___wcsxfrm_l __interceptor__exit __interceptor__longjmp __interceptor_accept __interceptor_asctime __interceptor_asctime_r __interceptor_asprintf __interceptor_atoi __interceptor_atol __interceptor_atoll __interceptor_bcmp __interceptor_bsd_signal __interceptor_clock_getcpuclockid __interceptor_clock_getres __interceptor_clock_gettime __interceptor_clock_settime __interceptor_ctermid __interceptor_ctime __interceptor_ctime_r __interceptor_ether_aton __interceptor_ether_ntoa __interceptor_eventfd_read __interceptor_eventfd_write __interceptor_fclose __interceptor_fdopen __interceptor_fflush __interceptor_fgets __interceptor_fgetxattr __interceptor_flistxattr __interceptor_fopen __interceptor_fprintf __interceptor_fputs __interceptor_fread __interceptor_free __interceptor_freopen __interceptor_frexp __interceptor_frexpf __interceptor_frexpl __interceptor_fscanf __interceptor_ftime __interceptor_fwrite __interceptor_getaddrinfo __interceptor_getcwd __interceptor_getgrgid __interceptor_getgrnam __interceptor_getgroups __interceptor_gethostbyaddr __interceptor_gethostbyname __interceptor_gethostbyname2 __interceptor_gethostbyname_r __interceptor_gethostent __interceptor_getitimer __interceptor_getmntent __interceptor_getnameinfo __interceptor_getpeername __interceptor_getprotobyname __interceptor_getprotobynumber __interceptor_getprotoent __interceptor_getpwnam __interceptor_getpwuid __interceptor_getresgid __interceptor_getresuid __interceptor_getsockname __interceptor_getsockopt __interceptor_getutent __interceptor_getutid __interceptor_getutline __interceptor_getxattr __interceptor_gmtime __interceptor_gmtime_r __interceptor_index __interceptor_inet_aton __interceptor_inet_ntop __interceptor_inet_pton __interceptor_initgroups __interceptor_ioctl __interceptor_lgamma __interceptor_lgamma_r __interceptor_lgammaf __interceptor_lgammaf_r __interceptor_lgammal __interceptor_lgetxattr __interceptor_listxattr __interceptor_llistxattr __interceptor_localtime __interceptor_localtime_r __interceptor_longjmp __interceptor_malloc __interceptor_mbsrtowcs __interceptor_mbstowcs __interceptor_memchr __interceptor_memcmp __interceptor_memcpy __interceptor_memmem __interceptor_memmove __interceptor_memrchr __interceptor_memset __interceptor_mincore __interceptor_mktime __interceptor_mlock __interceptor_mlockall __interceptor_mmap __interceptor_modf __interceptor_modff __interceptor_modfl __interceptor_mprotect __interceptor_munlock __interceptor_munlockall __interceptor_opendir __interceptor_pclose __interceptor_poll __interceptor_popen __interceptor_prctl __interceptor_pread __interceptor_printf __interceptor_process_vm_readv __interceptor_process_vm_writev __interceptor_pthread_attr_getdetachstate __interceptor_pthread_attr_getguardsize __interceptor_pthread_attr_getschedparam __interceptor_pthread_attr_getschedpolicy __interceptor_pthread_attr_getscope __interceptor_pthread_attr_getstack __interceptor_pthread_attr_getstacksize __interceptor_pthread_condattr_getpshared __interceptor_pthread_create __interceptor_pthread_getschedparam __interceptor_pthread_join __interceptor_pthread_mutex_lock __interceptor_pthread_mutex_unlock __interceptor_pthread_mutexattr_getpshared __interceptor_pthread_mutexattr_gettype __interceptor_pthread_rwlockattr_getpshared __interceptor_pthread_setcancelstate __interceptor_pthread_setcanceltype __interceptor_pthread_sigmask __interceptor_ptsname __interceptor_ptsname_r __interceptor_puts __interceptor_pwrite __interceptor_read __interceptor_readdir __interceptor_readdir_r __interceptor_readlink __interceptor_readlinkat __interceptor_readv __interceptor_realpath __interceptor_recv __interceptor_recvfrom __interceptor_recvmmsg __interceptor_recvmsg __interceptor_regcomp __interceptor_regerror __interceptor_regexec __interceptor_regfree __interceptor_remquo __interceptor_remquof __interceptor_remquol __interceptor_scanf __interceptor_sem_destroy __interceptor_sem_getvalue __interceptor_sem_init __interceptor_sem_post __interceptor_sem_timedwait __interceptor_sem_trywait __interceptor_sem_wait __interceptor_send __interceptor_sendmmsg __interceptor_sendmsg __interceptor_sendto __interceptor_setbuf __interceptor_setbuffer __interceptor_setitimer __interceptor_setlinebuf __interceptor_setlocale __interceptor_setvbuf __interceptor_sigaction __interceptor_sigaltstack __interceptor_siglongjmp __interceptor_signal __interceptor_sigpending __interceptor_sigprocmask __interceptor_sigwait __interceptor_sincos __interceptor_sincosf __interceptor_sincosl __interceptor_snprintf __interceptor_sprintf __interceptor_sscanf __interceptor_stat __interceptor_strcasecmp __interceptor_strcasestr __interceptor_strcat __interceptor_strchr __interceptor_strchrnul __interceptor_strcmp __interceptor_strcpy __interceptor_strcspn __interceptor_strdup __interceptor_strerror __interceptor_strerror_r __interceptor_strlcat __interceptor_strlcpy __interceptor_strlen __interceptor_strncasecmp __interceptor_strncat __interceptor_strncmp __interceptor_strncpy __interceptor_strndup __interceptor_strnlen __interceptor_strpbrk __interceptor_strptime __interceptor_strrchr __interceptor_strspn __interceptor_strstr __interceptor_strtoimax __interceptor_strtok __interceptor_strtol __interceptor_strtoll __interceptor_strtoumax __interceptor_strxfrm __interceptor_strxfrm_l __interceptor_sysinfo __interceptor_tempnam __interceptor_time __interceptor_times __interceptor_tmpnam __interceptor_ttyname __interceptor_ttyname_r __interceptor_uname __interceptor_vasprintf __interceptor_vfork __interceptor_vfprintf __interceptor_vfscanf __interceptor_vprintf __interceptor_vscanf __interceptor_vsnprintf __interceptor_vsprintf __interceptor_vsscanf __interceptor_wait __interceptor_wait3 __interceptor_waitid __interceptor_waitpid __interceptor_wcscat __interceptor_wcsdup __interceptor_wcslen __interceptor_wcsncat __interceptor_wcsnlen __interceptor_wcsrtombs __interceptor_wcstombs __interceptor_wcsxfrm __interceptor_wcsxfrm_l __interceptor_write __interceptor_writev __sanitizer_syscall_post_impl_accept __sanitizer_syscall_post_impl_accept4 __sanitizer_syscall_post_impl_access __sanitizer_syscall_post_impl_acct __sanitizer_syscall_post_impl_add_key __sanitizer_syscall_post_impl_alarm __sanitizer_syscall_post_impl_bdflush __sanitizer_syscall_post_impl_bind __sanitizer_syscall_post_impl_brk __sanitizer_syscall_post_impl_capget __sanitizer_syscall_post_impl_capset __sanitizer_syscall_post_impl_chdir __sanitizer_syscall_post_impl_chmod __sanitizer_syscall_post_impl_chown __sanitizer_syscall_post_impl_chroot __sanitizer_syscall_post_impl_clock_getres __sanitizer_syscall_post_impl_clock_gettime __sanitizer_syscall_post_impl_clock_nanosleep __sanitizer_syscall_post_impl_clock_settime __sanitizer_syscall_post_impl_close __sanitizer_syscall_post_impl_connect __sanitizer_syscall_post_impl_creat __sanitizer_syscall_post_impl_delete_module __sanitizer_syscall_post_impl_dup __sanitizer_syscall_post_impl_dup2 __sanitizer_syscall_post_impl_dup3 __sanitizer_syscall_post_impl_epoll_create __sanitizer_syscall_post_impl_epoll_create1 __sanitizer_syscall_post_impl_epoll_ctl __sanitizer_syscall_post_impl_epoll_pwait __sanitizer_syscall_post_impl_epoll_wait __sanitizer_syscall_post_impl_eventfd __sanitizer_syscall_post_impl_eventfd2 __sanitizer_syscall_post_impl_exit __sanitizer_syscall_post_impl_exit_group __sanitizer_syscall_post_impl_faccessat __sanitizer_syscall_post_impl_fchdir __sanitizer_syscall_post_impl_fchmod __sanitizer_syscall_post_impl_fchmodat __sanitizer_syscall_post_impl_fchown __sanitizer_syscall_post_impl_fchownat __sanitizer_syscall_post_impl_fcntl __sanitizer_syscall_post_impl_fcntl64 __sanitizer_syscall_post_impl_fdatasync __sanitizer_syscall_post_impl_fgetxattr __sanitizer_syscall_post_impl_flistxattr __sanitizer_syscall_post_impl_flock __sanitizer_syscall_post_impl_fork __sanitizer_syscall_post_impl_fremovexattr __sanitizer_syscall_post_impl_fsetxattr __sanitizer_syscall_post_impl_fstat __sanitizer_syscall_post_impl_fstat64 __sanitizer_syscall_post_impl_fstatat64 __sanitizer_syscall_post_impl_fsync __sanitizer_syscall_post_impl_ftruncate __sanitizer_syscall_post_impl_futimesat __sanitizer_syscall_post_impl_get_mempolicy __sanitizer_syscall_post_impl_get_robust_list __sanitizer_syscall_post_impl_getcpu __sanitizer_syscall_post_impl_getcwd __sanitizer_syscall_post_impl_getdents __sanitizer_syscall_post_impl_getdents64 __sanitizer_syscall_post_impl_getegid __sanitizer_syscall_post_impl_geteuid __sanitizer_syscall_post_impl_getgid __sanitizer_syscall_post_impl_getgroups __sanitizer_syscall_post_impl_gethostname __sanitizer_syscall_post_impl_getitimer __sanitizer_syscall_post_impl_getpeername __sanitizer_syscall_post_impl_getpgid __sanitizer_syscall_post_impl_getpgrp __sanitizer_syscall_post_impl_getpid __sanitizer_syscall_post_impl_getppid __sanitizer_syscall_post_impl_getpriority __sanitizer_syscall_post_impl_getrandom __sanitizer_syscall_post_impl_getresgid __sanitizer_syscall_post_impl_getresuid __sanitizer_syscall_post_impl_getrlimit __sanitizer_syscall_post_impl_getrusage __sanitizer_syscall_post_impl_getsid __sanitizer_syscall_post_impl_getsockname __sanitizer_syscall_post_impl_getsockopt __sanitizer_syscall_post_impl_gettid __sanitizer_syscall_post_impl_gettimeofday __sanitizer_syscall_post_impl_getuid __sanitizer_syscall_post_impl_getxattr __sanitizer_syscall_post_impl_init_module __sanitizer_syscall_post_impl_inotify_add_watch __sanitizer_syscall_post_impl_inotify_init __sanitizer_syscall_post_impl_inotify_init1 __sanitizer_syscall_post_impl_inotify_rm_watch __sanitizer_syscall_post_impl_io_cancel __sanitizer_syscall_post_impl_io_destroy __sanitizer_syscall_post_impl_io_getevents __sanitizer_syscall_post_impl_io_setup __sanitizer_syscall_post_impl_io_submit __sanitizer_syscall_post_impl_ioctl __sanitizer_syscall_post_impl_ioperm __sanitizer_syscall_post_impl_ioprio_get __sanitizer_syscall_post_impl_ioprio_set __sanitizer_syscall_post_impl_ipc __sanitizer_syscall_post_impl_kexec_load __sanitizer_syscall_post_impl_keyctl __sanitizer_syscall_post_impl_kill __sanitizer_syscall_post_impl_lchown __sanitizer_syscall_post_impl_lgetxattr __sanitizer_syscall_post_impl_link __sanitizer_syscall_post_impl_linkat __sanitizer_syscall_post_impl_listen __sanitizer_syscall_post_impl_listxattr __sanitizer_syscall_post_impl_llistxattr __sanitizer_syscall_post_impl_llseek __sanitizer_syscall_post_impl_lookup_dcookie __sanitizer_syscall_post_impl_lremovexattr __sanitizer_syscall_post_impl_lseek __sanitizer_syscall_post_impl_lsetxattr __sanitizer_syscall_post_impl_lstat __sanitizer_syscall_post_impl_lstat64 __sanitizer_syscall_post_impl_madvise __sanitizer_syscall_post_impl_mbind __sanitizer_syscall_post_impl_migrate_pages __sanitizer_syscall_post_impl_mincore __sanitizer_syscall_post_impl_mkdir __sanitizer_syscall_post_impl_mkdirat __sanitizer_syscall_post_impl_mknod __sanitizer_syscall_post_impl_mknodat __sanitizer_syscall_post_impl_mlock __sanitizer_syscall_post_impl_mlockall __sanitizer_syscall_post_impl_mmap_pgoff __sanitizer_syscall_post_impl_mount __sanitizer_syscall_post_impl_move_pages __sanitizer_syscall_post_impl_mprotect __sanitizer_syscall_post_impl_mremap __sanitizer_syscall_post_impl_msgget __sanitizer_syscall_post_impl_msgrcv __sanitizer_syscall_post_impl_msgsnd __sanitizer_syscall_post_impl_msync __sanitizer_syscall_post_impl_munlock __sanitizer_syscall_post_impl_munlockall __sanitizer_syscall_post_impl_munmap __sanitizer_syscall_post_impl_name_to_handle_at __sanitizer_syscall_post_impl_nanosleep __sanitizer_syscall_post_impl_newfstat __sanitizer_syscall_post_impl_newfstatat __sanitizer_syscall_post_impl_newlstat __sanitizer_syscall_post_impl_newstat __sanitizer_syscall_post_impl_newuname __sanitizer_syscall_post_impl_ni_syscall __sanitizer_syscall_post_impl_nice __sanitizer_syscall_post_impl_old_getrlimit __sanitizer_syscall_post_impl_old_mmap __sanitizer_syscall_post_impl_old_readdir __sanitizer_syscall_post_impl_old_select __sanitizer_syscall_post_impl_oldumount __sanitizer_syscall_post_impl_olduname __sanitizer_syscall_post_impl_open __sanitizer_syscall_post_impl_open_by_handle_at __sanitizer_syscall_post_impl_openat __sanitizer_syscall_post_impl_pause __sanitizer_syscall_post_impl_pciconfig_iobase __sanitizer_syscall_post_impl_pciconfig_read __sanitizer_syscall_post_impl_pciconfig_write __sanitizer_syscall_post_impl_perf_event_open __sanitizer_syscall_post_impl_personality __sanitizer_syscall_post_impl_pipe __sanitizer_syscall_post_impl_pipe2 __sanitizer_syscall_post_impl_pivot_root __sanitizer_syscall_post_impl_poll __sanitizer_syscall_post_impl_ppoll __sanitizer_syscall_post_impl_pread64 __sanitizer_syscall_post_impl_preadv __sanitizer_syscall_post_impl_process_vm_readv __sanitizer_syscall_post_impl_process_vm_writev __sanitizer_syscall_post_impl_pselect6 __sanitizer_syscall_post_impl_ptrace __sanitizer_syscall_post_impl_pwrite64 __sanitizer_syscall_post_impl_pwritev __sanitizer_syscall_post_impl_quotactl __sanitizer_syscall_post_impl_read __sanitizer_syscall_post_impl_readlink __sanitizer_syscall_post_impl_readlinkat __sanitizer_syscall_post_impl_readv __sanitizer_syscall_post_impl_reboot __sanitizer_syscall_post_impl_recv __sanitizer_syscall_post_impl_recvfrom __sanitizer_syscall_post_impl_recvmmsg __sanitizer_syscall_post_impl_recvmsg __sanitizer_syscall_post_impl_remap_file_pages __sanitizer_syscall_post_impl_removexattr __sanitizer_syscall_post_impl_rename __sanitizer_syscall_post_impl_renameat __sanitizer_syscall_post_impl_request_key __sanitizer_syscall_post_impl_restart_syscall __sanitizer_syscall_post_impl_rmdir __sanitizer_syscall_post_impl_rt_sigaction __sanitizer_syscall_post_impl_rt_sigpending __sanitizer_syscall_post_impl_rt_sigprocmask __sanitizer_syscall_post_impl_rt_sigqueueinfo __sanitizer_syscall_post_impl_rt_sigtimedwait __sanitizer_syscall_post_impl_rt_tgsigqueueinfo __sanitizer_syscall_post_impl_sched_get_priority_max __sanitizer_syscall_post_impl_sched_get_priority_min __sanitizer_syscall_post_impl_sched_getaffinity __sanitizer_syscall_post_impl_sched_getparam __sanitizer_syscall_post_impl_sched_getscheduler __sanitizer_syscall_post_impl_sched_rr_get_interval __sanitizer_syscall_post_impl_sched_setaffinity __sanitizer_syscall_post_impl_sched_setparam __sanitizer_syscall_post_impl_sched_setscheduler __sanitizer_syscall_post_impl_sched_yield __sanitizer_syscall_post_impl_select __sanitizer_syscall_post_impl_semctl __sanitizer_syscall_post_impl_semget __sanitizer_syscall_post_impl_semop __sanitizer_syscall_post_impl_semtimedop __sanitizer_syscall_post_impl_send __sanitizer_syscall_post_impl_sendfile __sanitizer_syscall_post_impl_sendfile64 __sanitizer_syscall_post_impl_sendmmsg __sanitizer_syscall_post_impl_sendmsg __sanitizer_syscall_post_impl_sendto __sanitizer_syscall_post_impl_set_mempolicy __sanitizer_syscall_post_impl_set_robust_list __sanitizer_syscall_post_impl_set_tid_address __sanitizer_syscall_post_impl_setdomainname __sanitizer_syscall_post_impl_setfsgid __sanitizer_syscall_post_impl_setfsuid __sanitizer_syscall_post_impl_setgid __sanitizer_syscall_post_impl_setgroups __sanitizer_syscall_post_impl_sethostname __sanitizer_syscall_post_impl_setitimer __sanitizer_syscall_post_impl_setns __sanitizer_syscall_post_impl_setpgid __sanitizer_syscall_post_impl_setpriority __sanitizer_syscall_post_impl_setregid __sanitizer_syscall_post_impl_setresgid __sanitizer_syscall_post_impl_setresuid __sanitizer_syscall_post_impl_setreuid __sanitizer_syscall_post_impl_setrlimit __sanitizer_syscall_post_impl_setsid __sanitizer_syscall_post_impl_setsockopt __sanitizer_syscall_post_impl_settimeofday __sanitizer_syscall_post_impl_setuid __sanitizer_syscall_post_impl_setxattr __sanitizer_syscall_post_impl_sgetmask __sanitizer_syscall_post_impl_shmat __sanitizer_syscall_post_impl_shmdt __sanitizer_syscall_post_impl_shmget __sanitizer_syscall_post_impl_shutdown __sanitizer_syscall_post_impl_sigaction __sanitizer_syscall_post_impl_sigaltstack __sanitizer_syscall_post_impl_signal __sanitizer_syscall_post_impl_signalfd __sanitizer_syscall_post_impl_signalfd4 __sanitizer_syscall_post_impl_sigpending __sanitizer_syscall_post_impl_sigprocmask __sanitizer_syscall_post_impl_socket __sanitizer_syscall_post_impl_socketcall __sanitizer_syscall_post_impl_socketpair __sanitizer_syscall_post_impl_splice __sanitizer_syscall_post_impl_spu_create __sanitizer_syscall_post_impl_spu_run __sanitizer_syscall_post_impl_ssetmask __sanitizer_syscall_post_impl_stat __sanitizer_syscall_post_impl_stat64 __sanitizer_syscall_post_impl_stime __sanitizer_syscall_post_impl_swapoff __sanitizer_syscall_post_impl_swapon __sanitizer_syscall_post_impl_symlink __sanitizer_syscall_post_impl_symlinkat __sanitizer_syscall_post_impl_sync __sanitizer_syscall_post_impl_syncfs __sanitizer_syscall_post_impl_sysctl __sanitizer_syscall_post_impl_sysfs __sanitizer_syscall_post_impl_sysinfo __sanitizer_syscall_post_impl_syslog __sanitizer_syscall_post_impl_tee __sanitizer_syscall_post_impl_tgkill __sanitizer_syscall_post_impl_time __sanitizer_syscall_post_impl_timer_create __sanitizer_syscall_post_impl_timer_delete __sanitizer_syscall_post_impl_timer_getoverrun __sanitizer_syscall_post_impl_timer_gettime __sanitizer_syscall_post_impl_timer_settime __sanitizer_syscall_post_impl_timerfd_create __sanitizer_syscall_post_impl_timerfd_gettime __sanitizer_syscall_post_impl_timerfd_settime __sanitizer_syscall_post_impl_times __sanitizer_syscall_post_impl_tkill __sanitizer_syscall_post_impl_truncate __sanitizer_syscall_post_impl_umask __sanitizer_syscall_post_impl_umount __sanitizer_syscall_post_impl_uname __sanitizer_syscall_post_impl_unlink __sanitizer_syscall_post_impl_unlinkat __sanitizer_syscall_post_impl_unshare __sanitizer_syscall_post_impl_uselib __sanitizer_syscall_post_impl_utime __sanitizer_syscall_post_impl_utimensat __sanitizer_syscall_post_impl_utimes __sanitizer_syscall_post_impl_vfork __sanitizer_syscall_post_impl_vhangup __sanitizer_syscall_post_impl_vmsplice __sanitizer_syscall_post_impl_wait4 __sanitizer_syscall_post_impl_waitid __sanitizer_syscall_post_impl_waitpid __sanitizer_syscall_post_impl_write __sanitizer_syscall_post_impl_writev __sanitizer_syscall_pre_impl_accept __sanitizer_syscall_pre_impl_accept4 __sanitizer_syscall_pre_impl_access __sanitizer_syscall_pre_impl_acct __sanitizer_syscall_pre_impl_add_key __sanitizer_syscall_pre_impl_alarm __sanitizer_syscall_pre_impl_bdflush __sanitizer_syscall_pre_impl_bind __sanitizer_syscall_pre_impl_brk __sanitizer_syscall_pre_impl_capget __sanitizer_syscall_pre_impl_capset __sanitizer_syscall_pre_impl_chdir __sanitizer_syscall_pre_impl_chmod __sanitizer_syscall_pre_impl_chown __sanitizer_syscall_pre_impl_chroot __sanitizer_syscall_pre_impl_clock_getres __sanitizer_syscall_pre_impl_clock_gettime __sanitizer_syscall_pre_impl_clock_nanosleep __sanitizer_syscall_pre_impl_clock_settime __sanitizer_syscall_pre_impl_close __sanitizer_syscall_pre_impl_connect __sanitizer_syscall_pre_impl_creat __sanitizer_syscall_pre_impl_delete_module __sanitizer_syscall_pre_impl_dup __sanitizer_syscall_pre_impl_dup2 __sanitizer_syscall_pre_impl_dup3 __sanitizer_syscall_pre_impl_epoll_create __sanitizer_syscall_pre_impl_epoll_create1 __sanitizer_syscall_pre_impl_epoll_ctl __sanitizer_syscall_pre_impl_epoll_pwait __sanitizer_syscall_pre_impl_epoll_wait __sanitizer_syscall_pre_impl_eventfd __sanitizer_syscall_pre_impl_eventfd2 __sanitizer_syscall_pre_impl_exit __sanitizer_syscall_pre_impl_exit_group __sanitizer_syscall_pre_impl_faccessat __sanitizer_syscall_pre_impl_fchdir __sanitizer_syscall_pre_impl_fchmod __sanitizer_syscall_pre_impl_fchmodat __sanitizer_syscall_pre_impl_fchown __sanitizer_syscall_pre_impl_fchownat __sanitizer_syscall_pre_impl_fcntl __sanitizer_syscall_pre_impl_fcntl64 __sanitizer_syscall_pre_impl_fdatasync __sanitizer_syscall_pre_impl_fgetxattr __sanitizer_syscall_pre_impl_flistxattr __sanitizer_syscall_pre_impl_flock __sanitizer_syscall_pre_impl_fork __sanitizer_syscall_pre_impl_fremovexattr __sanitizer_syscall_pre_impl_fsetxattr __sanitizer_syscall_pre_impl_fstat __sanitizer_syscall_pre_impl_fstat64 __sanitizer_syscall_pre_impl_fstatat64 __sanitizer_syscall_pre_impl_fsync __sanitizer_syscall_pre_impl_ftruncate __sanitizer_syscall_pre_impl_futimesat __sanitizer_syscall_pre_impl_get_mempolicy __sanitizer_syscall_pre_impl_get_robust_list __sanitizer_syscall_pre_impl_getcpu __sanitizer_syscall_pre_impl_getcwd __sanitizer_syscall_pre_impl_getdents __sanitizer_syscall_pre_impl_getdents64 __sanitizer_syscall_pre_impl_getegid __sanitizer_syscall_pre_impl_geteuid __sanitizer_syscall_pre_impl_getgid __sanitizer_syscall_pre_impl_getgroups __sanitizer_syscall_pre_impl_gethostname __sanitizer_syscall_pre_impl_getitimer __sanitizer_syscall_pre_impl_getpeername __sanitizer_syscall_pre_impl_getpgid __sanitizer_syscall_pre_impl_getpgrp __sanitizer_syscall_pre_impl_getpid __sanitizer_syscall_pre_impl_getppid __sanitizer_syscall_pre_impl_getpriority __sanitizer_syscall_pre_impl_getrandom __sanitizer_syscall_pre_impl_getresgid __sanitizer_syscall_pre_impl_getresuid __sanitizer_syscall_pre_impl_getrlimit __sanitizer_syscall_pre_impl_getrusage __sanitizer_syscall_pre_impl_getsid __sanitizer_syscall_pre_impl_getsockname __sanitizer_syscall_pre_impl_getsockopt __sanitizer_syscall_pre_impl_gettid __sanitizer_syscall_pre_impl_gettimeofday __sanitizer_syscall_pre_impl_getuid __sanitizer_syscall_pre_impl_getxattr __sanitizer_syscall_pre_impl_init_module __sanitizer_syscall_pre_impl_inotify_add_watch __sanitizer_syscall_pre_impl_inotify_init __sanitizer_syscall_pre_impl_inotify_init1 __sanitizer_syscall_pre_impl_inotify_rm_watch __sanitizer_syscall_pre_impl_io_cancel __sanitizer_syscall_pre_impl_io_destroy __sanitizer_syscall_pre_impl_io_getevents __sanitizer_syscall_pre_impl_io_setup __sanitizer_syscall_pre_impl_io_submit __sanitizer_syscall_pre_impl_ioctl __sanitizer_syscall_pre_impl_ioperm __sanitizer_syscall_pre_impl_ioprio_get __sanitizer_syscall_pre_impl_ioprio_set __sanitizer_syscall_pre_impl_ipc __sanitizer_syscall_pre_impl_kexec_load __sanitizer_syscall_pre_impl_keyctl __sanitizer_syscall_pre_impl_kill __sanitizer_syscall_pre_impl_lchown __sanitizer_syscall_pre_impl_lgetxattr __sanitizer_syscall_pre_impl_link __sanitizer_syscall_pre_impl_linkat __sanitizer_syscall_pre_impl_listen __sanitizer_syscall_pre_impl_listxattr __sanitizer_syscall_pre_impl_llistxattr __sanitizer_syscall_pre_impl_llseek __sanitizer_syscall_pre_impl_lookup_dcookie __sanitizer_syscall_pre_impl_lremovexattr __sanitizer_syscall_pre_impl_lseek __sanitizer_syscall_pre_impl_lsetxattr __sanitizer_syscall_pre_impl_lstat __sanitizer_syscall_pre_impl_lstat64 __sanitizer_syscall_pre_impl_madvise __sanitizer_syscall_pre_impl_mbind __sanitizer_syscall_pre_impl_migrate_pages __sanitizer_syscall_pre_impl_mincore __sanitizer_syscall_pre_impl_mkdir __sanitizer_syscall_pre_impl_mkdirat __sanitizer_syscall_pre_impl_mknod __sanitizer_syscall_pre_impl_mknodat __sanitizer_syscall_pre_impl_mlock __sanitizer_syscall_pre_impl_mlockall __sanitizer_syscall_pre_impl_mmap_pgoff __sanitizer_syscall_pre_impl_mount __sanitizer_syscall_pre_impl_move_pages __sanitizer_syscall_pre_impl_mprotect __sanitizer_syscall_pre_impl_mremap __sanitizer_syscall_pre_impl_msgget __sanitizer_syscall_pre_impl_msgrcv __sanitizer_syscall_pre_impl_msgsnd __sanitizer_syscall_pre_impl_msync __sanitizer_syscall_pre_impl_munlock __sanitizer_syscall_pre_impl_munlockall __sanitizer_syscall_pre_impl_munmap __sanitizer_syscall_pre_impl_name_to_handle_at __sanitizer_syscall_pre_impl_nanosleep __sanitizer_syscall_pre_impl_newfstat __sanitizer_syscall_pre_impl_newfstatat __sanitizer_syscall_pre_impl_newlstat __sanitizer_syscall_pre_impl_newstat __sanitizer_syscall_pre_impl_newuname __sanitizer_syscall_pre_impl_ni_syscall __sanitizer_syscall_pre_impl_nice __sanitizer_syscall_pre_impl_old_getrlimit __sanitizer_syscall_pre_impl_old_mmap __sanitizer_syscall_pre_impl_old_readdir __sanitizer_syscall_pre_impl_old_select __sanitizer_syscall_pre_impl_oldumount __sanitizer_syscall_pre_impl_olduname __sanitizer_syscall_pre_impl_open __sanitizer_syscall_pre_impl_open_by_handle_at __sanitizer_syscall_pre_impl_openat __sanitizer_syscall_pre_impl_pause __sanitizer_syscall_pre_impl_pciconfig_iobase __sanitizer_syscall_pre_impl_pciconfig_read __sanitizer_syscall_pre_impl_pciconfig_write __sanitizer_syscall_pre_impl_perf_event_open __sanitizer_syscall_pre_impl_personality __sanitizer_syscall_pre_impl_pipe __sanitizer_syscall_pre_impl_pipe2 __sanitizer_syscall_pre_impl_pivot_root __sanitizer_syscall_pre_impl_poll __sanitizer_syscall_pre_impl_ppoll __sanitizer_syscall_pre_impl_pread64 __sanitizer_syscall_pre_impl_preadv __sanitizer_syscall_pre_impl_process_vm_readv __sanitizer_syscall_pre_impl_process_vm_writev __sanitizer_syscall_pre_impl_pselect6 __sanitizer_syscall_pre_impl_ptrace __sanitizer_syscall_pre_impl_pwrite64 __sanitizer_syscall_pre_impl_pwritev __sanitizer_syscall_pre_impl_quotactl __sanitizer_syscall_pre_impl_read __sanitizer_syscall_pre_impl_readlink __sanitizer_syscall_pre_impl_readlinkat __sanitizer_syscall_pre_impl_readv __sanitizer_syscall_pre_impl_reboot __sanitizer_syscall_pre_impl_recv __sanitizer_syscall_pre_impl_recvfrom __sanitizer_syscall_pre_impl_recvmmsg __sanitizer_syscall_pre_impl_recvmsg __sanitizer_syscall_pre_impl_remap_file_pages __sanitizer_syscall_pre_impl_removexattr __sanitizer_syscall_pre_impl_rename __sanitizer_syscall_pre_impl_renameat __sanitizer_syscall_pre_impl_request_key __sanitizer_syscall_pre_impl_restart_syscall __sanitizer_syscall_pre_impl_rmdir __sanitizer_syscall_pre_impl_rt_sigaction __sanitizer_syscall_pre_impl_rt_sigpending __sanitizer_syscall_pre_impl_rt_sigprocmask __sanitizer_syscall_pre_impl_rt_sigqueueinfo __sanitizer_syscall_pre_impl_rt_sigtimedwait __sanitizer_syscall_pre_impl_rt_tgsigqueueinfo __sanitizer_syscall_pre_impl_sched_get_priority_max __sanitizer_syscall_pre_impl_sched_get_priority_min __sanitizer_syscall_pre_impl_sched_getaffinity __sanitizer_syscall_pre_impl_sched_getparam __sanitizer_syscall_pre_impl_sched_getscheduler __sanitizer_syscall_pre_impl_sched_rr_get_interval __sanitizer_syscall_pre_impl_sched_setaffinity __sanitizer_syscall_pre_impl_sched_setparam __sanitizer_syscall_pre_impl_sched_setscheduler __sanitizer_syscall_pre_impl_sched_yield __sanitizer_syscall_pre_impl_select __sanitizer_syscall_pre_impl_semctl __sanitizer_syscall_pre_impl_semget __sanitizer_syscall_pre_impl_semop __sanitizer_syscall_pre_impl_semtimedop __sanitizer_syscall_pre_impl_send __sanitizer_syscall_pre_impl_sendfile __sanitizer_syscall_pre_impl_sendfile64 __sanitizer_syscall_pre_impl_sendmmsg __sanitizer_syscall_pre_impl_sendmsg __sanitizer_syscall_pre_impl_sendto __sanitizer_syscall_pre_impl_set_mempolicy __sanitizer_syscall_pre_impl_set_robust_list __sanitizer_syscall_pre_impl_set_tid_address __sanitizer_syscall_pre_impl_setdomainname __sanitizer_syscall_pre_impl_setfsgid __sanitizer_syscall_pre_impl_setfsuid __sanitizer_syscall_pre_impl_setgid __sanitizer_syscall_pre_impl_setgroups __sanitizer_syscall_pre_impl_sethostname __sanitizer_syscall_pre_impl_setitimer __sanitizer_syscall_pre_impl_setns __sanitizer_syscall_pre_impl_setpgid __sanitizer_syscall_pre_impl_setpriority __sanitizer_syscall_pre_impl_setregid __sanitizer_syscall_pre_impl_setresgid __sanitizer_syscall_pre_impl_setresuid __sanitizer_syscall_pre_impl_setreuid __sanitizer_syscall_pre_impl_setrlimit __sanitizer_syscall_pre_impl_setsid __sanitizer_syscall_pre_impl_setsockopt __sanitizer_syscall_pre_impl_settimeofday __sanitizer_syscall_pre_impl_setuid __sanitizer_syscall_pre_impl_setxattr __sanitizer_syscall_pre_impl_sgetmask __sanitizer_syscall_pre_impl_shmat __sanitizer_syscall_pre_impl_shmdt __sanitizer_syscall_pre_impl_shmget __sanitizer_syscall_pre_impl_shutdown __sanitizer_syscall_pre_impl_sigaction __sanitizer_syscall_pre_impl_sigaltstack __sanitizer_syscall_pre_impl_signal __sanitizer_syscall_pre_impl_signalfd __sanitizer_syscall_pre_impl_signalfd4 __sanitizer_syscall_pre_impl_sigpending __sanitizer_syscall_pre_impl_sigprocmask __sanitizer_syscall_pre_impl_socket __sanitizer_syscall_pre_impl_socketcall __sanitizer_syscall_pre_impl_socketpair __sanitizer_syscall_pre_impl_splice __sanitizer_syscall_pre_impl_spu_create __sanitizer_syscall_pre_impl_spu_run __sanitizer_syscall_pre_impl_ssetmask __sanitizer_syscall_pre_impl_stat __sanitizer_syscall_pre_impl_stat64 __sanitizer_syscall_pre_impl_stime __sanitizer_syscall_pre_impl_swapoff __sanitizer_syscall_pre_impl_swapon __sanitizer_syscall_pre_impl_symlink __sanitizer_syscall_pre_impl_symlinkat __sanitizer_syscall_pre_impl_sync __sanitizer_syscall_pre_impl_syncfs __sanitizer_syscall_pre_impl_sysctl __sanitizer_syscall_pre_impl_sysfs __sanitizer_syscall_pre_impl_sysinfo __sanitizer_syscall_pre_impl_syslog __sanitizer_syscall_pre_impl_tee __sanitizer_syscall_pre_impl_tgkill __sanitizer_syscall_pre_impl_time __sanitizer_syscall_pre_impl_timer_create __sanitizer_syscall_pre_impl_timer_delete __sanitizer_syscall_pre_impl_timer_getoverrun __sanitizer_syscall_pre_impl_timer_gettime __sanitizer_syscall_pre_impl_timer_settime __sanitizer_syscall_pre_impl_timerfd_create __sanitizer_syscall_pre_impl_timerfd_gettime __sanitizer_syscall_pre_impl_timerfd_settime __sanitizer_syscall_pre_impl_times __sanitizer_syscall_pre_impl_tkill __sanitizer_syscall_pre_impl_truncate __sanitizer_syscall_pre_impl_umask __sanitizer_syscall_pre_impl_umount __sanitizer_syscall_pre_impl_uname __sanitizer_syscall_pre_impl_unlink __sanitizer_syscall_pre_impl_unlinkat __sanitizer_syscall_pre_impl_unshare __sanitizer_syscall_pre_impl_uselib __sanitizer_syscall_pre_impl_utime __sanitizer_syscall_pre_impl_utimensat __sanitizer_syscall_pre_impl_utimes __sanitizer_syscall_pre_impl_vfork __sanitizer_syscall_pre_impl_vhangup __sanitizer_syscall_pre_impl_vmsplice __sanitizer_syscall_pre_impl_wait4 __sanitizer_syscall_pre_impl_waitid __sanitizer_syscall_pre_impl_waitpid __sanitizer_syscall_pre_impl_write __sanitizer_syscall_pre_impl_writev __sanitizer_weak_hook_memcmp __sanitizer_weak_hook_memmem __sanitizer_weak_hook_strcasecmp __sanitizer_weak_hook_strcasestr __sanitizer_weak_hook_strcmp __sanitizer_weak_hook_strncasecmp __sanitizer_weak_hook_strncmp __sanitizer_weak_hook_strstr __strxfrm_l __wait4 __wcsxfrm_l _exit _longjmp accept asctime asctime_r asprintf atoi atol atoll bcmp bsd_signal clock_getcpuclockid clock_getres clock_settime ctermid ctime ctime_r ether_aton ether_ntoa eventfd_read eventfd_write fclose fdopen fflush fgets fgetxattr flistxattr fopen fprintf fputs fread freopen frexp frexpf frexpl fscanf ftime fwrite getaddrinfo getcwd getgrgid getgrnam getgroups gethostbyaddr gethostbyname gethostbyname2 gethostbyname_r gethostent getitimer getmntent getnameinfo getpeername getprotobyname getprotobynumber getprotoent getpwnam getpwuid getresgid getresuid getsockname getsockopt getutent getutid getutline getxattr gmtime gmtime_r index inet_aton inet_ntop inet_pton initgroups ioctl lgamma lgamma_r lgammaf lgammaf_r lgammal lgetxattr listxattr llistxattr localtime localtime_r longjmp mbsrtowcs mbstowcs memchr memcmp memcpy memmem memmove memrchr memset mincore mktime mlock mlockall mmap modf modff modfl mprotect munlock munlockall opendir pclose poll popen prctl pread printf process_vm_readv process_vm_writev pthread_attr_getdetachstate pthread_attr_getguardsize pthread_attr_getschedparam pthread_attr_getschedpolicy pthread_attr_getscope pthread_attr_getstacksize pthread_condattr_getpshared pthread_create pthread_getschedparam pthread_join pthread_mutex_lock pthread_mutex_unlock pthread_mutexattr_getpshared pthread_mutexattr_gettype pthread_rwlockattr_getpshared pthread_setcancelstate pthread_setcanceltype pthread_sigmask ptsname ptsname_r