__cxa_atexit __cxa_finalize __register_atfork dlsym __sanitizer_report_error_summary __sanitizer_acquire_crash_state __sanitizer_install_malloc_and_free_hooks __sanitizer_set_report_path __sanitizer_set_report_fd __sanitizer_get_report_path syscall __errno clock_gettime __libc_stack_end dl_iterate_phdr __sanitizer_on_print __sanitizer_set_death_callback __sanitizer_print_memory_profile __sanitizer_sandbox_on_notify sigaction getrlimit pthread_attr_init pthread_self pthread_getattr_np pthread_attr_destroy __libc_get_static_tls_bounds getrusage openlog async_safe_write_log syslog __android_log_write android_set_abort_message getauxval setrlimit abort mkdir isatty sigaltstack pipe pthread_attr_getstack sysconf sched_yield __sancov_default_options __sanitizer_cov_dump __sanitizer_dump_coverage __sanitizer_get_module_and_offset_for_pc __sanitizer_cov_trace_pc_guard __sanitizer_cov_trace_pc_guard_init __sanitizer_dump_trace_pc_guard_coverage __sanitizer_cov_reset __sanitizer_cov_trace_cmp __sanitizer_cov_trace_cmp1 __sanitizer_cov_trace_cmp2 __sanitizer_cov_trace_cmp4 __sanitizer_cov_trace_cmp8 __sanitizer_cov_trace_const_cmp1 __sanitizer_cov_trace_const_cmp2 __sanitizer_cov_trace_const_cmp4 __sanitizer_cov_trace_const_cmp8 __sanitizer_cov_trace_switch __sanitizer_cov_trace_div4 __sanitizer_cov_trace_div8 __sanitizer_cov_trace_gep __sanitizer_cov_trace_pc_indir __sanitizer_cov_8bit_counters_init __sanitizer_cov_bool_flag_init __sanitizer_cov_pcs_init __sancov_lowest_stack __sanitizer_symbolize_pc __sanitizer_symbolize_global __cxa_demangle __sanitizer_symbolize_set_demangle __sanitizer_symbolize_set_inline_frames __sanitizer_symbolize_data __sanitizer_symbolize_code dlerror __sanitizer_symbolize_flush __sanitizer_symbolize_demangle dlopen __lsan_default_suppressions __lsan_is_turned_off __lsan_ignore_object __lsan_register_root_region __lsan_unregister_root_region __lsan_disable __lsan_enable __lsan_do_leak_check __lsan_do_recoverable_leak_check __lsan_default_options __libc_iterate_dynamic_tls snprintf __ubsan_default_options __ubsan_handle_type_mismatch_v1 __ubsan_handle_type_mismatch_v1_abort __ubsan_handle_alignment_assumption __ubsan_handle_alignment_assumption_abort __ubsan_handle_add_overflow __ubsan_handle_add_overflow_abort __ubsan_handle_sub_overflow __ubsan_handle_sub_overflow_abort __ubsan_handle_mul_overflow __ubsan_handle_mul_overflow_abort __ubsan_handle_negate_overflow __ubsan_handle_negate_overflow_abort __ubsan_handle_divrem_overflow __ubsan_handle_divrem_overflow_abort __ubsan_handle_shift_out_of_bounds __ubsan_handle_shift_out_of_bounds_abort __ubsan_handle_out_of_bounds __ubsan_handle_out_of_bounds_abort __ubsan_handle_builtin_unreachable __ubsan_handle_missing_return __ubsan_handle_vla_bound_not_positive __ubsan_handle_vla_bound_not_positive_abort __ubsan_handle_float_cast_overflow __ubsan_handle_float_cast_overflow_abort __ubsan_handle_load_invalid_value __ubsan_handle_load_invalid_value_abort __ubsan_handle_implicit_conversion __ubsan_handle_implicit_conversion_abort __ubsan_handle_invalid_builtin __ubsan_handle_invalid_builtin_abort __ubsan_handle_invalid_objc_cast __ubsan_handle_invalid_objc_cast_abort __ubsan_handle_nonnull_return_v1 __ubsan_handle_nonnull_return_v1_abort __ubsan_handle_nullability_return_v1 __ubsan_handle_nullability_return_v1_abort __ubsan_handle_nonnull_arg __ubsan_handle_nonnull_arg_abort __ubsan_handle_nullability_arg __ubsan_handle_nullability_arg_abort __ubsan_handle_pointer_overflow __ubsan_handle_pointer_overflow_abort __ubsan_handle_cfi_check_fail __ubsan_handle_cfi_bad_type __ubsan_handle_cfi_check_fail_abort __ubsan_on_report __ubsan_get_current_report_data __sanitizer_free_hook __asan_shadow_memory_dynamic_address __sanitizer_malloc_hook __sanitizer_get_estimated_allocated_size __sanitizer_get_ownership __sanitizer_get_allocated_size __sanitizer_purge_allocator __asan_update_allocation_context __asan_locate_address __asan_get_alloc_stack __asan_get_free_stack __asan_get_shadow_mapping __asan_stack_malloc_0 __asan_option_detect_stack_use_after_return __asan_stack_malloc_always_0 __asan_stack_free_0 __asan_stack_malloc_1 __asan_stack_malloc_always_1 __asan_stack_free_1 __asan_stack_malloc_2 __asan_stack_malloc_always_2 __asan_stack_free_2 __asan_stack_malloc_3 __asan_stack_malloc_always_3 __asan_stack_free_3 __asan_stack_malloc_4 __asan_stack_malloc_always_4 __asan_stack_free_4 __asan_stack_malloc_5 __asan_stack_malloc_always_5 __asan_stack_free_5 __asan_stack_malloc_6 __asan_stack_malloc_always_6 __asan_stack_free_6 __asan_stack_malloc_7 __asan_stack_malloc_always_7 __asan_stack_free_7 __asan_stack_malloc_8 __asan_stack_malloc_always_8 __asan_stack_free_8 __asan_stack_malloc_9 __asan_stack_malloc_always_9 __asan_stack_free_9 __asan_stack_malloc_10 __asan_stack_malloc_always_10 __asan_stack_free_10 __asan_get_current_fake_stack __asan_addr_is_in_fake_stack __asan_alloca_poison __asan_allocas_unpoison __asan_default_options __asan_register_image_globals __asan_register_globals __asan_region_is_poisoned __asan_unregister_image_globals __asan_unregister_globals __asan_register_elf_globals __asan_unregister_elf_globals __asan_before_dynamic_init __asan_after_dynamic_init __interceptor_strlen __interceptor_strnlen __interceptor_strndup __interceptor_malloc __sanitizer_weak_hook_strcmp __interceptor_strcmp __sanitizer_weak_hook_strncmp __interceptor_strncmp __sanitizer_weak_hook_strcasecmp __interceptor_strcasecmp __sanitizer_weak_hook_strncasecmp __interceptor_strncasecmp __sanitizer_weak_hook_strstr __interceptor_strstr __sanitizer_weak_hook_strcasestr __interceptor_strcasestr __interceptor_strtok __sanitizer_weak_hook_memmem __interceptor_memmem __interceptor_strchr __interceptor_strchrnul __interceptor_strrchr __interceptor_strspn __interceptor_strcspn __interceptor_strpbrk __interceptor_memset __interceptor_memmove __interceptor_memcpy __sanitizer_weak_hook_memcmp __interceptor_memcmp __interceptor_bcmp __interceptor_memchr __interceptor_memrchr __interceptor_frexp __interceptor_frexpf __interceptor_frexpl __interceptor_read __interceptor_fread __interceptor_pread __interceptor_readv __interceptor_write __interceptor_fwrite __interceptor_pwrite __interceptor_writev __interceptor_fgets __interceptor_fputs __interceptor_puts __interceptor_prctl __interceptor_time __interceptor_localtime __interceptor_localtime_r __interceptor_gmtime __interceptor_gmtime_r __interceptor_ctime __interceptor_ctime_r __interceptor_asctime __interceptor_asctime_r __interceptor_mktime __interceptor_strptime __interceptor_vscanf __interceptor_vsscanf __interceptor_vfscanf __interceptor_scanf __interceptor_fscanf __interceptor_sscanf __interceptor_vprintf __interceptor_vfprintf __interceptor_vsnprintf __interceptor_vsprintf __interceptor_vasprintf __interceptor_printf __interceptor_fprintf __interceptor_sprintf __interceptor_snprintf __interceptor_asprintf __interceptor_ioctl __interceptor_getpwnam __interceptor_getpwuid __interceptor_getgrnam __interceptor_getgrgid __interceptor_clock_getres __interceptor_clock_gettime __interceptor_clock_settime __interceptor_clock_getcpuclockid __interceptor_pthread_getcpuclockid __interceptor_getitimer __interceptor_setitimer __interceptor_posix_spawn __interceptor_posix_spawnp __interceptor_wait __interceptor_waitid __interceptor_waitpid __interceptor_wait3 __interceptor___wait4 __interceptor_inet_ntop __interceptor_inet_pton __interceptor_inet_aton __interceptor_pthread_getschedparam __interceptor_getaddrinfo __interceptor_getnameinfo __interceptor_getsockname __interceptor_gethostbyname __interceptor_gethostbyaddr __interceptor_gethostent __interceptor_gethostbyname2 __interceptor_gethostbyname_r __interceptor_getsockopt __interceptor_accept __interceptor_modf __interceptor_modff __interceptor_modfl __interceptor_recvmsg __interceptor_recvmmsg __interceptor_sendmsg __interceptor_sendmmsg __interceptor_getpeername __interceptor_sysinfo __interceptor_opendir __interceptor_readdir __interceptor_readdir_r __interceptor_setlocale __interceptor_getcwd __interceptor_strtoimax __interceptor_strtoumax __interceptor_mbstowcs __interceptor_mbsrtowcs __interceptor_wcstombs __interceptor_wcsrtombs __interceptor_realpath __interceptor_free __interceptor_strerror __interceptor_strerror_r __interceptor_getgroups __interceptor_poll __interceptor_sigwait __interceptor_sigpending __interceptor_sigprocmask __interceptor_pthread_sigmask __interceptor__exit __interceptor_pthread_mutex_lock __interceptor_pthread_mutex_unlock __interceptor_getmntent __interceptor_initgroups __interceptor_ether_ntoa __interceptor_ether_aton __interceptor_pthread_attr_getdetachstate __interceptor_pthread_attr_getguardsize __interceptor_pthread_attr_getscope __interceptor_pthread_attr_getstacksize __interceptor_pthread_attr_getstack __interceptor_pthread_attr_getschedparam __interceptor_pthread_attr_getschedpolicy __interceptor_pthread_mutexattr_getpshared __interceptor_pthread_mutexattr_gettype __interceptor_pthread_rwlockattr_getpshared __interceptor_pthread_condattr_getpshared __interceptor_tmpnam __interceptor_ptsname __interceptor_ptsname_r __interceptor_ttyname __interceptor_ttyname_r __interceptor_tempnam __interceptor_sincos __interceptor_sincosf __interceptor_sincosl __interceptor_remquo __interceptor_remquof __interceptor_remquol __interceptor_lgamma signgam __interceptor_lgammaf __interceptor_lgammal __interceptor_lgamma_r __interceptor_lgammaf_r __interceptor_times __interceptor_listxattr __interceptor_llistxattr __interceptor_flistxattr __interceptor_getxattr __interceptor_lgetxattr __interceptor_fgetxattr __interceptor_getresuid __interceptor_getresgid __interceptor_ftime __interceptor_fopen __interceptor_fdopen __interceptor_freopen __interceptor_fflush __interceptor_fclose __interceptor_mlock __interceptor_munlock __interceptor_mlockall __interceptor_munlockall __interceptor_sem_init __interceptor_sem_destroy __interceptor_sem_wait __interceptor_sem_trywait __interceptor_sem_timedwait __interceptor_sem_post __interceptor_sem_getvalue __interceptor_sem_open __interceptor_sem_unlink __interceptor_pthread_setcancelstate __interceptor_pthread_setcanceltype __interceptor_mincore __interceptor_process_vm_readv __interceptor_process_vm_writev __interceptor_ctermid __interceptor_recv __interceptor_recvfrom __interceptor_send __interceptor_sendto __interceptor_eventfd_read __interceptor_eventfd_write __interceptor_stat __interceptor_getutent __interceptor_getutid __interceptor_getutline __interceptor_wcslen __interceptor_wcsnlen __interceptor_wcscat __interceptor_wcsncat __interceptor_wcsdup __interceptor_strxfrm __interceptor_strxfrm_l __interceptor___strxfrm_l __interceptor_wcsxfrm __interceptor_wcsxfrm_l __interceptor___wcsxfrm_l __interceptor_getgrouplist __interceptor_readlink __interceptor_readlinkat __interceptor_strlcpy __interceptor_strlcat __interceptor_mmap __interceptor_mprotect __interceptor_getprotoent __interceptor_getprotobyname __interceptor_getprotobynumber __interceptor_getnetent __interceptor_getnetbyname __interceptor_getnetbyaddr __interceptor_setvbuf __interceptor_setbuf __interceptor_setbuffer __interceptor_setlinebuf __interceptor_regcomp __interceptor_regexec __interceptor_regerror __interceptor_regfree __interceptor_popen __interceptor_pclose __interceptor_sigaltstack __interceptor_uname __interceptor_bsd_signal __interceptor_signal __interceptor_sigaction __sanitizer_syscall_pre_impl_recvmsg __sanitizer_syscall_post_impl_recvmsg __sanitizer_syscall_pre_impl_recvmmsg __sanitizer_syscall_post_impl_recvmmsg __sanitizer_syscall_pre_impl_read __sanitizer_syscall_post_impl_read __sanitizer_syscall_pre_impl_time __sanitizer_syscall_post_impl_time __sanitizer_syscall_pre_impl_stime __sanitizer_syscall_post_impl_stime __sanitizer_syscall_pre_impl_gettimeofday __sanitizer_syscall_post_impl_gettimeofday __sanitizer_syscall_pre_impl_settimeofday __sanitizer_syscall_post_impl_settimeofday __sanitizer_syscall_pre_impl_times __sanitizer_syscall_post_impl_times __sanitizer_syscall_pre_impl_gettid __sanitizer_syscall_post_impl_gettid __sanitizer_syscall_pre_impl_nanosleep __sanitizer_syscall_post_impl_nanosleep __sanitizer_syscall_pre_impl_alarm __sanitizer_syscall_post_impl_alarm __sanitizer_syscall_pre_impl_getpid __sanitizer_syscall_post_impl_getpid __sanitizer_syscall_pre_impl_getppid __sanitizer_syscall_post_impl_getppid __sanitizer_syscall_pre_impl_getuid __sanitizer_syscall_post_impl_getuid __sanitizer_syscall_pre_impl_geteuid __sanitizer_syscall_post_impl_geteuid __sanitizer_syscall_pre_impl_getgid __sanitizer_syscall_post_impl_getgid __sanitizer_syscall_pre_impl_getegid __sanitizer_syscall_post_impl_getegid __sanitizer_syscall_pre_impl_getresuid __sanitizer_syscall_post_impl_getresuid __sanitizer_syscall_pre_impl_getresgid __sanitizer_syscall_post_impl_getresgid __sanitizer_syscall_pre_impl_getpgid __sanitizer_syscall_post_impl_getpgid __sanitizer_syscall_pre_impl_getpgrp __sanitizer_syscall_post_impl_getpgrp __sanitizer_syscall_pre_impl_getsid __sanitizer_syscall_post_impl_getsid __sanitizer_syscall_pre_impl_getgroups __sanitizer_syscall_post_impl_getgroups __sanitizer_syscall_pre_impl_setregid __sanitizer_syscall_post_impl_setregid __sanitizer_syscall_pre_impl_setgid __sanitizer_syscall_post_impl_setgid __sanitizer_syscall_pre_impl_setreuid __sanitizer_syscall_post_impl_setreuid __sanitizer_syscall_pre_impl_setuid __sanitizer_syscall_post_impl_setuid __sanitizer_syscall_pre_impl_setresuid __sanitizer_syscall_post_impl_setresuid __sanitizer_syscall_pre_impl_setresgid __sanitizer_syscall_post_impl_setresgid __sanitizer_syscall_pre_impl_setfsuid __sanitizer_syscall_post_impl_setfsuid __sanitizer_syscall_pre_impl_setfsgid __sanitizer_syscall_post_impl_setfsgid __sanitizer_syscall_pre_impl_setpgid __sanitizer_syscall_post_impl_setpgid __sanitizer_syscall_pre_impl_setsid __sanitizer_syscall_post_impl_setsid __sanitizer_syscall_pre_impl_setgroups __sanitizer_syscall_post_impl_setgroups __sanitizer_syscall_pre_impl_acct __sanitizer_syscall_post_impl_acct __sanitizer_syscall_pre_impl_capget __sanitizer_syscall_post_impl_capget __sanitizer_syscall_pre_impl_capset __sanitizer_syscall_post_impl_capset __sanitizer_syscall_pre_impl_personality __sanitizer_syscall_post_impl_personality __sanitizer_syscall_pre_impl_sigpending __sanitizer_syscall_post_impl_sigpending __sanitizer_syscall_pre_impl_sigprocmask __sanitizer_syscall_post_impl_sigprocmask __sanitizer_syscall_pre_impl_getitimer __sanitizer_syscall_post_impl_getitimer __sanitizer_syscall_pre_impl_setitimer __sanitizer_syscall_post_impl_setitimer __sanitizer_syscall_pre_impl_timer_create __sanitizer_syscall_post_impl_timer_create __sanitizer_syscall_pre_impl_timer_gettime __sanitizer_syscall_post_impl_timer_gettime __sanitizer_syscall_pre_impl_timer_getoverrun __sanitizer_syscall_post_impl_timer_getoverrun __sanitizer_syscall_pre_impl_timer_settime __sanitizer_syscall_post_impl_timer_settime __sanitizer_syscall_pre_impl_timer_delete __sanitizer_syscall_post_impl_timer_delete __sanitizer_syscall_pre_impl_clock_settime __sanitizer_syscall_post_impl_clock_settime __sanitizer_syscall_pre_impl_clock_gettime __sanitizer_syscall_post_impl_clock_gettime __sanitizer_syscall_pre_impl_clock_getres __sanitizer_syscall_post_impl_clock_getres __sanitizer_syscall_pre_impl_clock_nanosleep __sanitizer_syscall_post_impl_clock_nanosleep __sanitizer_syscall_pre_impl_nice __sanitizer_syscall_post_impl_nice __sanitizer_syscall_pre_impl_sched_setscheduler __sanitizer_syscall_post_impl_sched_setscheduler __sanitizer_syscall_pre_impl_sched_setparam __sanitizer_syscall_post_impl_sched_setparam __sanitizer_syscall_pre_impl_sched_getscheduler __sanitizer_syscall_post_impl_sched_getscheduler __sanitizer_syscall_pre_impl_sched_getparam __sanitizer_syscall_post_impl_sched_getparam __sanitizer_syscall_pre_impl_sched_setaffinity __sanitizer_syscall_post_impl_sched_setaffinity __sanitizer_syscall_pre_impl_sched_getaffinity __sanitizer_syscall_post_impl_sched_getaffinity __sanitizer_syscall_pre_impl_sched_yield __sanitizer_syscall_post_impl_sched_yield __sanitizer_syscall_pre_impl_sched_get_priority_max __sanitizer_syscall_post_impl_sched_get_priority_max __sanitizer_syscall_pre_impl_sched_get_priority_min __sanitizer_syscall_post_impl_sched_get_priority_min __sanitizer_syscall_pre_impl_sched_rr_get_interval __sanitizer_syscall_post_impl_sched_rr_get_interval __sanitizer_syscall_pre_impl_setpriority __sanitizer_syscall_post_impl_setpriority __sanitizer_syscall_pre_impl_getpriority __sanitizer_syscall_post_impl_getpriority __sanitizer_syscall_pre_impl_shutdown __sanitizer_syscall_post_impl_shutdown __sanitizer_syscall_pre_impl_reboot __sanitizer_syscall_post_impl_reboot __sanitizer_syscall_pre_impl_restart_syscall __sanitizer_syscall_post_impl_restart_syscall __sanitizer_syscall_pre_impl_kexec_load __sanitizer_syscall_post_impl_kexec_load __sanitizer_syscall_pre_impl_exit __sanitizer_syscall_post_impl_exit __sanitizer_syscall_pre_impl_exit_group __sanitizer_syscall_post_impl_exit_group __sanitizer_syscall_pre_impl_wait4 __sanitizer_syscall_post_impl_wait4 __sanitizer_syscall_pre_impl_waitid __sanitizer_syscall_post_impl_waitid __sanitizer_syscall_pre_impl_waitpid __sanitizer_syscall_post_impl_waitpid __sanitizer_syscall_pre_impl_set_tid_address __sanitizer_syscall_post_impl_set_tid_address __sanitizer_syscall_pre_impl_init_module __sanitizer_syscall_post_impl_init_module __sanitizer_syscall_pre_impl_delete_module __sanitizer_syscall_post_impl_delete_module __sanitizer_syscall_pre_impl_rt_sigprocmask __sanitizer_syscall_post_impl_rt_sigprocmask __sanitizer_syscall_pre_impl_rt_sigpending __sanitizer_syscall_post_impl_rt_sigpending __sanitizer_syscall_pre_impl_rt_sigtimedwait __sanitizer_syscall_post_impl_rt_sigtimedwait __sanitizer_syscall_pre_impl_rt_tgsigqueueinfo __sanitizer_syscall_post_impl_rt_tgsigqueueinfo __sanitizer_syscall_pre_impl_kill __sanitizer_syscall_post_impl_kill __sanitizer_syscall_pre_impl_tgkill __sanitizer_syscall_post_impl_tgkill __sanitizer_syscall_pre_impl_tkill __sanitizer_syscall_post_impl_tkill __sanitizer_syscall_pre_impl_rt_sigqueueinfo __sanitizer_syscall_post_impl_rt_sigqueueinfo __sanitizer_syscall_pre_impl_sgetmask __sanitizer_syscall_post_impl_sgetmask __sanitizer_syscall_pre_impl_ssetmask __sanitizer_syscall_post_impl_ssetmask __sanitizer_syscall_pre_impl_signal __sanitizer_syscall_post_impl_signal __sanitizer_syscall_pre_impl_pause __sanitizer_syscall_post_impl_pause __sanitizer_syscall_pre_impl_sync __sanitizer_syscall_post_impl_sync __sanitizer_syscall_pre_impl_fsync __sanitizer_syscall_post_impl_fsync __sanitizer_syscall_pre_impl_fdatasync __sanitizer_syscall_post_impl_fdatasync __sanitizer_syscall_pre_impl_bdflush __sanitizer_syscall_post_impl_bdflush __sanitizer_syscall_pre_impl_mount __sanitizer_syscall_post_impl_mount __sanitizer_syscall_pre_impl_umount __sanitizer_syscall_post_impl_umount __sanitizer_syscall_pre_impl_oldumount __sanitizer_syscall_post_impl_oldumount __sanitizer_syscall_pre_impl_truncate __sanitizer_syscall_post_impl_truncate __sanitizer_syscall_pre_impl_ftruncate __sanitizer_syscall_post_impl_ftruncate __sanitizer_syscall_pre_impl_stat __sanitizer_syscall_post_impl_stat __sanitizer_syscall_pre_impl_lstat __sanitizer_syscall_post_impl_lstat __sanitizer_syscall_pre_impl_fstat __sanitizer_syscall_post_impl_fstat __sanitizer_syscall_pre_impl_newstat __sanitizer_syscall_post_impl_newstat __sanitizer_syscall_pre_impl_newlstat __sanitizer_syscall_post_impl_newlstat __sanitizer_syscall_pre_impl_newfstat __sanitizer_syscall_post_impl_newfstat __sanitizer_syscall_pre_impl_stat64 __sanitizer_syscall_post_impl_stat64 __sanitizer_syscall_pre_impl_fstat64 __sanitizer_syscall_post_impl_fstat64 __sanitizer_syscall_pre_impl_lstat64 __sanitizer_syscall_post_impl_lstat64 __sanitizer_syscall_pre_impl_setxattr __sanitizer_syscall_post_impl_setxattr __sanitizer_syscall_pre_impl_lsetxattr __sanitizer_syscall_post_impl_lsetxattr __sanitizer_syscall_pre_impl_fsetxattr __sanitizer_syscall_post_impl_fsetxattr __sanitizer_syscall_pre_impl_getxattr __sanitizer_syscall_post_impl_getxattr __sanitizer_syscall_pre_impl_lgetxattr __sanitizer_syscall_post_impl_lgetxattr __sanitizer_syscall_pre_impl_fgetxattr __sanitizer_syscall_post_impl_fgetxattr __sanitizer_syscall_pre_impl_listxattr __sanitizer_syscall_post_impl_listxattr __sanitizer_syscall_pre_impl_llistxattr __sanitizer_syscall_post_impl_llistxattr __sanitizer_syscall_pre_impl_flistxattr __sanitizer_syscall_post_impl_flistxattr __sanitizer_syscall_pre_impl_removexattr __sanitizer_syscall_post_impl_removexattr __sanitizer_syscall_pre_impl_lremovexattr __sanitizer_syscall_post_impl_lremovexattr __sanitizer_syscall_pre_impl_fremovexattr __sanitizer_syscall_post_impl_fremovexattr __sanitizer_syscall_pre_impl_brk __sanitizer_syscall_post_impl_brk __sanitizer_syscall_pre_impl_mprotect __sanitizer_syscall_post_impl_mprotect __sanitizer_syscall_pre_impl_mremap __sanitizer_syscall_post_impl_mremap __sanitizer_syscall_pre_impl_remap_file_pages __sanitizer_syscall_post_impl_remap_file_pages __sanitizer_syscall_pre_impl_msync __sanitizer_syscall_post_impl_msync __sanitizer_syscall_pre_impl_munmap __sanitizer_syscall_post_impl_munmap __sanitizer_syscall_pre_impl_mlock __sanitizer_syscall_post_impl_mlock __sanitizer_syscall_pre_impl_munlock __sanitizer_syscall_post_impl_munlock __sanitizer_syscall_pre_impl_mlockall __sanitizer_syscall_post_impl_mlockall __sanitizer_syscall_pre_impl_munlockall __sanitizer_syscall_post_impl_munlockall __sanitizer_syscall_pre_impl_madvise __sanitizer_syscall_post_impl_madvise __sanitizer_syscall_pre_impl_mincore __sanitizer_syscall_post_impl_mincore __sanitizer_syscall_pre_impl_pivot_root __sanitizer_syscall_post_impl_pivot_root __sanitizer_syscall_pre_impl_chroot __sanitizer_syscall_post_impl_chroot __sanitizer_syscall_pre_impl_mknod __sanitizer_syscall_post_impl_mknod __sanitizer_syscall_pre_impl_link __sanitizer_syscall_post_impl_link __sanitizer_syscall_pre_impl_symlink __sanitizer_syscall_post_impl_symlink __sanitizer_syscall_pre_impl_unlink __sanitizer_syscall_post_impl_unlink __sanitizer_syscall_pre_impl_rename __sanitizer_syscall_post_impl_rename __sanitizer_syscall_pre_impl_chmod __sanitizer_syscall_post_impl_chmod __sanitizer_syscall_pre_impl_fchmod __sanitizer_syscall_post_impl_fchmod __sanitizer_syscall_pre_impl_fcntl __sanitizer_syscall_post_impl_fcntl __sanitizer_syscall_pre_impl_fcntl64 __sanitizer_syscall_post_impl_fcntl64 __sanitizer_syscall_pre_impl_pipe __sanitizer_syscall_post_impl_pipe __sanitizer_syscall_pre_impl_pipe2 __sanitizer_syscall_post_impl_pipe2 __sanitizer_syscall_pre_impl_dup __sanitizer_syscall_post_impl_dup __sanitizer_syscall_pre_impl_dup2 __sanitizer_syscall_post_impl_dup2 __sanitizer_syscall_pre_impl_dup3 __sanitizer_syscall_post_impl_dup3 __sanitizer_syscall_pre_impl_ioperm __sanitizer_syscall_post_impl_ioperm __sanitizer_syscall_pre_impl_ioctl __sanitizer_syscall_post_impl_ioctl __sanitizer_syscall_pre_impl_flock __sanitizer_syscall_post_impl_flock __sanitizer_syscall_pre_impl_io_setup __sanitizer_syscall_post_impl_io_setup __sanitizer_syscall_pre_impl_io_destroy __sanitizer_syscall_post_impl_io_destroy __sanitizer_syscall_pre_impl_io_getevents __sanitizer_syscall_post_impl_io_getevents __sanitizer_syscall_pre_impl_io_submit __sanitizer_syscall_post_impl_io_submit __sanitizer_syscall_pre_impl_io_cancel __sanitizer_syscall_post_impl_io_cancel __sanitizer_syscall_pre_impl_sendfile __sanitizer_syscall_post_impl_sendfile __sanitizer_syscall_pre_impl_sendfile64 __sanitizer_syscall_post_impl_sendfile64 __sanitizer_syscall_pre_impl_readlink __sanitizer_syscall_post_impl_readlink __sanitizer_syscall_pre_impl_creat __sanitizer_syscall_post_impl_creat __sanitizer_syscall_pre_impl_open __sanitizer_syscall_post_impl_open __sanitizer_syscall_pre_impl_close __sanitizer_syscall_post_impl_close __sanitizer_syscall_pre_impl_access __sanitizer_syscall_post_impl_access __sanitizer_syscall_pre_impl_vhangup __sanitizer_syscall_post_impl_vhangup __sanitizer_syscall_pre_impl_chown __sanitizer_syscall_post_impl_chown __sanitizer_syscall_pre_impl_lchown __sanitizer_syscall_post_impl_lchown __sanitizer_syscall_pre_impl_fchown __sanitizer_syscall_post_impl_fchown __sanitizer_syscall_pre_impl_utime __sanitizer_syscall_post_impl_utime __sanitizer_syscall_pre_impl_utimes __sanitizer_syscall_post_impl_utimes __sanitizer_syscall_pre_impl_lseek __sanitizer_syscall_post_impl_lseek __sanitizer_syscall_pre_impl_llseek __sanitizer_syscall_post_impl_llseek __sanitizer_syscall_pre_impl_readv __sanitizer_syscall_post_impl_readv __sanitizer_syscall_pre_impl_write __sanitizer_syscall_post_impl_write __sanitizer_syscall_pre_impl_writev __sanitizer_syscall_post_impl_writev __sanitizer_syscall_pre_impl_pread64 __sanitizer_syscall_post_impl_pread64 __sanitizer_syscall_pre_impl_pwrite64 __sanitizer_syscall_post_impl_pwrite64 __sanitizer_syscall_pre_impl_preadv __sanitizer_syscall_post_impl_preadv __sanitizer_syscall_pre_impl_pwritev __sanitizer_syscall_post_impl_pwritev __sanitizer_syscall_pre_impl_getcwd __sanitizer_syscall_post_impl_getcwd __sanitizer_syscall_pre_impl_mkdir __sanitizer_syscall_post_impl_mkdir __sanitizer_syscall_pre_impl_chdir __sanitizer_syscall_post_impl_chdir __sanitizer_syscall_pre_impl_fchdir __sanitizer_syscall_post_impl_fchdir __sanitizer_syscall_pre_impl_rmdir __sanitizer_syscall_post_impl_rmdir __sanitizer_syscall_pre_impl_lookup_dcookie __sanitizer_syscall_post_impl_lookup_dcookie __sanitizer_syscall_pre_impl_quotactl __sanitizer_syscall_post_impl_quotactl __sanitizer_syscall_pre_impl_getdents __sanitizer_syscall_post_impl_getdents __sanitizer_syscall_pre_impl_getdents64 __sanitizer_syscall_post_impl_getdents64 __sanitizer_syscall_pre_impl_setsockopt __sanitizer_syscall_post_impl_setsockopt __sanitizer_syscall_pre_impl_getsockopt __sanitizer_syscall_post_impl_getsockopt __sanitizer_syscall_pre_impl_bind __sanitizer_syscall_post_impl_bind __sanitizer_syscall_pre_impl_connect __sanitizer_syscall_post_impl_connect __sanitizer_syscall_pre_impl_accept __sanitizer_syscall_post_impl_accept __sanitizer_syscall_pre_impl_accept4 __sanitizer_syscall_post_impl_accept4 __sanitizer_syscall_pre_impl_getsockname __sanitizer_syscall_post_impl_getsockname __sanitizer_syscall_pre_impl_getpeername __sanitizer_syscall_post_impl_getpeername __sanitizer_syscall_pre_impl_send __sanitizer_syscall_post_impl_send __sanitizer_syscall_pre_impl_sendto __sanitizer_syscall_post_impl_sendto __sanitizer_syscall_pre_impl_sendmsg __sanitizer_syscall_post_impl_sendmsg __sanitizer_syscall_pre_impl_sendmmsg __sanitizer_syscall_post_impl_sendmmsg __sanitizer_syscall_pre_impl_recv __sanitizer_syscall_post_impl_recv __sanitizer_syscall_pre_impl_recvfrom __sanitizer_syscall_post_impl_recvfrom __sanitizer_syscall_pre_impl_socket __sanitizer_syscall_post_impl_socket __sanitizer_syscall_pre_impl_socketpair __sanitizer_syscall_post_impl_socketpair __sanitizer_syscall_pre_impl_socketcall __sanitizer_syscall_post_impl_socketcall __sanitizer_syscall_pre_impl_listen __sanitizer_syscall_post_impl_listen __sanitizer_syscall_pre_impl_poll __sanitizer_syscall_post_impl_poll __sanitizer_syscall_pre_impl_select __sanitizer_syscall_post_impl_select __sanitizer_syscall_pre_impl_old_select __sanitizer_syscall_post_impl_old_select __sanitizer_syscall_pre_impl_epoll_create __sanitizer_syscall_post_impl_epoll_create __sanitizer_syscall_pre_impl_epoll_create1 __sanitizer_syscall_post_impl_epoll_create1 __sanitizer_syscall_pre_impl_epoll_ctl __sanitizer_syscall_post_impl_epoll_ctl __sanitizer_syscall_pre_impl_epoll_wait __sanitizer_syscall_post_impl_epoll_wait __sanitizer_syscall_pre_impl_epoll_pwait __sanitizer_syscall_post_impl_epoll_pwait __sanitizer_syscall_pre_impl_epoll_pwait2 __sanitizer_syscall_post_impl_epoll_pwait2 __sanitizer_syscall_pre_impl_gethostname __sanitizer_syscall_post_impl_gethostname __sanitizer_syscall_pre_impl_sethostname __sanitizer_syscall_post_impl_sethostname __sanitizer_syscall_pre_impl_setdomainname __sanitizer_syscall_post_impl_setdomainname __sanitizer_syscall_pre_impl_newuname __sanitizer_syscall_post_impl_newuname __sanitizer_syscall_pre_impl_uname __sanitizer_syscall_post_impl_uname __sanitizer_syscall_pre_impl_olduname __sanitizer_syscall_post_impl_olduname __sanitizer_syscall_pre_impl_getrlimit __sanitizer_syscall_post_impl_getrlimit __sanitizer_syscall_pre_impl_old_getrlimit __sanitizer_syscall_post_impl_old_getrlimit __sanitizer_syscall_pre_impl_setrlimit __sanitizer_syscall_post_impl_setrlimit __sanitizer_syscall_pre_impl_getrusage __sanitizer_syscall_post_impl_getrusage __sanitizer_syscall_pre_impl_umask __sanitizer_syscall_post_impl_umask __sanitizer_syscall_pre_impl_msgget __sanitizer_syscall_post_impl_msgget __sanitizer_syscall_pre_impl_msgsnd __sanitizer_syscall_post_impl_msgsnd __sanitizer_syscall_pre_impl_msgrcv __sanitizer_syscall_post_impl_msgrcv __sanitizer_syscall_pre_impl_semget __sanitizer_syscall_post_impl_semget __sanitizer_syscall_pre_impl_semop __sanitizer_syscall_post_impl_semop __sanitizer_syscall_pre_impl_semctl __sanitizer_syscall_post_impl_semctl __sanitizer_syscall_pre_impl_semtimedop __sanitizer_syscall_post_impl_semtimedop __sanitizer_syscall_pre_impl_shmat __sanitizer_syscall_post_impl_shmat __sanitizer_syscall_pre_impl_shmget __sanitizer_syscall_post_impl_shmget __sanitizer_syscall_pre_impl_shmdt __sanitizer_syscall_post_impl_shmdt __sanitizer_syscall_pre_impl_ipc __sanitizer_syscall_post_impl_ipc __sanitizer_syscall_pre_impl_pciconfig_iobase __sanitizer_syscall_post_impl_pciconfig_iobase __sanitizer_syscall_pre_impl_pciconfig_read __sanitizer_syscall_post_impl_pciconfig_read __sanitizer_syscall_pre_impl_pciconfig_write __sanitizer_syscall_post_impl_pciconfig_write __sanitizer_syscall_pre_impl_swapon __sanitizer_syscall_post_impl_swapon __sanitizer_syscall_pre_impl_swapoff __sanitizer_syscall_post_impl_swapoff __sanitizer_syscall_pre_impl_sysctl __sanitizer_syscall_post_impl_sysctl __sanitizer_syscall_pre_impl_sysinfo __sanitizer_syscall_post_impl_sysinfo __sanitizer_syscall_pre_impl_sysfs __sanitizer_syscall_post_impl_sysfs __sanitizer_syscall_pre_impl_syslog __sanitizer_syscall_post_impl_syslog __sanitizer_syscall_pre_impl_uselib __sanitizer_syscall_post_impl_uselib __sanitizer_syscall_pre_impl_ni_syscall __sanitizer_syscall_post_impl_ni_syscall __sanitizer_syscall_pre_impl_ptrace __sanitizer_syscall_post_impl_ptrace __sanitizer_syscall_pre_impl_add_key __sanitizer_syscall_post_impl_add_key __sanitizer_syscall_pre_impl_request_key __sanitizer_syscall_post_impl_request_key __sanitizer_syscall_pre_impl_keyctl __sanitizer_syscall_post_impl_keyctl __sanitizer_syscall_pre_impl_ioprio_set __sanitizer_syscall_post_impl_ioprio_set __sanitizer_syscall_pre_impl_ioprio_get __sanitizer_syscall_post_impl_ioprio_get __sanitizer_syscall_pre_impl_set_mempolicy __sanitizer_syscall_post_impl_set_mempolicy __sanitizer_syscall_pre_impl_migrate_pages __sanitizer_syscall_post_impl_migrate_pages __sanitizer_syscall_pre_impl_move_pages __sanitizer_syscall_post_impl_move_pages __sanitizer_syscall_pre_impl_mbind __sanitizer_syscall_post_impl_mbind __sanitizer_syscall_pre_impl_get_mempolicy __sanitizer_syscall_post_impl_get_mempolicy __sanitizer_syscall_pre_impl_inotify_init __sanitizer_syscall_post_impl_inotify_init __sanitizer_syscall_pre_impl_inotify_init1 __sanitizer_syscall_post_impl_inotify_init1 __sanitizer_syscall_pre_impl_inotify_add_watch __sanitizer_syscall_post_impl_inotify_add_watch __sanitizer_syscall_pre_impl_inotify_rm_watch __sanitizer_syscall_post_impl_inotify_rm_watch __sanitizer_syscall_pre_impl_spu_run __sanitizer_syscall_post_impl_spu_run __sanitizer_syscall_pre_impl_spu_create __sanitizer_syscall_post_impl_spu_create __sanitizer_syscall_pre_impl_mknodat __sanitizer_syscall_post_impl_mknodat __sanitizer_syscall_pre_impl_mkdirat __sanitizer_syscall_post_impl_mkdirat __sanitizer_syscall_pre_impl_unlinkat __sanitizer_syscall_post_impl_unlinkat __sanitizer_syscall_pre_impl_symlinkat __sanitizer_syscall_post_impl_symlinkat __sanitizer_syscall_pre_impl_linkat __sanitizer_syscall_post_impl_linkat __sanitizer_syscall_pre_impl_renameat __sanitizer_syscall_post_impl_renameat __sanitizer_syscall_pre_impl_futimesat __sanitizer_syscall_post_impl_futimesat __sanitizer_syscall_pre_impl_faccessat __sanitizer_syscall_post_impl_faccessat __sanitizer_syscall_pre_impl_fchmodat __sanitizer_syscall_post_impl_fchmodat __sanitizer_syscall_pre_impl_fchownat __sanitizer_syscall_post_impl_fchownat __sanitizer_syscall_pre_impl_openat __sanitizer_syscall_post_impl_openat __sanitizer_syscall_pre_impl_newfstatat __sanitizer_syscall_post_impl_newfstatat __sanitizer_syscall_pre_impl_fstatat64 __sanitizer_syscall_post_impl_fstatat64 __sanitizer_syscall_pre_impl_readlinkat __sanitizer_syscall_post_impl_readlinkat __sanitizer_syscall_pre_impl_utimensat __sanitizer_syscall_post_impl_utimensat __sanitizer_syscall_pre_impl_unshare __sanitizer_syscall_post_impl_unshare __sanitizer_syscall_pre_impl_splice __sanitizer_syscall_post_impl_splice __sanitizer_syscall_pre_impl_vmsplice __sanitizer_syscall_post_impl_vmsplice __sanitizer_syscall_pre_impl_tee __sanitizer_syscall_post_impl_tee __sanitizer_syscall_pre_impl_get_robust_list __sanitizer_syscall_post_impl_get_robust_list __sanitizer_syscall_pre_impl_set_robust_list __sanitizer_syscall_post_impl_set_robust_list __sanitizer_syscall_pre_impl_getcpu __sanitizer_syscall_post_impl_getcpu __sanitizer_syscall_pre_impl_signalfd __sanitizer_syscall_post_impl_signalfd __sanitizer_syscall_pre_impl_signalfd4 __sanitizer_syscall_post_impl_signalfd4 __sanitizer_syscall_pre_impl_timerfd_create __sanitizer_syscall_post_impl_timerfd_create __sanitizer_syscall_pre_impl_timerfd_settime __sanitizer_syscall_post_impl_timerfd_settime __sanitizer_syscall_pre_impl_timerfd_gettime __sanitizer_syscall_post_impl_timerfd_gettime __sanitizer_syscall_pre_impl_eventfd __sanitizer_syscall_post_impl_eventfd __sanitizer_syscall_pre_impl_eventfd2 __sanitizer_syscall_post_impl_eventfd2 __sanitizer_syscall_pre_impl_old_readdir __sanitizer_syscall_post_impl_old_readdir __sanitizer_syscall_pre_impl_pselect6 __sanitizer_syscall_post_impl_pselect6 __sanitizer_syscall_pre_impl_ppoll __sanitizer_syscall_post_impl_ppoll __sanitizer_syscall_pre_impl_syncfs __sanitizer_syscall_post_impl_syncfs __sanitizer_syscall_pre_impl_perf_event_open __sanitizer_syscall_post_impl_perf_event_open __sanitizer_syscall_pre_impl_mmap_pgoff __sanitizer_syscall_post_impl_mmap_pgoff __sanitizer_syscall_pre_impl_old_mmap __sanitizer_syscall_post_impl_old_mmap __sanitizer_syscall_pre_impl_name_to_handle_at __sanitizer_syscall_post_impl_name_to_handle_at __sanitizer_syscall_pre_impl_open_by_handle_at __sanitizer_syscall_post_impl_open_by_handle_at __sanitizer_syscall_pre_impl_setns __sanitizer_syscall_post_impl_setns __sanitizer_syscall_pre_impl_process_vm_readv __sanitizer_syscall_post_impl_process_vm_readv __sanitizer_syscall_pre_impl_process_vm_writev __sanitizer_syscall_post_impl_process_vm_writev __sanitizer_syscall_pre_impl_fork __sanitizer_syscall_post_impl_fork __sanitizer_syscall_pre_impl_vfork __sanitizer_syscall_post_impl_vfork __sanitizer_syscall_pre_impl_sigaction __sanitizer_syscall_post_impl_sigaction __sanitizer_syscall_pre_impl_rt_sigaction __sanitizer_syscall_post_impl_rt_sigaction __sanitizer_syscall_pre_impl_getrandom __sanitizer_syscall_post_impl_getrandom __sanitizer_syscall_pre_impl_sigaltstack __sanitizer_syscall_post_impl_sigaltstack __interceptor_pthread_create __interceptor_pthread_join __interceptor_longjmp __asan_handle_no_return __interceptor__longjmp __interceptor_siglongjmp __interceptor___cxa_throw __interceptor___cxa_rethrow_primary_exception __interceptor__Unwind_RaiseException __interceptor_strcat __interceptor_strncat __interceptor_strcpy __interceptor_strdup __interceptor_strncpy __interceptor_strtol __interceptor_atoi __interceptor_atol __interceptor_strtoll __interceptor_atoll __interceptor___cxa_atexit bsd_signal signal strcat strcpy strncat strncpy strdup index atoi atol strtol atoll strtoll longjmp _longjmp siglongjmp __cxa_throw __cxa_rethrow_primary_exception pthread_create pthread_join __interceptor_vfork vfork mmap mprotect strlen strnlen strndup strcmp strncmp strcasecmp strncasecmp strstr strcasestr strchr strchrnul strrchr strspn strcspn strtok strpbrk strxfrm strxfrm_l __strxfrm_l memset memmove memcpy memchr memcmp bcmp memrchr memmem read fread pread readv write fwrite pwrite writev fgets fputs puts prctl localtime localtime_r gmtime gmtime_r ctime ctime_r asctime asctime_r mktime strptime scanf sscanf fscanf vscanf vsscanf vfscanf printf sprintf asprintf fprintf vprintf vsprintf vsnprintf vasprintf vfprintf frexp frexpf frexpl getpwnam getpwuid getgrnam getgrgid clock_getres clock_settime clock_getcpuclockid pthread_getcpuclockid getitimer setitimer time posix_spawn posix_spawnp wait waitid waitpid wait3 __wait4 inet_ntop inet_pton pthread_getschedparam getaddrinfo getnameinfo getsockname gethostent gethostbyaddr gethostbyname gethostbyname2 gethostbyname_r getsockopt accept modf modff modfl recvmsg sendmsg recvmmsg sendmmsg getpeername ioctl inet_aton sysinfo opendir readdir readdir_r setlocale getcwd strtoimax strtoumax mbstowcs mbsrtowcs wcstombs wcsrtombs realpath strerror strerror_r getgroups poll sigwait sigpending sigprocmask pthread_sigmask _exit pthread_mutex_lock pthread_mutex_unlock getmntent initgroups ether_ntoa ether_aton pthread_attr_getdetachstate pthread_attr_getguardsize pthread_attr_getscope pthread_attr_getstacksize pthread_attr_getschedparam pthread_attr_getschedpolicy pthread_mutexattr_getpshared pthread_mutexattr_gettype pthread_rwlockattr_getpshared pthread_condattr_getpshared tmpnam ptsname ptsname_r ttyname ttyname_r tempnam sincos sincosf sincosl remquo remquof remquol lgamma lgammaf lgammal lgamma_r lgammaf_r times listxattr llistxattr flistxattr getxattr lgetxattr fgetxattr getresuid getresgid ftime fopen fdopen freopen fflush fclose mlock munlock mlockall munlockall sem_init sem_destroy sem_wait sem_trywait sem_timedwait sem_post sem_getvalue sem_open sem_unlink pthread_setcancelstate pthread_setcanceltype mincore process_vm_readv process_vm_writev ctermid recv recvfrom send sendto stat eventfd_read eventfd_write getutent getutid getutline wcslen wcsnlen wcscat wcsncat wcsdup wcsxfrm wcsxfrm_l __wcsxfrm_l getgrouplist readlink readlinkat strlcpy strlcat getprotoent getprotobyname getprotobynumber getnetent getnetbyname getnetbyaddr setvbuf setbuf setbuffer setlinebuf regcomp regexec regerror regfree popen pclose uname __interceptor_index __asan_memcpy __asan_memset __asan_memmove __asan_rt_version __interceptor_calloc __interceptor_realloc __interceptor_reallocarray __interceptor_memalign __interceptor___libc_memalign __interceptor_aligned_alloc __interceptor_malloc_usable_size __interceptor_mallinfo __interceptor_mallopt __interceptor_posix_memalign __interceptor_valloc __interceptor_pvalloc __interceptor_malloc_stats __asan_print_accumulated_stats free malloc calloc realloc reallocarray memalign __libc_memalign aligned_alloc malloc_usable_size mallinfo mallopt posix_memalign valloc pvalloc malloc_stats __asan_poison_memory_region __asan_unpoison_memory_region __asan_address_is_poisoned __sanitizer_unaligned_load16 __asan_report_error __sanitizer_unaligned_load32 __sanitizer_unaligned_load64 __sanitizer_unaligned_store16 __sanitizer_unaligned_store32 __sanitizer_unaligned_store64 __asan_poison_cxx_array_cookie __asan_load_cxx_array_cookie __asan_set_shadow_00 __asan_set_shadow_f1 __asan_set_shadow_f2 __asan_set_shadow_f3 __asan_set_shadow_f5 __asan_set_shadow_f8 __asan_poison_stack_memory __asan_unpoison_stack_memory __sanitizer_annotate_contiguous_container __sanitizer_contiguous_container_find_bad_address __sanitizer_verify_contiguous_container __asan_poison_intra_object_redzone __asan_unpoison_intra_object_redzone pthread_key_create pthread_getspecific pthread_setspecific __asan_on_error __asan_test_only_reported_buggy_pointer __asan_set_error_report_callback __asan_describe_address __asan_report_present __asan_get_report_pc __asan_get_report_bp __asan_get_report_sp __asan_get_report_address __asan_get_report_access_type __asan_get_report_access_size __asan_get_report_description __sanitizer_ptr_sub __sanitizer_ptr_cmp __asan_report_load1 __asan_report_exp_load1 __asan_report_load1_noabort __asan_report_load2 __asan_report_exp_load2 __asan_report_load2_noabort __asan_report_load4 __asan_report_exp_load4 __asan_report_load4_noabort __asan_report_load8 __asan_report_exp_load8 __asan_report_load8_noabort __asan_report_load16 __asan_report_exp_load16 __asan_report_load16_noabort __asan_report_store1 __asan_report_exp_store1 __asan_report_store1_noabort __asan_report_store2 __asan_report_exp_store2 __asan_report_store2_noabort __asan_report_store4 __asan_report_exp_store4 __asan_report_store4_noabort __asan_report_store8 __asan_report_exp_store8 __asan_report_store8_noabort __asan_report_store16 __asan_report_exp_store16 __asan_report_store16_noabort __asan_report_load_n __asan_report_exp_load_n __asan_report_load_n_noabort __asan_report_store_n __asan_report_exp_store_n __asan_report_store_n_noabort __asan_load1 __asan_exp_load1 __asan_load1_noabort __asan_load2 __asan_exp_load2 __asan_load2_noabort __asan_load4 __asan_exp_load4 __asan_load4_noabort __asan_load8 __asan_exp_load8 __asan_load8_noabort __asan_load16 __asan_exp_load16 __asan_load16_noabort __asan_store1 __asan_exp_store1 __asan_store1_noabort __asan_store2 __asan_exp_store2 __asan_store2_noabort __asan_store4 __asan_exp_store4 __asan_store4_noabort __asan_store8 __asan_exp_store8 __asan_store8_noabort __asan_store16 __asan_exp_store16 __asan_store16_noabort __asan_loadN __asan_exp_loadN __asan_loadN_noabort __asan_storeN __asan_exp_storeN __asan_storeN_noabort __asan_handle_vfork __asan_set_death_callback __asan_init __asan_version_mismatch_check_v9 __sanitizer_print_stack_trace __sanitizer_get_current_allocated_bytes __sanitizer_get_heap_size __sanitizer_get_free_bytes __sanitizer_get_unmapped_bytes __asan_default_suppressions __sanitizer_start_switch_fiber __sanitizer_finish_switch_fiber _Znwj _Znaj _ZnwjRKSt9nothrow_t _ZnajRKSt9nothrow_t _ZnwjSt11align_val_t _ZnajSt11align_val_t _ZnwjSt11align_val_tRKSt9nothrow_t _ZnajSt11align_val_tRKSt9nothrow_t _ZdlPv _ZdaPv _ZdlPvRKSt9nothrow_t _ZdaPvRKSt9nothrow_t _ZdlPvj _ZdaPvj _ZdlPvSt11align_val_t _ZdaPvSt11align_val_t _ZdlPvSt11align_val_tRKSt9nothrow_t _ZdaPvSt11align_val_tRKSt9nothrow_t _ZdlPvjSt11align_val_t _ZdaPvjSt11align_val_t __ubsan_handle_dynamic_type_cache_miss __ubsan_handle_dynamic_type_cache_miss_abort __ubsan_handle_function_type_mismatch_v1 __ubsan_handle_function_type_mismatch_v1_abort __ubsan_vptr_type_cache _ZTIN10__cxxabiv117__class_type_infoE _ZTISt9type_info __dynamic_cast _ZTIN10__cxxabiv120__si_class_type_infoE _ZTIN10__cxxabiv121__vmi_class_type_infoE __sF pthread_rwlock_wrlock pthread_rwlock_unlock pthread_rwlock_rdlock libc.so LIBC libdl.so libm.so libc++.so liblog.so libclang_rt.asan-i686-android.so 
HINT: if you don't care about these errors you may set allocator_may_return_null=1 out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_list.h ((s)) >= ((z)) Command: stdout ((atomic_load(&state_, memory_order_relaxed))) == ((1)) log_path intercept_strspn intercept_strcmp dump_registers detect_write_exec %d buff_length > 0 out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_printf.cpp ((atomic_load(&state_, memory_order_relaxed) & kWriterLock)) != (0) shadow gap Failed suspending threads. Undo and keep block unpacked hexagon DATA log_threads HEAP <unknown> negation of %0 cannot be represented in type %1; cast to an unsigned type to negate this value to itself check failed in %0, destination function located in %1 %0 integer overflow: %1 %2 %3 cannot be represented in type %4 ((IsAligned((uptr)h, page_size_))) != (0) out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_allocator_local_cache.h low shadow %p is located %zd bytes to the left overflows ERROR: AddressSanitizer: %s (%s vs %s) on %p ASAN_SYMBOLIZER_PATH ((f->redzone)) >= ((16)) %s Global[%p]: beg=%p size=%zu/%zu name=%s module=%s dyn_init=%zu odr_indicator=%p Removed strndup fwrite getnameinfo strerror_r strxfrm getprotoent getnetent ((__interception::real__Unwind_RaiseException)) != (0) '-+ #0 ((*endptr >= nptr)) != (0) AddrHashMap SIOCGIFFLAGS CDROMSUBCHNL EVIOCGBIT EVIOCGSW SOUND_MIXER_WRITE_CD SOUND_MIXER_WRITE_LINE1 ((end - beg)) <= (((1UL << 30))) sigalt AddressSanitizer Init done vptr for %0 call to function %0 through pointer to incorrect function type %1 unknown pointer encoding ((allocated_end_ - allocated_current_ >= (sptr)size)) != (0) ((IsAligned(res, kRegionSize))) != (0) ERROR: Can't open file: (reason: %d) If available, use the fast frame-pointer-based unwinder on fatal errors. malloc_context_size Print inlined frames in stacktraces. Defaults to true. If set check that string arguments are properly null-terminated If set, uses custom wrappers for memset/memcpy/memmove intrinsics to find more errors. If set, decorate sanitizer mappings in /proc/self/maps with user-readable names ((IsPowerOfTwo(size))) != (0) %s: StackDepot: %zd ids; %zdM allocated Detached from thread %d. (%p) x86_64 out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_internal.h Using addr2line found at: %s use_tls suppressions Suppressions file name. HINT: For debugging, try setting environment variable LSAN_OPTIONS=verbosity=1:log_threads=1 TLS at %p-%p. float-divide-by-zero Print specific error type instead of 'undefined-behavior' in summary. shift exponent %0 is too large for %1-bit type %2 ((old)) == ((kAllocBegMagic)) ((IsPowerOfTwo(x))) != (0) ((alloc_beg + sizeof(LargeChunkHeader))) <= ((chunk_beg)) redzone alloc_dealloc_mismatch read stack-buffer-overflow dynamic-stack-buffer-overflow far-from-bounds ERROR: AddressSanitizer: %s on address %p at pc %p bp %p sp %p SCARINESS: %d (%s) Size (in Kb) of thread local quarantine used to detect use-after-free errors. Lower value may reduce memory usage but increase the chance of false negatives. It is not advised to go lower than 64Kb, otherwise frequent transfers to global quarantine might affect performance. max_uar_stack_size_log max_malloc_fill_size Poison (or not) the array cookie after operator new[]. inet_pton inet_aton sendmmsg sigpending GLIBC_2.1 asprintf TIOCSETD CDROMSEEK HDIO_GET_DMA PPPIOCSFLAGS SNDCTL_COPR_RCVMSG SOUND_MIXER_READ_SPEAKER SOUND_MIXER_READ_SYNTH SOUND_MIXER_WRITE_BASS VT_RESIZEX (((((((kHighMemEnd) >> 3) + (__asan_shadow_memory_dynamic_address)) + 1) % GetMmapGranularity()))) == ((0)) ((flags()->min_uar_stack_size_log)) <= ((flags()->max_uar_stack_size_log)) ((AddrIsInMem(stack_bottom_))) != (0) vptr for %2 base class of %1 libunwind: malformed DW_CFA_register DWARF unwind, reg2 too big libunwind: malformed DW_CFA_val_offset_sf DWARF unwind, reg too big . If false, disable printing error summaries in addition to error reports. hard_rss_limit_mb allocator_release_to_os_interval_ms If non-empty, write the coverage pc table to this file. intercept_strlen print_cmdline ERROR: Invalid value for signal handler option: '%s' /proc/self/exe ((can_parse_)) != (0) Print flags help. ((!*start)) != (0) use_ld_allocations log_pointers out/llvm-project/compiler-rt/lib/lsan/lsan_common.cpp Suppressions used: HINT: LeakSanitizer does not work under ptrace (strace, gdb, etc) member access within 'BOOL' out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common.h stack created by unknown thread Address %p is located in stack of thread %s ' (0x%zx) of size %zu Stack left redzone: out/llvm-project/compiler-rt/lib/asan/asan_flags.cpp ((f->max_redzone)) >= ((f->redzone)) check_initialization_order detect_stack_use_after_return sleep_before_dying strict_init_order ((asan_inited)) != (0) ((global_registration_site_vector)) != (0) frexp getgroups initgroups pthread_attr_getscope strtol _Unwind_RaiseException ((atomic_load(&c->addr, memory_order_relaxed))) == ((0)) FDGETFDCSTAT FDPOLLDRVSTAT PPPIOCSASYNCMAP SNDCTL_MIDI_INFO SOUND_MIXER_WRITE_ALTPCM ((current_error_.kind)) == ((kErrorKindInvalid)) || `[%p, %p]` || ShadowGap || protect_shadow_gap=0: not protecting shadow gap, allocating gap's shadow || `[%p, %p]` || ShadowGap's shadow || ((this->stack_size())) > ((0U)) ebx FATAL: Internal error: %s's allocator failed to allocate a transfer batch. strip_path_prefix fast_unwind_on_check allocator_may_return_null If set, instructs kernel to not store the (huge) shadow in core file. ((IsAligned(offset, 4096))) != (0) ==%d== out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_procmaps_common.cpp ((*data_.current++)) == ((' ')) ((!KeyInfoT::isEqual(Val, TombstoneKey))) != (0) ERROR: %s failed to allocate 0x%zx (%zd) bytes at address %zx (errno: %d) Packed block of %zu KiB to %zu KiB %u riscv64 ((path_)) != (0) unsigned-integer-overflow invalid-shift-base null cfi _Nonnull return type annotation applying zero offset to null pointer out/llvm-project/compiler-rt/lib/ubsan/ubsan_value.cpp ((0 && "libclang_rt.ubsan was built without __int128 support")) != (0) ((IsAligned((uptr)ptr, alignment))) != (0) ((rz_size)) >= ((16)) high shadow This frame has %zu object(s): %s <== Memory access at offset %zd %s this variable%s operator delete HINT: if you don't care about these errors you may set ASAN_OPTIONS=detect_odr_violation=0 [ print_full_thread_history poison_partial memrchr getpwnam readdir pthread_attr_getstack listxattr eventfd_write getutent getnetbyaddr regcomp AddressSanitizer: failed to intercept '%s' jztLq FIOGETOWN TIOCNOTTY TIOCNXCL SIOCSIFMTU BLKRASET CDROMPLAYMSF PPPIOCGDEBUG SIOCDRARP SIOCGIFHWADDR SIOCGIFMAP SIOCGIFMEM SIOCSIFLINK SNDCTL_COPR_RCODE SNDCTL_COPR_SENDMSG SOUND_MIXER_READ_LINE3 SOUND_MIXER_WRITE_LINE3 SOUND_MIXER_WRITE_OGAIN SOUND_MIXER_WRITE_RECSRC SOUND_MIXER_WRITE_SYNTH SOUND_PCM_READ_RATE TIOCSERCONFIG TIOCSLCKTRMIOS TIOCSSOFTCAR VT_ACTIVATE ((internal_allocator()->FromPrimary(ptr))) != (0) ((value)) == ((end.value)) ((b2 - b1)) == ((granularity)) unwind_phase2 libunwind: malformed DW_CFA_def_cfa DWARF unwind, reg too big getSLEB128 getSavedRegister edx esi out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_allocator_local_cache.h log_exe_name Colorize reports: (always|never|auto). full_address_space yes ERROR: %s failed to deallocate 0x%zx (%zd) bytes at address %p ((!have_width || left_justified)) != (0) ((Buckets)) != (0) ((0)) == ((internal_sigaction(signum, &sigact, nullptr))) StackStore (BuildId: Treating pointer %p from ThreadContext as reachable undefined-behavior invalid-bool-load vptr Global quarantine stats: batches: %zd; bytes: %zd (user: %zd); chunks: %zd (capacity: %zd); %d%% chunks used; %d%% memory overhead max_redzone ((region_kind)) != (0) at offset %zu in frame%s operator new ASAN_OPTIONS WARNING: strndup* interceptors are enabled even though replace_str=0. Use intercept_strndup=0 to disable them. (Windows only) enable hooking of Rtl(Allocate|Free|Size|ReAllocate)Heap. prctl vsscanf wait3 readdir_r remquof wcsxfrm ((__interception::real___cxa_rethrow_primary_exception)) != (0) strcat __cxa_atexit ((addr1)) == ((0)) snprintf EVIOCSABS HDIO_DRIVE_CMD SNDCTL_SEQ_PANIC SNDCTL_SEQ_SYNC SOUND_MIXER_READ_DEVMASK SOUND_MIXER_READ_MIC SOUND_MIXER_READ_STEREODEVS SOUND_MIXER_WRITE_LINE SOUND_MIXER_WRITE_MIC __asan_%spoison_intra_object_redzone [%p,%p) %zd contiguous_container: %p %p %p %p pvalloc-overflow || `[%p, %p]` || HighMem || getFloatRegister getEncodedP ERROR: Path is too long: %c%c%c%c%c%c%c%c... %s If set, allows online symbolizer to run addr2line binary to symbolize stack traces (addr2line will only be used if llvm-symbolizer binary is unavailable. Print the process module map where supported (0 - don't print, 1 - print only once before process exits, 2 - print after each report). If non-empty, write 8bit counters to this file. If set, uses custom wrappers for strpbrk function to find more errors. If set, uses custom wrappers for send* functions to find more errors. Available flags for %s: WARNING: reading executable name failed with errno %d, some stack frames may not be symbolized ILL buff <= buff_end ((suppression_types_num_)) <= ((kMaxSuppressionTypes)) %s: reading suppressions file at %s ((TheBucket)) != (0) %s: CHECK failed: %s:%d "%s" (0x%zx, 0x%zx) (tid=%u) %s: Started BackgroundThread %s: soft rss limit exhausted (%zdMb vs %zdMb) cov_pcs_out: written %zd bytes to %s ((symbolizer_)) != (0) ((0)) == ((internal_strcmp(module_name, addr2line->module_name()))) use_poisoned __lsan_ignore_object(): ignoring heap object at %p Processing thread %llu. %s note: %s nullptr-after-nonzero-offset Include full stacktrace into an error report reference binding to ((b)) != (0) ((beg + 1)) == ((end)) operator new [] ERROR: AddressSanitizer: %s: memory ranges [%p,%p) and [%p, %p) overlap If set, attempts to catch initialization order issues. If set, explicitly unmaps the (huge) shadow at exit. Search Decoding unknown ioctl 0x%lx recvmmsg getxattr mmap setvbuf setbuffer TIOCGWINSZ BLKRRPART CDROMPLAYTRKIND FDGETDRVPRM FDSETPRM HDIO_GET_IDENTITY SNDCTL_DSP_GETFMTS SNDCTL_DSP_STEREO SNDCTL_DSP_SUBDIVIDE SNDCTL_FM_LOAD_INSTR SNDCTL_SEQ_RESET SNDCTL_SYNTH_MEMAVL SOUND_MIXER_READ_ALTPCM VT_SETMODE bsd_signal ((AddrIsAlignedByGranularity(addr + size))) != (0) ((beg)) < ((end)) allocation-size-too-big || `[%p, %p]` || MidShadow || MemToShadow(shadow): %p %p setFloatRegister ((IsAligned(res, alignment))) != (0) ERROR: %s failed to %s 0x%zx (%zd) bytes of %s (error code: %d) ((buff->size())) <= ((max_len)) leak_check_at_exit use_sigaltstack Limit the amount of mmap-ed memory (excluding shadow) in Mb; not a user-facing flag, used mosly for testing the tools soft_rss_limit_mb dedup_token_length sancov_path %s: ERROR: %s out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_posix.cpp ((buffer_[length()])) == (('\0')) ((status == ThreadStatusRunning || status == ThreadStatusFinished)) != (0) ((tctx)) != ((0)) ERROR: %s failed to unmap 0x%zx (%zd) bytes at address %p ERROR: %s getrlimit() failed %d ScopedStackWithGuard StackStorePack ((s & kUnlockMask)) == ((s)) %% (<unknown module>) ERROR: Using `atos` is only supported on Darwin. always ERROR: %s: %s on unknown address (pc %p bp %p sp %p T%d) acquire_my_map_info_list Root set: mark as reachable all allocations made from dynamic linker. This was the old way to handle dynamic TLS, and will be removed soon. Do not use this flag. %s leak of %zu byte(s) in %zu object(s) allocated from: __lsan_ignore_object(): no heap object found at %p WARNING: LeakSanitizer gave up on indirect leaks suppression. REGISTERS missing-return UndefinedBehaviorSanitizer execution reached the end of a value-returning function without returning a value passing zero to %0, which is not a valid argument Activated with flags: quarantine_size_mb Address %p is located in the %s area. %p is located %zd bytes inside ERROR: AddressSanitizer: %s: (size=%zd) Stack after return: ((f->max_redzone)) <= ((2048)) uar_noreserve ASan allocator flag. max_free_fill_size is the maximal amount of bytes that will be filled with free_fill_byte during free. verify_asan_link_order This may happen if another global with the same name strstr frexpl mbstowcs wcstombs pthread_mutex_lock pthread_mutexattr_getpshared pthread_rwlockattr_getpshared sem_post mincore strncpy AddressSanitizer: failed to intercept '%s@@%s' ((addr1)) == ((h->addr_)) sscanf fscanf fprintf SIOCSIFMETRIC CDROMRESUME HDIO_GET_KEEPSETTINGS PPPIOCSMRU SNDCTL_SEQ_CTRLRATE SNDCTL_SEQ_PERCMODE SNDCTL_SEQ_THRESHOLD SNDCTL_TMR_SELECT SOUND_MIXER_READ_VOLUME VT_WAITACTIVE ((beg.offset)) < ((end.offset)) poisoning: %p %zx invalid-aligned-alloc-alignment AddressSanitizer Stats: %zuM freed by %zu calls Stats: %zuM (%zuM-%zuM) mmaped; %zu maps, %zu unmaps Stats: StackDepot: %zd ids; %zdM allocated ((this)) != ((GetCurrentThread())) ((t->context())) != (0) ((class_id)) != ((0UL)) ((IsAligned(map_beg, page_size_))) != (0) ((res + size)) <= ((map_end)) auto ((out < out_end - 1)) != (0) Controls custom tool's SIGBUS handler (0 - do not registers the handler, 1 - register the handler and allow user to set own, 2 - registers the handler and block user from changing it). Controls custom tool's SIGILL handler (0 - do not registers the handler, 1 - register the handler and allow user to set own, 2 - registers the handler and block user from changing it). mmap_limit_mb cov_pcs_out FlagHandlerInclude false GNU ((0)) == ((sigaltstack(nullptr, &oldstack))) ((0)) == ((sigaltstack(&altstack, &oldstack))) SanitizerCoverage: failed to open %s for writing (reason: %d) %s: StackDepot compression thread stopped %s: StackDepot released %zu KiB out of %zu KiB in %llu ms +0x%zx %s(%d +0x%zx) armv7k out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_libcdep.cpp use_unaligned ((tag == kReachable || tag == kIndirectlyLeaked)) != (0) ((tag == kDirectlyLeaked || tag == kIndirectlyLeaked)) != (0) LeakSanitizer has encountered a fatal error. Thread %llu not found in registry. ((0 && "unknown ErrorType!")) != (0) undefined UBSAN_SYMBOLIZER_PATH - %0 null pointer of type %1 ((old_chunk_state)) == ((CHUNK_QUARANTINE)) %zd:%zd; created by %s here: %p is located %zd bytes to the left of HINT: if you don't care about these errors you may set ASAN_OPTIONS=new_delete_type_mismatch=0 write ((IsPowerOfTwo(f->redzone))) != (0) detect_odr_violation localtime pthread_getcpuclockid posix_spawn sysinfo realpath sem_getvalue WARNING: unexpected arg size in printf interceptor: %zu munlockall TIOCMSET CDROMPAUSE CDROMSTOP FDSETDRVPRM SIOCGSTAMP SNDCTL_SYNTH_INFO VT_GETMODE VT_RESIZE ((0)) == ((pthread_key_create(&tsd_key, destructor))) out/llvm-project/compiler-rt/lib/asan/asan_rtl.cpp (((((kMidMemBeg) >> 3) + (__asan_shadow_memory_dynamic_address)) > ((((__asan_shadow_memory_dynamic_address ? __asan_shadow_memory_dynamic_address - 1 : 0)) >> 3) + (__asan_shadow_memory_dynamic_address)) && kMidMemBeg > (((kMidMemEnd) >> 3) + (__asan_shadow_memory_dynamic_address)) && (((((((kHighMemEnd) >> 3) + (__asan_shadow_memory_dynamic_address)) + 1)) >> 3) + (__asan_shadow_memory_dynamic_address)) > kMidMemEnd)) != (0) ecx FDE has zero length FDE is really a CIE ((res + size)) >= ((map_beg)) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_flags.cpp If available, use the fast frame-pointer-based unwinder on malloc/free. Controls custom tool's SIGSEGV handler (0 - do not registers the handler, 1 - register the handler and allow user to set own, 2 - registers the handler and block user from changing it). coverage_dir intercept_strpbrk Print command line on crash (asan only). <empty> ==%s ((live_.try_emplace(user_id, tid).second)) != (0) ((!FoundVal)) != (0) ((stack_top)) != (0) (((uptr)&rl >= segment.start && (uptr)&rl < segment.end)) != (0) %02x Using llvm-symbolizer at user-specified path: %s [1m [0m Root set: include thread stacks Consider unaligned pointers valid. %p: found %p pointing into chunk %p-%p of size %zu. WARNING: stack pointer not in stack range. %lld nullptr-with-nonzero-offset misaligned-pointer-use function-type-mismatch [1m negation of %0 cannot be represented in type %1 nonnull attribute _Nonnull type annotation applying non-zero offset %0 to null pointer out/llvm-project/compiler-rt/lib/asan/asan_activation.cpp Thread %s ((chunk.AllocTid())) != ((kInvalidTid)) Address %p is a wild pointer inside of access range of size %p. %zd bytes malloc ERROR: AddressSanitizer: bad parameters to __sanitizer_annotate_contiguous_container: beg : %p end : %p old_mid : %p new_mid : %p ERROR: beg is not aligned by %zu [2]: FakeStack Poison (or not) the heap memory on [de]allocation. Zero value is useful for benchmarking the allocator or instrumentator. If true, ASan tweaks a bunch of other flags (quarantine, redzone, heap poisoning) to reduce memory consumption as much as possible, and restores them to original values when the first instrumented module is loaded into the process. This is mainly intended to be used on Android. but AddressSanitizer can not provide more details. readv puts getgrnam gethostbyaddr modfl pthread_mutex_unlock pthread_condattr_getpshared sem_unlink %s: WARNING: unexpected format specifier in printf interceptor: %.*s (reported once per process) cCsS out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_addrhashmap.h SIOCATMARK EVIOCGREP FDMSGOFF FDTWADDLE FDWERRORCLR HDIO_SET_32BIT SIOCSIFSLAVE SNDCTL_DSP_POST %s%s%x%x%s%s bad-free rss-limit-exceeded || `[%p, %p]` || ShadowGap2 || ((t)) != (0) unprotected gap shadow virtual pointer to member function call libunwind: malformed DW_CFA_same_value DWARF unwind, reg too big DW_EH_PE_aligned pointer encoding not supported truncated sleb128 expression out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_allocator_combined.h ((size_)) <= ((new_capacity)) ((i)) < ((size_)) symbolize Verbosity level (0 - silent, 1 - a bit of output, 2+ - more output). If false, the allocator will crash instead of returning 0 on out-of-memory. heap_profile abort_on_error If true, dump 16 bytes starting at the instruction that caused SEGV test_only_emulate_no_memorymap Can't read directory entries from /proc/%d/task. /proc/self/cmdline ((tctx->status)) == ((ThreadStatusInvalid)) ((running_threads_)) > ((0)) HEAP PROFILE at RSS %zdMb %s: real_pthread_create undefined ReserveShadowMemoryRange failed while trying to map 0x%zx bytes. Perhaps you're using ulimit -v out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_posix_libcdep.cpp Waiting on the process failed (errno %d). Tracer caught signal %d: addr=0x%zx pc=0x%zx sp=0x%zx DEDUP_TOKEN: %s x86_64h ((pid)) > ((0)) ((__sanitizer_symbolize_set_demangle(common_flags()->demangle))) != (0) -C %s%s%x%x%s ((map)) != (0) The %zu top leak(s): Running thread %llu was not suspended. False leaks are possible. STACK %s runtime error: %s%s non-positive-vla-index unreachable return dynamic operation on * returns_nonnull attribute non-virtual pointer to member function call out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_allocator_combined.h WARNING: AddressSanitizer failed to allocate 0x%zx bytes ERROR: AddressSanitizer: %s on %p in thread %s: free ERROR: AddressSanitizer: reallocarray parameters overflow: count * size (%zd * %zd) cannot be represented in type size_t (thread %s) [1] size=%zd '%s' %s (((uptr)common_flags()->malloc_context_size)) <= ((kStackTraceMax)) If set, prints thread creation stacks for the threads involved in the report and their ancestors up to the main thread. location (%p): name=%s[%p], %d %d In either case this is likely an ODR violation bug, strnlen vasprintf clock_getres sincosf ftime sem_init sem_timedwait sendto getgrouplist readlinkat regexec popen Warning: REAL(sigaction_symname) == nullptr. This may happen if you link with ubsan statically. Sigaction will not work. strncat CDROMREADRAW EVIOCGVERSION FDCLRPRM MTIOCTOP SIOCGARP SIOCSIFENCAP SNDCTL_DSP_SPEED SNDCTL_TMR_TEMPO SOUND_MIXER_READ_BASS SOUND_MIXER_WRITE_VOLUME VT_DISALLOCATE VT_OPENQRY Trying to unpoison memory region [%p, %p) || `[%p, %p]` || ShadowGap3 || thread_local_quarantine_size_kb=%zuK unsupported restore location for register log_to_syslog detect_leaks intercept_tls_get_addr demangle intercept_strstr intercept_strndup decorate_proc_maps Truncated ((count)) != ((0)) ((tid)) != ((kInvalidTid)) ((0)) == ((sigaltstack(&altstack, nullptr))) ((kBlockSizeFrames)) == ((unpacked_end - unpacked)) %c ((0 && "Invalid module arch")) != (0) UNKNOWN ((arg->stack->size)) < ((arg->max_depth)) Print addresses of leaked objects after main leak report. The number of leaks reported. Scanning %s range %p-%p. __lsan_unregister_root_region(): region at %p of size %zu has not been registered. LeakSanitizer: Multiple modules match "%s". TLS and other allocations originating from linker might be falsely reported as leaks. '%s' invalid-objc-cast 'bool' ctz() (unknown) out/llvm-project/compiler-rt/lib/asan/asan_allocator.cpp Activating ASan intra-object-overflow T%d: FakeStack created: %p -- %p stack_size_log: %zd; mmapped %zdK, noreserve=%d %zd: %zd/%zd; replace_intrin check_malloc_usable_size ((AddrIsInMem(g->beg))) != (0) strtok memcpy writev gmtime getitimer accept getmntent times __cxa_rethrow_primary_exception out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors_ioctl.inc CDROMMULTISESSION EVIOCGPHYS FDWERRORGET HDIO_SET_NOWERR HDIO_SET_UNMASKINTR SIOCGIFNAME SNDCTL_SEQ_GETOUTCOUNT TIOCGSOFTCAR unpoisoning: %p %zx ((mid)) <= ((end)) kErrorMessageBufferSize >= error_message_buffer_pos ================================================================= bad-__sanitizer_annotate_contiguous_container virtual call cast to unrelated type invalid vtable during phase1 personality function said it would stop here, but now in phase2 it did not stop here libunwind: malformed DW_CFA_GNU_negative_offset_extended DWARF unwind, reg too big include read more options from the given file (if it exists) Print the flag descriptions. max_allocation_size_mb disable_coredump intercept_intrin dump_instruction_bytes ERROR: Invalid value for uptr option: '%s' ((reinterpret_cast<uptr>(&addr))) < ((addr)) ((0)) == (((uptr)child_stack % 16)) /proc/ !have_flags base == 10 || !negative ((alive_threads_)) == ((max_alive_threads_)) ((getrlimit(3, &rl))) == ((0)) /proc/self/statm SetAlternateSignalStack cov_8bit_counters_out: written %zd bytes to %s ,%d WARNING: Can't write to symbolizer at fd %d use_stacks ((allocator_begin)) <= ((allocator_end)) count bytes template %s Too many leaks! Only the first %zu leaks encountered will be reported. out/llvm-project/compiler-rt/lib/ubsan/ubsan_diag.h signed-integer-overflow implicit-unsigned-integer-truncation dynamic-type-mismatch <unknown type> %0 specified here ((0 && "unexpected floating point bit width")) != (0) ((cache_size)) >= ((overhead_size)) ASAN_ACTIVATION_OPTIONS AddressSanitizer can't parse the stack frame descriptor: |%s| %p is located %zd bytes to the right HINT: if you don't care about these errors you may set ASAN_OPTIONS=alloc_dealloc_mismatch=0 Poisoned by user: report_globals allow_user_poisoning sleep_after_init ((flags()->report_globals)) != (0) clock_gettime waitpid getaddrinfo lgammaf flistxattr sem_destroy atoll pthread_create FIONCLEX SIOCDELMULTI SIOCGIFNETMASK FDRAWCMD MTIOCPOS SNDCTL_COPR_RDATA SNDCTL_COPR_WCODE SOUND_PCM_READ_BITS out/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp __libc_malloc_dispatch Live Heap Allocations: %zd bytes in %zd chunks; quarantined: %zd bytes in %zd chunks; %zd other chunks; total chunks: %zd; showing top %zd%% (at most %zd unique contexts) ((beg.chunk)) < ((end.chunk)) ((beg)) <= ((mid)) new-delete-type-mismatch check failed in %0, vtable located in %1 %0 address %1 which does not point to an object of type %2 setRegister libunwind: malformed DW_CFA_offset_extended DWARF unwind, reg too big edi out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_common.h ERROR: Failed to mmap fast_unwind_on_malloc verbosity print_summary If set, uses alternate stack for signal handling. Soft RSS limit in Mb. If non-zero, a background thread is spawned at startup which periodically reads RSS. If the limit is reached all subsequent malloc/new calls will fail or return NULL (depending on the value of allocator_may_return_null) until the RSS goes below the soft limit. This limit does not affect memory allocations other than malloc/new. If non-zero, malloc/new calls larger than this size will return nullptr (or crash if allocator_may_return_null=false). cov_8bit_counters_out no_huge_pages_for_shadow allocate Supported Printf formats: %([0-9]*)?(z|l|ll)?{d,u,x,X}; %p; %[-]([0-9]*)?(\.\*)?s; %c Provided format: ((((end + 1) % GetMmapGranularity()))) == ((0)) If set, coverage information will be symbolized by sancov tool after dumping. ((to)) == ((to_end)) %s "%s:%s" 0x%zx ((garbage)) != (0) %L %F Unmatched call to __lsan_enable(). use_globals unreadable %zu byte(s) leaked in %zu allocation(s). Rerun with %zu suppressed stacks. implicit-integer-sign-change left shift of %0 by %1 places cannot be represented in type %2 control flow integrity check for type %0 failed during %1 ((!AddrIsInMem(addr))) != (0) ' (line %zd) ERROR: AddressSanitizer: requested allocation size 0x%zx (0x%zx after adjustments for alignment, red zones etc.) exceeds maximum supported size of 0x%zx (thread %s) ] debug If true, poison partially addressable 8-byte aligned words (default=true). This flag affects heap and global buffers, but not stack buffers. out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc memmove frexpf fread pread fputs setlocale strerror pthread_attr_getschedparam send wcslen strlcpy index sS scanf TIOCSWINSZ SIOCSIFDSTADDR BLKRAGET FDFMTBEG PPPIOCGFLAGS PPPIOCGXASYNCMAP SNDCTL_COPR_HALT TCSETSW wild-addr-write ((0)) != (0) %p %p ((0)) == ((main_thread->tid())) %zu:%zu; out/llvm-project/compiler-rt/lib/asan/asan_suppressions.cpp T%d exited invalid vptr libunwind: malformed DW_CFA_val_offset DWARF unwind, reg (%llu) out of range CIE start does not match CIE version is not 1 or 3 ((0 && "unable to mmap")) != (0) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_mutex.h Enables support for dynamic libraries linked with libpthread 2.2.5. If set, uses custom wrappers for strstr and strcasestr functions to find more errors. ERROR: Invalid value for bool option: '%s' 0 no %s - %s (Current Value%s: %s) ((n_unknown_flags_)) < ((kMaxUnknownFlags)) ((IsOneOf(*data_.current, '-', 'w'))) != (0) ((!KeyInfoT::isEqual(Val, EmptyKey))) != (0) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cpp ((index)) < ((thread_ids_.size())) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stack_store.cpp out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace.cpp WARNING: Symbolizer was blocked from starting itself! --default-arch=i386 Launching Symbolizer process: Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. report_objects Objects leaked above: ((isIntegerTy())) != (0) invalid ObjC cast, object is a '%0', but expected a %1 indirect function call ((0 && "unexpected bit width")) != (0) ((chunks[i])) == ((t)) Deactivating ASan AddressSanitizer can not describe address in more detail (wild memory access suspected). partially overflows INVALID heap-buffer-overflow ASan allocator flag. max_malloc_fill_size is the maximal amount of bytes that will be filled with malloc_fill_byte on malloc. Value used to fill the newly allocated memory. detect_invalid_pointer_pairs WARNING: failed decoding unknown ioctl 0x%lx getsockname gethostbyname getpeername wcsrtombs pthread_attr_getdetachstate fflush ctermid stat strxfrm_l regfree FIONBIO EVIOCSFF SIOCGIFSLAVE SNDCTL_DSP_RESET SNDCTL_SEQ_GETINCOUNT out/llvm-project/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cpp out/llvm-project/compiler-rt/lib/asan/asan_poisoning.cpp ((*(u8*)MemToShadow(a))) == ((0)) out/llvm-project/compiler-rt/lib/asan/asan_report.cpp out/llvm-project/compiler-rt/lib/asan/asan_shadow_setup.cpp __asan_finish_switch_fiber called from unknown thread DW_EH_PE_funcrel pointer encoding not supported libunwind: Unsupported .eh_frame_hdr version eax LargeMmapAllocator ((chunks_[idx])) == ((h)) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_file.cpp ((base)) != (0) fast_unwind_on_fatal handle_sigill detect_deadlocks intercept_strchr %s: %s false StackStoreUnpack in %s (%s %s "%s" 0x%zx External symbolizer is explicitly disabled. ERROR: %s: %s on unknown address %p (pc %p bp %p sp %p T%d) The signal is caused by a %s memory access. Hint: address points to the zero page. release_my_map_info_list use_registers null-pointer-use ((IsPowerOfTwo(options.max_redzone))) != (0) ((rz_log)) < ((8)) out/llvm-project/compiler-rt/lib/asan/asan_mapping.h ((!asan_is_deactivated)) != (0) HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork ((dealloc_stack->size)) > ((0)) ERROR: AddressSanitizer: attempting to call __sanitizer_get_allocated_size() for pointer which is not owned: %p Shadow bytes around the buggy address: %s%p: Deprecated, please use quarantine_size_mb. ((res)) != (0) ((!asan_init_is_running)) != (0) tmpnam ttyname lgammaf_r sem_wait __strxfrm_l regerror strdup sprintf SIOCGIFDSTADDR CDROMEJECT EVIOCSKEYCODE FDGETMAXERRS SIOCSIFMAP SNDCTL_DSP_GETBLKSIZE SOUND_MIXER_READ_CD SOUND_MIXER_READ_LINE1 SOUND_PCM_WRITE_FILTER signal redzone=%zu malloc_context_size=%zu SHADOW_SCALE: %d ERROR: starting fiber switch while in fiber switch SetCurrentThread: %p for thread %p FATAL: %s: calloc parameters overflow: count * size (%zd * %zd) cannot be represented in type size_t WARNING: %s: CombinedAllocator allocation overflow: 0x%zx bytes with 0x%zx alignment requested InternalMmapVector stderr handle_sigfpe Large shadow regions are zero-filled using mmap(NORESERVE) instead of memset(). This is the threshold size in bytes. Print matched suppressions at exit. true exclusive /proc/%d/task/ ((module_name_len)) < ((buf_len)) NullSepFileArray ((IsOneOf(*data_.current, '-', 'r'))) != (0) ((tid)) < ((max_threads_)) ((tctx->status)) == ((ThreadStatusCreated)) ((ThreadStatusCreated)) == ((tctx->status)) ((Size)) == ((sizeof(BucketT) * NumBuckets)) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_linux_libcdep.cpp ERROR: %s setrlimit() failed %d Waiting on thread %zu failed, detaching (errno %d). AddDieCallback(TracerThreadDieCallback) ((id & (((u32)-1) >> kReservedBits))) == ((id)) GLOBAL ((size_)) > ((0)) float-cast-overflow invalid-enum-load cfi-bad-type report_error_type load of %0 address %1 with insufficient space for an object of type %2 variable length array bound evaluates to non-positive value %0 pointer index expression with base %0 overflowed to %1 out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_allocator_secondary.h %p is located somewhere around (this is AddressSanitizer bug!) [2] size=%zd '%s' %s [1]: multi-byte unknown-crash Stack use after scope: ((base)) <= ((ptr)) Controls the way to handle globals (0 - don't detect buffer overflow on globals, 1 - detect buffer overflow, 2 - print data about registered globals). Minimum fake stack size log. realloc(p, 0) is equivalent to free(p) by default (Same as the POSIX standard). If set to false, realloc(p, 0) will return a pointer to an allocated space which can not be used. strlen strcasestr mktime vsnprintf setitimer modf ether_aton pthread_attr_getguardsize sincosl pthread_setcancelstate sigaltstack pthread_join AddressSanitizer: libc interceptors initialized SIOCGIFCONF SIOCGPGRP BLKFLSBUF BLKROGET CDROMEJECT_SW CDROMSTART EVIOCGUNIQ FDDEFPRM HDIO_SET_MULTCOUNT SNDCTL_COPR_RESET SNDCTL_DSP_SETFRAGMENT TCSETSF TIOCLINUX null-deref ((((kMidMemBeg ? (((kMidMemBeg) >> 3) + (__asan_shadow_memory_dynamic_address)) : (((((((kHighMemEnd) >> 3) + (__asan_shadow_memory_dynamic_address)) + 1)) >> 3) + (__asan_shadow_memory_dynamic_address))) - 1))) == (((((((((kHighMemEnd) >> 3) + (__asan_shadow_memory_dynamic_address)) + 1)) >> 3) + (__asan_shadow_memory_dynamic_address)) - 1)) ((frames)) != (0) ((bottom)) != (0) libunwind: %s - %s esp read more options from the given file strip_env handle_abort allow_user_segv_handler color Target directory for coverage dumps. Defaults to the current directory. intercept_memcmp If set, uses custom wrappers for memcmp function to find more errors. /proc/%d/task/%d/status out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_procmaps_linux.cpp ((pthread_getattr_np(pthread_self(), &attr))) == ((0)) SanitizerCoverage: %s: %zd PCs written out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_lzw.h ((stack_top)) > ((stack_bottom)) Using libbacktrace symbolizer. use_root_regions __lsan_ignore_object(): heap object at %p is already being ignored DTLS index %0 out of bounds for type %1 ((user_end)) <= ((alloc_end)) registered at: %spreviously allocated by thread %s here:%s partially underflows Right alloca redzone: min_uar_stack_size_log DynInitPoison module: %s Added strcasecmp strspn strcspn getpwuid inet_ntop pthread_mutexattr_gettype llistxattr fdopen pthread_setcanceltype recvfrom wcsnlen getnetbyname atol strtoll %s ignores mlock/mlockall/munlock/munlockall SIOCSIFMEM SNDCTL_SEQ_OUTOFBAND SOUND_MIXER_READ_ENHANCE SOUND_MIXER_READ_OGAIN TCSETS invalid-allocation-alignment || `[%p, %p]` || HighShadow || SHADOW_OFFSET: 0x%zx ((0)) == ((AsanTSDGet())) libunwind: malformed DW_CFA_restore DWARF unwind, reg (%llu) out of range DW_OP_deref_size with bad size Unknown DWARF encoding for search table. ((idx)) < ((n_chunks_)) (total_mmaped >> 20) < common_flags()->mmap_limit_mb Intercept and handle ioctl requests. Controls custom tool's SIGFPE handler (0 - do not registers the handler, 1 - register the handler and allow user to set own, 2 - registers the handler and block user from changing it). legacy_pthread_cond symbolize_inline_frames If set, uses custom wrappers for *stat functions to find more errors. TEST ONLY fail to read memory mappings to emulate sanitized "init" 2 unterminated string %s ABRT ((size)) < ((page_size * 10)) RemoveDieCallback(TracerThreadDieCallback) ((header->size)) >= ((sizeof(PackedHeader))) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stackdepot.cpp out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace_printer.cpp armv7s FRAME [1m [31m READ ROOT Ignored: chunk %p-%p of size %zu. ((NumArgs != MaxArgs)) != (0) %0 misaligned address %1 for type %3, which requires %2 byte alignment ((nearest_chunk)) >= ((h->map_beg)) out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_mutex.h [%zd, %zd) %zu-byte region [%p,%p) ((id)) != (0) ERROR: AddressSanitizer: invalid allocation alignment: %zd, alignment must be a power of two (thread %s) These globals were registered at these points: Shadow byte legend (one shadow byte represents %d application bytes): print_scariness Report errors on mismatch between size of new and delete. pwrite asctime pthread_getschedparam gethostent wcsncat __wcsxfrm_l cCsS[ diouxXn ((__interception::real_memcpy)) != (0) CDROMREADCOOKED CDROMREADTOCENTRY CDROM_GET_UPC EVIOCGSND FDFLUSH SNDCTL_COPR_WDATA ((AddrIsInMem(addr + size - (1ULL << 3)))) != (0) wild-addr-read bad-malloc_usable_size calloc-overflow out-of-memory odr-violation ((ptr[0] == kCurrentStackFrameMagic)) != (0) libunwind: malformed DW_CFA_expression DWARF unwind, reg too big IsPowerOfTwo(boundary) If positive, after printing a stack trace also print a short string token based on this number of frames that will simplify deduplication of the reports. Example: 'DEDUP_TOKEN: foo-bar-main'. Default is 0. strict_string_checks If set, uses custom wrappers for strndup functions to find more errors. intercept_memmem html_cov_report ((size)) <= ((1ULL << (30))) SEGV TRAP ((Size * 2)) > ((GetPageSizeCached())) ERROR: Failed to protect the shadow gap. %s cannot proceed correctly. ABORTING. ((map_start)) != ((~(uptr)0)) ((module_name)) != (0) --no-inlines WARNING: external symbolizer didn't start up correctly! ERROR: External symbolizer path is set to '%s' which isn't a known symbolizer. Please set the path to the llvm-symbolizer binary or other known tool. First 16 instruction bytes at pc: libcorkscrew.so out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_unwind_linux_libcdep.cpp (((uptr)res)) <= ((kStackTraceMax)) ((allocator_end)) <= ((end)) invalid-null-return %s%02x shift-exponent bool nullability-return + subtraction of unsigned offset from %0 overflowed to %1 ((AsanChunkView(right_chunk).AddrIsAtLeft(addr, 1, &r_offset))) != (0) ((nearest_chunk)) < ((h->map_beg + h->map_size)) ((atomic_load(&m->chunk_state, memory_order_relaxed))) == ((CHUNK_QUARANTINE)) heap-invalid of global variable '%s' defined in ' default-aligned ((alloc_type)) != ((dealloc_type)) global-buffer-overflow out/llvm-project/compiler-rt/lib/asan/asan_descriptions.h => Intra object redzone: ((ptr)) < ((base + (((uptr)1) << stack_size_log))) Maximum fake stack size log. out/llvm-project/compiler-rt/lib/asan/asan_globals.cpp ((AddrIsAlignedByGranularity(g->beg))) != (0) strchrnul gethostbyname2 modff ether_ntoa ttyname_r mprotect CS aAeEfFgG TIOCPKT SIOCSIFBRDADDR CDROMREADMODE1 CDROMREADTOCHDR CDROMVOLCTRL PPPIOCGASYNCMAP SOUND_MIXER_WRITE_ENHANCE out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_signal_interceptors.inc ((total_allocated_user_size_)) != (0) %zd byte(s) (%zd%%) in %zd allocation(s) wild-jump max_redzone=%zu object is of type %0 no x86 float registers evaluateExpression ERROR: Can't create directory: Path to external symbolizer. If empty, the tool will search $PATH for the symbolizer. allow_addr2line Invoke leak checking in an atexit handler. Has no effect if detect_leaks=false, or if __lsan_do_leak_check() is called before the handler has a chance to run. handle_segv can_use_proc_maps_statm Print file locations in Visual Studio style (e.g: file(10,42): ... Flag parsing failed. Can't open /proc/%d/task for reading. ((size_)) <= ((capacity())) ((!data_)) != (0) ((*data_.current++)) == (('-')) (((beg % GetMmapGranularity()))) == ((0)) ((14)) == ((write_errno)) WARNING: failed to fork (errno %d) Could not detach from thread %d (errno %d). modules_.size() > 0 ((0 && "unimplemented")) != (0) ((infd)) != (0) ERROR: %s: %s on address %p (pc %p bp %p sp %p T%d) Failed to find one of the required symbols in libcorkscrew.so. You may see broken stack traces in SEGV reports. max_leaks Root region %p-%p intersects with mapped region %p-%p (%s) Unable to get registers from thread %llu. insufficient-object-size <memory cannot be printed> shift-base Crash the program after printing the first error report Do not print non-fatal error reports for unsigned integer overflow. Used to provide fuzzing signal without blowing up logs. null pointer passed as argument %0, which is declared to never be null out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_allocator_primary32.h ((prev->next)) == ((x)) Container overflow: Left alloca redzone: T%d: FakeStack destroyed: %s If set, uses custom wrappers for memset/memcpy/memmove intrinsics. If true, assume that dynamic initializers can never access globals from other modules, even if the latter are already initialized. memset gmtime_r strtoimax getresuid getprotobyname ((__interception::real___cxa_throw)) != (0) FIOCLEX TIOCMGET SIOCGIFMETRIC HDIO_GET_32BIT SNDCTL_TMR_TIMEBASE SOUND_MIXER_WRITE_IMIX SOUND_MIXER_WRITE_SPEAKER SOUND_PCM_WRITE_CHANNELS TCFLSH [1m [33m Stats: %zuM realloced by %zu calls libunwind: malformed DW_CFA_undefined DWARF unwind, reg too big Allocate check_printf handle_sigtrap If set, deadlock detection is enabled. intercept_stat intercept_send ((!((precision >= 0 || left_justified) && *cur != 's'))) != (0) %s: failed to read suppressions file '%s' %s: failed to parse suppressions out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_thread_registry.cpp ((tctx->status)) == ((ThreadStatusDead)) Installed the sigaction for signal %d ((nullptr)) != ((ptr)) ((nullptr)) == ((suppression_ctx)) %p (%zu bytes) ================================================================= %p alignment assumption was specified here ((getType().isUnsignedIntegerTy())) != (0) Stats: LargeMmapAllocator: allocated %zd times, remains %zd (%zd K) max %zd M; by size logs: ((AddrIsInMem(p))) != (0) ((AddressSpaceView::Load(chunks[i])->chunk_idx)) == ((i)) global (%s) %sfreed by thread %s here:%s ERROR: AddressSanitizer: specified RSS limit exceeded, currently set to soft_rss_limit_mb=%zd use-after-poison detect_container_overflow Or the global comes from a C file built w/o -fno-common. strcmp time localtime_r __wait4 poll sigprocmask _exit pthread_attr_getstacksize sincos fgetxattr sem_open process_vm_readv getutline readlink out/llvm-project/compiler-rt/lib/asan/asan_interceptors.cpp ((*p)) == ((0)) %s: WARNING: unexpected format specifier in scanf interceptor: %.*s <DECODED_IOCTL> SIOCSPGRP TIOCEXCL SIOCADDMULTI HDIO_GET_UNMASKINTR SIOCDARP SNDCTL_COPR_LOAD SNDCTL_MIDI_PRETIME TIOCINQ out/llvm-project/compiler-rt/lib/asan/asan_memory_profile.cpp WARNING: ASan is ignoring requested __asan_handle_no_return: stack type: %s top: %p; bottom %p; size: %p (%zd) False positive error reports may follow For details see https://github.com/google/sanitizers/issues/189 libunwind: malformed DW_CFA_register DWARF unwind, reg too big handle_sigbus If false, do not attempt to read /proc/maps/statm. Mostly useful for testing sanitizers. If set, coverage information will be dumped at program shutdown (if the coverage instrumentation was enabled at compile time). use_madv_dontdump If set, uses custom wrappers for strcmp functions to find more errors. If set, the tool calls abort() instead of _exit() after printing the error report. 1 out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_flag_parser.cpp format !have_length base == 10 || base == 16 /proc/self/maps ((*data_.current++)) == ((':')) %s: Thread limit (%u threads) exceeded. Dying. ((0 ? ThreadStatusCreated : ThreadStatusRunning)) == ((tctx->status)) %s: hard rss limit exhausted (%zdMb vs %zdMb) Failed spawning a tracer thread (errno %d). ((name)) != (0) i386 CODE WARNING: invalid path to external symbolizer! WARNING: Can't create a socket pair to start external symbolizer (errno: %d) Symbolizer is disabled. Root set: include regions added via __lsan_register_root_region(). Suppressed: chunk %p-%p of size %zu. Skipped %d guard page(s) to obtain stack %p-%p. %llu out-of-bounds-index nullability-arg halt_on_error %0 is outside the range of representable values of type %2 out/llvm-project/compiler-rt/lib/ubsan/ubsan_monitor.cpp ((options.max_redzone)) <= ((2048)) out/llvm-project/compiler-rt/lib/asan/asan_debugging.cpp %sallocated by thread %s here:%s ERROR: AddressSanitizer: attempting %s on %p in thread %s: ((0 && "AddressInformation kind is invalid")) != (0) Addressable: Global init order: ASan internal: out/llvm-project/compiler-rt/lib/asan/asan_fake_stack.cpp LSAN_OPTIONS Value used to fill deallocated memory. print_stats ((0)) == ((((uptr)stop - (uptr)start) % sizeof(__asan_global))) strptime vprintf clock_settime sigwait freopen setlinebuf SIOCGIFMTU HDIO_GETGEO HDIO_SET_DMA SIOCDELRT SNDCTL_DSP_SETFMT SNDCTL_DSP_SYNC SOUND_PCM_READ_FILTER ((__interception::real_memset)) != (0) bad-__sanitizer_get_allocated_size || `[%p, %p]` || LowMem || mallocs by size class: T%d: stack [%p,%p) size 0x%zx; local=%p DW_OP_fbreg not implemented ip ((b->Count())) > ((0)) ((IsAligned(p, page_size_))) != (0) ReadFileToBuffer ((new_capacity)) > ((0)) sancov Controls custom tool's SIGTRAP handler (0 - do not registers the handler, 1 - register the handler and allow user to set own, 2 - registers the handler and block user from changing it). Sanitize complete address space; by default kernel area on 32-bit platforms will not be sanitized print_suppressions Disable core dumping. By default, disable_coredump=1 on 64-bit to avoid dumping a 16T+ core file. Ignored on OSes that don't dump core by default and for sanitizers that don't reserve lots of virtual memory. intercept_strtok If true, assume that memcmp(p1, p2, n) always reads n bytes before comparing p1 and p2. %s: ERROR: expected '=' in %s expected '=' ((base)) == ((10)) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_linux.cpp ((size)) > (((1ULL << up))) <null> ((rv)) == ((0)) ((0 && "Unexpected type")) != (0) TwoLevelMap ?? Using llvm-symbolizer found at: %s Hint: pc points to the zero page. ((context)) != (0) %p is poisoned: ignoring %p pointing into chunk %p-%p of size %zu. readable ((leaks_.size() <= kMaxLeaksConsidered)) != (0) out/llvm-project/compiler-rt/lib/lsan/../sanitizer_common/sanitizer_common.h TLS [1m [32m vla-bound upcast of division by zero execution reached an unreachable program point unsigned (longjmp and C++ exceptions *are* supported) %s object passed to delete has wrong type: size of the allocated type: %zd bytes; size of the deallocated type: %zd bytes. alignment of the allocated type: %s; alignment of the deallocated type: %s. ERROR: AddressSanitizer: %s (%p): %s%s of size %zu at %p thread %s%s HINT: if you don't care about these errors you may set ASAN_OPTIONS=detect_container_overflow=0. If you suspect a false positive see also: https://github.com/google/sanitizers/wiki/AddressSanitizerContainerOverflow. If >=2, detect violation of One-Definition-Rule (ODR); If ==1, detect ODR-violation only if the two variables have different sizes Crash the program after printing the first error report (WARNING: USE AT YOUR OWN RISK!) strncmp ctime ptsname eventfd_read setbuf longjmp printf ((ioctl_table_size < ioctl_table_max)) != (0) SIOCGIFADDR CDROMRESET PPPIOCGUNIT SNDCTL_TMR_METRONOME SOUND_MIXER_READ_LINE SOUND_MIXER_READ_RECSRC __libc_malloc_default_dispatch ((IsAligned(end, (1ULL << 3)))) != (0) ((0)) == ((sigaltstack(nullptr, &signal_stack))) ((!tsd_key_inited)) != (0) out/llvm-project/compiler-rt/lib/asan/asan_errors.h invalid-pointer-pair object is base class subobject at offset %0 within object of type %1 libunwind: malformed DW_CFA_def_cfa_sf DWARF unwind, reg too big ((reinterpret_cast<uptr>(res) & (alignment - 1))) == ((0)) include_if_exists If available, use the fast frame-pointer-based unwinder on internal CHECK failures. Check printf arguments. clear_shadow_mmap_threshold If set, uses custom wrappers for strchr, strchrnul, and strrchr functions to find more errors. Deduplicate multiple reports for single source location in halt_on_error=false mode (asan only). out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_libc.cpp ((buffer_.size())) >= ((4096)) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_dense_map.h %s/%s.%zd.