puts pwrite read readdir readdir_r readlink readlinkat readv realpath recv recvfrom recvmmsg recvmsg regcomp regerror regexec regfree remquo remquof remquol scanf sem_destroy sem_getvalue sem_init sem_post sem_timedwait sem_trywait sem_wait send sendmmsg sendmsg sendto setbuf setbuffer setitimer setlinebuf setlocale setvbuf siglongjmp signal signgam sigpending sigprocmask sigwait sincos sincosf sincosl sprintf sscanf stat strcasecmp strcasestr strcat strchr strchrnul strcmp strcpy strcspn strdup strerror strerror_r strlcat strlcpy strlen strncasecmp strncat strncmp strncpy strndup strnlen strpbrk strptime strrchr strspn strstr strtoimax strtok strtol strtoll strtoumax strxfrm strxfrm_l sysinfo tempnam time times tmpnam ttyname ttyname_r uname vasprintf vfork vfprintf vfscanf vprintf vscanf vsnprintf vsprintf vsscanf wait wait3 waitid waitpid wcscat wcsdup wcslen wcsncat wcsnlen wcsrtombs wcstombs wcsxfrm wcsxfrm_l write writev __asan_memcpy __asan_memmove __asan_memset _ZN6__asan13AsanDlSymNextEPKc _ZN6__asan22FindDynamicShadowStartEv _ZN6__asan23AsanCheckIncompatibleRTEv _ZN6__asan25AsanCheckDynamicRTPrereqsEv _ZN6__asan31AsanDoesNotSupportStaticLinkageEv _ZN6__asan35InitializePlatformExceptionHandlersEv __asan_rt_version _ZN6__asan19ReplaceSystemMallocEv __asan_print_accumulated_stats __interceptor___libc_memalign __interceptor_aligned_alloc __interceptor_calloc __interceptor_mallinfo __interceptor_malloc_stats __interceptor_malloc_usable_size __interceptor_mallopt __interceptor_memalign __interceptor_posix_memalign __interceptor_pvalloc __interceptor_realloc __interceptor_reallocarray __interceptor_valloc __libc_memalign aligned_alloc calloc free mallinfo malloc malloc_stats malloc_usable_size mallopt memalign posix_memalign pvalloc realloc reallocarray valloc _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__asan14AllocationSiteEE7ReallocEm _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__asan14AllocationSiteEE9push_backERKS2_ _ZN11__sanitizer4SortIN6__asan14AllocationSiteEZNS1_11HeapProfile5PrintEmmEUlRKS2_S5_E_EEvPT_mT0_ _ZN6__asan11HeapProfile12ProcessChunkERKNS_13AsanChunkViewE _ZN6__asan11HeapProfile5PrintEmm _ZN6__asan21ShadowSegmentEndpointC2Em _ZN6__asan38AsanPoisonOrUnpoisonIntraObjectRedzoneEmmb _ZN6__asan44ReportBadParamsToAnnotateContiguousContainerEmmmmPN11__sanitizer18BufferedStackTraceE __asan_address_is_poisoned __asan_load_cxx_array_cookie __asan_poison_cxx_array_cookie __asan_poison_intra_object_redzone __asan_poison_memory_region __asan_poison_stack_memory __asan_report_error __asan_set_shadow_00 __asan_set_shadow_f1 __asan_set_shadow_f2 __asan_set_shadow_f3 __asan_set_shadow_f5 __asan_set_shadow_f8 __asan_unpoison_intra_object_redzone __asan_unpoison_memory_region __asan_unpoison_stack_memory __sanitizer_annotate_contiguous_container __sanitizer_contiguous_container_find_bad_address __sanitizer_unaligned_load16 __sanitizer_unaligned_load32 __sanitizer_unaligned_load64 __sanitizer_unaligned_store16 __sanitizer_unaligned_store32 __sanitizer_unaligned_store64 __sanitizer_verify_contiguous_container _ZN6__asan10AsanTSDGetEv _ZN6__asan10AsanTSDSetEPv _ZN6__asan10AsanThread7TSDDtorEPv _ZN6__asan11AsanTSDInitEPFvPvE _ZN6__asan13UnpoisonStackEmmPKc _ZN6__asan15PlatformTSDDtorEPv _ZN6__asan18AsanOnDeadlySignalEiPvS0_ _ZN6__asan18ReportDeadlySignalERKN11__sanitizer13SignalContextE _ZN6__asan22PlatformUnpoisonStacksEv pthread_getspecific pthread_key_create pthread_setspecific _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__asan13StackVarDescrEE7ReallocEm _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__asan13StackVarDescrEE9push_backERKS2_ _ZN6__asan10AsanThread27GetStackVariableShadowStartEm _ZN6__asan16ErrorDescription5PrintEv _ZN6__asan17ErrorDeadlySignalC2EjRKN11__sanitizer13SignalContextE _ZN6__asan19ScopedInErrorReport14current_error_E _ZN6__asan19ScopedInErrorReportD2Ev _ZN6__asan26AppendToErrorMessageBufferEPKc _ZN6__asan9Decorator10ShadowByteEh __asan_describe_address __asan_get_report_access_size __asan_get_report_access_type __asan_get_report_address __asan_get_report_bp __asan_get_report_description __asan_get_report_pc __asan_get_report_sp __asan_on_error __asan_report_present __asan_set_error_report_callback __sanitizer_ptr_cmp __sanitizer_ptr_sub _ZN6__asan10AsanThread12stack_bottomEv _ZN6__asan10AsanThread9stack_topEv _ZN6__asan16CreateMainThreadEv _ZN6__asan18AsanMappingProfileE _ZN6__asan22InitializeShadowMemoryEv _ZN6__asan22InitializeSuppressionsEv _ZN6__asan23PrintAddressSpaceLayoutEv __asan_exp_load1 __asan_exp_load16 __asan_exp_load2 __asan_exp_load4 __asan_exp_load8 __asan_exp_loadN __asan_exp_store1 __asan_exp_store16 __asan_exp_store2 __asan_exp_store4 __asan_exp_store8 __asan_exp_storeN __asan_extra_spill_area __asan_handle_vfork __asan_init __asan_load1 __asan_load16 __asan_load16_noabort __asan_load1_noabort __asan_load2 __asan_load2_noabort __asan_load4 __asan_load4_noabort __asan_load8 __asan_load8_noabort __asan_loadN __asan_loadN_noabort __asan_report_exp_load1 __asan_report_exp_load16 __asan_report_exp_load2 __asan_report_exp_load4 __asan_report_exp_load8 __asan_report_exp_load_n __asan_report_exp_store1 __asan_report_exp_store16 __asan_report_exp_store2 __asan_report_exp_store4 __asan_report_exp_store8 __asan_report_exp_store_n __asan_report_load1 __asan_report_load16 __asan_report_load16_noabort __asan_report_load1_noabort __asan_report_load2 __asan_report_load2_noabort __asan_report_load4 __asan_report_load4_noabort __asan_report_load8 __asan_report_load8_noabort __asan_report_load_n __asan_report_load_n_noabort __asan_report_store1 __asan_report_store16 __asan_report_store16_noabort __asan_report_store1_noabort __asan_report_store2 __asan_report_store2_noabort __asan_report_store4 __asan_report_store4_noabort __asan_report_store8 __asan_report_store8_noabort __asan_report_store_n __asan_report_store_n_noabort __asan_set_death_callback __asan_store1 __asan_store16 __asan_store16_noabort __asan_store1_noabort __asan_store2 __asan_store2_noabort __asan_store4 __asan_store4_noabort __asan_store8 __asan_store8_noabort __asan_storeN __asan_storeN_noabort __asan_test_only_reported_buggy_pointer __asan_version_mismatch_check_v9 __sanitizer_print_stack_trace _ZN6__asan22FlushToDeadThreadStatsEPNS_9AsanStatsE _ZN6__asan9AsanStats5PrintEv __sanitizer_get_current_allocated_bytes __sanitizer_get_free_bytes __sanitizer_get_heap_size __sanitizer_get_unmapped_bytes __asan_default_suppressions _ZN6__asan10AsanThread20SetThreadStackAndTlsEPKNS0_11InitOptionsE _ZN6__asan10AsanThread4InitEPKNS0_11InitOptionsE _ZN6__asan10AsanThread7DestroyEv _ZN6__asan17AsanThreadContext10OnFinishedEv _ZN6__asan17AsanThreadContext9OnCreatedEPv _ZTVN6__asan17AsanThreadContextE __sanitizer_finish_switch_fiber __sanitizer_start_switch_fiber _ZdaPv _ZdaPvRKSt9nothrow_t _ZdaPvSt11align_val_t _ZdaPvSt11align_val_tRKSt9nothrow_t _ZdaPvj _ZdaPvjSt11align_val_t _ZdlPv _ZdlPvRKSt9nothrow_t _ZdlPvSt11align_val_t _ZdlPvSt11align_val_tRKSt9nothrow_t _ZdlPvj _ZdlPvjSt11align_val_t _Znaj _ZnajRKSt9nothrow_t _ZnajSt11align_val_t _ZnajSt11align_val_tRKSt9nothrow_t _Znwj _ZnwjRKSt9nothrow_t _ZnwjSt11align_val_t _ZnwjSt11align_val_tRKSt9nothrow_t _ZN7__ubsan16checkDynamicTypeEPvS0_m _ZN7__ubsan21checkTypeInfoEqualityEPKvS1_ _ZN7__ubsan28getDynamicTypeInfoFromObjectEPv _ZN7__ubsan28getDynamicTypeInfoFromVtableEPv __ubsan_handle_dynamic_type_cache_miss __ubsan_handle_dynamic_type_cache_miss_abort __ubsan_handle_function_type_mismatch_v1 __ubsan_handle_function_type_mismatch_v1_abort __ubsan_vptr_type_cache _ZTIN10__cxxabiv117__class_type_infoE _ZTIN10__cxxabiv120__si_class_type_infoE _ZTIN10__cxxabiv121__vmi_class_type_infoE _ZTISt9type_info __dynamic_cast _ZN9libunwind10CFI_ParserINS_17LocalAddressSpaceEE20parseFDEInstructionsERS1_RKNS2_8FDE_InfoERKNS2_8CIE_InfoEjiPNS2_10PrologInfoE _ZN9libunwind10CFI_ParserINS_17LocalAddressSpaceEE7findFDEERS1_jjjjPNS2_8FDE_InfoEPNS2_8CIE_InfoE _ZN9libunwind10CFI_ParserINS_17LocalAddressSpaceEE8parseCIEERS1_jPNS2_8CIE_InfoE _ZN9libunwind10CFI_ParserINS_17LocalAddressSpaceEE9decodeFDEERS1_jPNS2_8FDE_InfoEPNS2_8CIE_InfoE _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE11getFloatRegEi _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE11setFloatRegEid _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE13isSignalFrameEv _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE13validFloatRegEi _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE15getFunctionNameEPcjPj _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE15getRegisterNameEi _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE23getInfoFromDwarfSectionEjRKNS_18UnwindInfoSectionsEj _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE24setInfoBasedOnIPRegisterEb _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE4stepEv _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE6getRegEi _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE6jumptoEv _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE6setRegEij _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE7getInfoEP15unw_proc_info_t _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE8validRegEi _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EED0Ev _ZN9libunwind13DwarfFDECacheINS_17LocalAddressSpaceEE10_bufferEndE _ZN9libunwind13DwarfFDECacheINS_17LocalAddressSpaceEE11_bufferUsedE _ZN9libunwind13DwarfFDECacheINS_17LocalAddressSpaceEE14_initialBufferE _ZN9libunwind13DwarfFDECacheINS_17LocalAddressSpaceEE5_lockE _ZN9libunwind13DwarfFDECacheINS_17LocalAddressSpaceEE7_bufferE _ZN9libunwind14EHHeaderParserINS_17LocalAddressSpaceEE17getTableEntrySizeEh _ZN9libunwind14EHHeaderParserINS_17LocalAddressSpaceEE7findFDEERS1_jjjPNS_10CFI_ParserIS1_E8FDE_InfoEPNS5_8CIE_InfoE _ZN9libunwind17DwarfInstructionsINS_17LocalAddressSpaceENS_13Registers_x86EE13stepWithDwarfERS1_jjRS2_Rb _ZN9libunwind17DwarfInstructionsINS_17LocalAddressSpaceENS_13Registers_x86EE16getSavedRegisterERS1_RKS2_jRKNS_10CFI_ParserIS1_E16RegisterLocationE _ZN9libunwind17DwarfInstructionsINS_17LocalAddressSpaceENS_13Registers_x86EE18evaluateExpressionEjRS1_RKS2_j _ZN9libunwind17LocalAddressSpace11getEncodedPERjjhj _ZN9libunwind17LocalAddressSpace17sThisAddressSpaceE _ZN9libunwind20AbstractUnwindCursorD2Ev _ZTVN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EEE __unw_get_proc_info __unw_get_reg __unw_init_local __unw_resume __unw_step unw_get_proc_info unw_get_reg unw_init_local unw_resume unw_step __sF __unw_getcontext __libunwind_Registers_x86_jumpto pthread_rwlock_rdlock pthread_rwlock_unlock pthread_rwlock_wrlock unw_getcontext