%s ((printer.ProcessAddressFrames(pc))) != (0) Using internal symbolizer. Failed to open libcorkscrew.so. You may see broken stack traces in SEGV reports. Direct ((param)) != (0) Processing platform-specific allocations. ((!comp(v[i], v[last]))) != (0) ((suppression_ctx)) != (0) LeakSanitizer: Dynamic linker not found. TLS and other allocations originating from linker might be falsely reported as leaks. assumption of %0 byte alignment for pointer of type %1 failed %0address is %1 aligned, misalignment offset is %2 bytes left shift of negative value %0 ((0 && "Invalid arguments passed to __ubsan_get_current_report_data")) != (0) ((options.max_redzone)) >= ((options.min_redzone)) ((IsPowerOfTwo(options.min_redzone))) != (0) (((size == 0 && cache_size == 0) || cache_size != 0)) != (0) ((nearest_chunk)) <= ((p)) ((IsPowerOfTwo(rz_size))) != (0) ((old_ptr && new_size)) != (0) ((__interception::real_memcpy)) != ((nullptr)) %s: global '%s' at %s ERROR: AddressSanitizer: %s: %p %p Stack right redzone: Global redzone: ((IsPowerOfTwo(f->max_redzone))) != (0) WARNING: strlen interceptor is enabled even though replace_str=0. Use intercept_strlen=0 to disable it. Number of seconds to sleep between printing an error report and terminating the program. Useful for debugging purposes (e.g. when one needs to attach gdb). Print the legend for the shadow bytes. waitid pthread_attr_getschedpolicy lgetxattr _longjmp sS[ ((!h.created())) != (0) ((!h->remove_)) != (0) TIOCMBIC TIOCSTI CDROMREADAUDIO EVIOCGKEY SIOCSARP SNDCTL_COPR_RUN SOUND_MIXER_READ_IMIX ((AddrIsAlignedByGranularity(addr))) != (0) ((AddrIsInMem(addr))) != (0) stack-overflow reallocarray-overflow base-to-derived cast object has a possibly invalid vptr: abs(offset to top) too big ((IsPowerOfTwo(alignment))) != (0) ((class_id)) < ((kNumClasses)) ((IsAligned(res, page_size_))) != (0) PATH Write all sanitizer output to syslog in addition to other means of logging. Hard RSS limit in Mb. If non-zero, a background thread is spawned at startup which periodically reads RSS and aborts the process if the limit is reached Sancov tool location. If true, triggers warning when writable-executable pages requests are being made out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_mutex.cpp ((IsOneOf(*data_.current, '-', 'x'))) != (0) Attached to thread %zu. ((count)) < ((size)) :%s arm64 ((path_[0])) != (('\0')) WARNING: Can't read from symbolizer at fd %d --no-demangle atos Hint: PC is at a non-executable region. Maybe a wild jump? [1m [35m Root set: include global variables (.data and .bss) ((arg)) != (0) ERROR: LeakSanitizer: detected memory leaks invalid-null-argument object-size out/llvm-project/compiler-rt/lib/ubsan/ubsan_handlers.cpp pointer points here ((CallerPC)) != (0) out/llvm-project/compiler-rt/lib/ubsan/ubsan_value.h signed quarantine_size_mb %d, thread_local_quarantine_size_kb %d, max_redzone %d, poison_heap %d, malloc_context_size %d, alloc_dealloc_mismatch %d, allocator_may_return_null %d, coverage %d, coverage_dir %s, allocator_release_to_os_interval_ms %d %p is located %zd bytes to the right of %p is located %zd bytes inside of Partially addressable: WARNING: strchr* interceptors are enabled even though replace_str=0. Use intercept_strchr=0 to disable them. Maximal size (in bytes) of redzones around heap objects. If set, uses custom wrappers and replacements for libc string functions to find more errors. free_fill_byte If set, user may manually mark memory regions as poisoned or unpoisoned. vscanf pthread_sigmask sem_trywait recv getprotobynumber siglongjmp vfork ((h.exists())) != (0) TIOCMBIS SIOCSIFFLAGS CDROMREADMODE2 HDIO_GET_NOWERR HDIO_SET_KEEPSETTINGS SNDCTL_TMR_SOURCE SOUND_MIXER_WRITE_RECLEV out/llvm-project/compiler-rt/lib/asan/asan_linux.cpp Trying to poison memory region [%p, %p) || `[%p, %p]` || LowShadow || libunwind: malformed DW_CFA_offset_extended_sf DWARF unwind, reg too big getULEB128 malformed uleb128 expression DWARF opcode not implemented ((n)) < ((kMaxNumChunks)) SUMMARY: %s: %s DEFAULT Max number of stack frames kept for each allocation/deallocation. print_module_map help coverage If set, uses custom wrappers for strspn and strcspn function to find more errors. If set, uses a custom wrapper for the strtok function to find more errors. strict_memcmp ((size)) < (((1ULL << (up + 1)))) ((alive_threads_)) > ((0)) %s: RSS: %zdMb ((&__android_log_write)) != (0) ((prefix_to_code.size())) == ((dict_len1.size())) ((nullptr)) != ((thread_)) Debug logging FAKE STACK Omitting %zu more leak(s). ((leaks_[index].stack_trace_id)) != (0) enum returns-nonnull-attribute store to member call on cast to virtual base of division of %0 by -1 cannot be represented in type %1 shift exponent %0 is negative ((0 && "source location pointer is null!")) != (0) applying non-zero offset to non-null pointer %0 produced null pointer ((Val >= 0)) != (0) ((getType().isFloatTy())) != (0) ((options.min_redzone)) >= ((16)) ((count)) < ((kSize)) ((rz_size)) <= ((2048)) out/llvm-project/compiler-rt/lib/asan/asan_descriptions.cpp underflows Size (in Mb) of quarantine used to detect use-after-free errors. Lower value may reduce memory usage but increase the chance of false negatives. If set, prints some debugging information and does additional checks. max_free_fill_size Allows the users to work around the bug in Nvidia drivers prior to 295.*. If true, honor the container overflow annotations. See https://github.com/google/sanitizers/wiki/AddressSanitizerContainerOverflow windows_hook_rtl_allocators The following global variable is not properly aligned. memcmp bcmp gethostbyname_r mbsrtowcs lgamma process_vm_writev wcsdup strlcat ((h->type == CommonInterceptorMetadata::CIMT_FILE)) != (0) BLKGETSIZE EVIOCGLED EVIOCRMFF FDFMTTRK FDGETDRVSTAT FDGETDRVTYP SNDCTL_SEQ_TESTMIDI SOUND_MIXER_READ_LINE2 SOUND_MIXER_WRITE_LINE2 out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_allocator_dlsym.h default wild-addr ((second_free_stack->size)) > ((0)) SHADOW_GRANULARITY: %d Stats: malloc large: %zu ERROR: finishing a fiber switch that has not started ((tid())) == ((0)) ((AddrIsInStack((uptr)&local))) != (0) object has invalid vptr libunwind: malformed DW_CFA_val_expression DWARF unwind, reg too big WARNING: %s: LargeMmapAllocator allocation overflow: 0x%zx bytes with 0x%zx alignment requested SanitizerTool external_symbolizer_path Whether to remove the sanitizer from DYLD_INSERT_LIBRARIES to avoid passing it to children. Default is true. Enable memory leak detection. Failed to read options from '%s': error %d ((size)) != (0) DumpProcessMap End of process memory map. BUS out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stackdepotbase.h ((!info || address == info->address)) != (0) addr2line Using addr2line at user-specified path: %s 0x%zx 0x%zx unaccessible unwind_backtrace_signal_arch resolution Aggregate two objects into one leak if this many stack frames match. If zero, the entire stack trace must match. out/llvm-project/compiler-rt/lib/ubsan/ubsan_diag.cpp alignment-assumption [1m [30m bounds out/llvm-project/compiler-rt/lib/ubsan/../sanitizer_common/sanitizer_common.h %0 defined here out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_list.h ((this)) != ((l)) Quarantine limits: global: %zdMb; thread local: %zdKb initialization-order-fiasco out/llvm-project/compiler-rt/lib/asan/asan_errors.cpp %s-param-overlap Minimal size (in bytes) of redzones around heap objects. Requirement: redzone >= 16, is a power of two. replace_str Enables stack-use-after-return checking at run-time. protect_shadow_gap memmem ioctl posix_spawnp remquo __cxa_throw munlock TIOCCONS TIOCGPGRP SIOCSIFNETMASK FDGETPRM FDRESET MTIOCGET SIOCGIFENCAP SOUND_MIXER_READ_RECMASK SOUND_MIXER_WRITE_IGAIN SOUND_MIXER_WRITE_PCM SOUND_PCM_READ_CHANNELS ((size)) <= ((4096)) ((0 && "mem_is_zero returned false, but poisoned byte was not found")) != (0) quarantine_size_mb=%zuM AddressSanitizer exit stats: Create T%d TSDDtor ((this->stack_size())) == ((0U)) __asan_start_switch_fiber called from unknown thread DW_EH_PE_textrel pointer encoding not supported truncated uleb128 expression String to append to log file name, e.g. ".txt". stack_trace_format compress_stack_depot Override the program exit status if the tool found an error ((signum)) < ((sizeof(*set) * 8)) ((MprotectNoAccess((uptr)guard_start_, guard_size_))) != (0) ERROR: unknown pc 0x%zx (may happen if dlclose is used) %s: StackDepot compression thread started ((output)) != (0) <can't symbolize> :%d WARNING: Symbolizer buffer too small -fe WRITE %s can not provide additional info. Root set: include TLS and thread-specific storage %7zu %10zu %s Indirect [1m [34m implicit-signed-integer-truncation-or-sign-change function UBSAN_OPTIONS out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_quarantine.h heap operator delete [] ERROR: AddressSanitizer: calloc parameters overflow: count * size (%zd * %zd) cannot be represented in type size_t (thread %s) ERROR: AddressSanitizer: allocator is out of memory trying to allocate 0x%zx bytes heap-use-after-free Stack mid redzone: %s: thread_local_quarantine_size_kb can be set to 0 only when quarantine_size_mb is set to 0 quarantine_size If set, prints ASan exit stats even after program terminates successfully. start_deactivated ((AddrIsAlignedByGranularity(g->size_with_redzone))) != (0) memchr vfprintf ((ioctl_initialized)) != (0) getgrgid getsockopt sendmsg getcwd remquol getutid pclose uname WARNING: unexpected floating-point arg size in printf interceptor: %zu FIOSETOWN TIOCSPGRP EVIOCSREP FDMSGON PPPIOCSMAXCID SNDCTL_DSP_NONBLOCK SOUND_MIXER_READ_CAPS SOUND_MIXER_READ_IGAIN SOUND_MIXER_READ_PCM SOUND_MIXER_WRITE_TREBLE TIOCSERGWILD TIOCSERSWILD VT_RELDISP out/llvm-project/compiler-rt/lib/asan/asan_posix.cpp invalid-posix-memalign-alignment Sleeping for %d second(s) non-virtual call vtable is of type %0 libunwind: malformed DW_CFA_restore_extended DWARF unwind, reg too big getTableEntrySize ebp out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_allocator_primary32.h %s.%zu ((read_len)) < ((buff->size())) Mention name of executable when reporting error and append executable name to logs (as in "log_path.exe_name.pid"). Only affects a 64-bit allocator. If set, tries to release unused memory to the OS, but not more often than this interval (in milliseconds). Negative values mean do not attempt to release memory to the OS. symbolize_vs_style If true, the shadow is not allowed to use huge pages. ERROR: Invalid value for int option: '%s' WARNING: found %d unrecognized flag(s): ((0)) == ((internal_sigprocmask(2, set, old))) (("unable to unmap" && 0)) != (0) minimal_num_length < kMaxLen ((IsOneOf(*data_.current, 's', 'p'))) != (0) ((stack_bottom)) != (0) Waiting on the tracer thread failed (errno %d). Could not get regset %p from thread %d (errno %d). out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_coverage_libcdep_new.cpp ((nullptr)) == ((thread_)) <empty stack> -- %zu ) armv6 ((i)) < ((modules_.size())) -i invalid-builtin-use invalid-shift-exponent print_stacktrace silence_unsigned_overflow offset poison_heap ((((unsigned int)len) < sizeof(name))) != (0) is inside ERROR: AddressSanitizer: attempting free on address which was not malloc()-ed: %p in thread %s stack-use-after-scope poison_array_cookie allocator_frees_and_returns_null_on_realloc_zero === ID %d; %p %p strpbrk vfscanf wait tempnam lgammal getresgid fopen atoi ((!was_called_once)) != (0) mlock Duplicate or unsorted ioctl request id %x >= %x (%s vs %s) FIOASYNC TIOCGETD EVIOCGID FDSETMAXERRS SNDCTL_SEQ_RESETSAMPLES SOUND_MIXER_READ_RECLEV TCSBRK TCSBRKP ((frame_descr)) != (0) ABORTING double-free alloc-dealloc-mismatch out/llvm-project/compiler-rt/lib/asan/asan_stats.cpp Stats: %zuM really freed by %zu calls ((this)) == ((thread)) CIE ID is not zero out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_allocator.cpp If set, use the online symbolizer from common sanitizer runtime to turn virtual addresses to file/line locations. Write logs to "log_path.pid". The special values are "stdout" and "stderr". If unspecified, defaults to "stderr". Deprecated. True has no effect, use handle_sigbus=1. If false, handle_*=1 will be upgraded to handle_*=2. Intercept __tls_get_addr. Compress stack depot to save memory. If set, uses a wrapper for memmem() to find more errors. suppress_equal_pcs ((buffer[sizeof(buffer) - 1])) == (('\0')) ((n_flags_)) < ((kMaxFlags)) allocate noreserve FPE absolute_value || !negative AppendNumber buffer overflow out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_suppressions.cpp SANCOV_OPTIONS --inlines Cannot use internal symbolizer: out of memory Root set: include thread registers Registered root region at %p of size %zu Unregistered root region at %p of size %zu ((!param->success)) != (0) Scanning leaked chunks. %Lg nullptr-with-offset implicit-signed-integer-truncation unreachable-call ((isMemoryLocation())) != (0) _Nonnull binding to clz() addition of unsigned offset to %0 overflowed to %1 ((size)) >= ((sizeof(QuarantineBatch))) T%d ERROR: AddressSanitizer: pvalloc parameters overflow: size 0x%zx rounded up to system page size 0x%zx cannot be represented in type size_t (thread %s) ERROR: AddressSanitizer: invalid alignment requested in aligned_alloc: %zd, alignment must be a power of two and the requested size 0x%zx must be a multiple of alignment (thread %s) ERROR: AddressSanitizer: invalid alignment requested in posix_memalign: %zd, alignment must be a power of two and a multiple of sizeof(void*) == %zd (thread %s) stack-buffer-underflow ACCESS %s: please use either 'quarantine_size' (deprecated) or quarantine_size_mb, but not both malloc_fill_byte Number of seconds to sleep after AddressSanitizer is initialized. Useful for debugging purposes (e.g. when one needs to attach gdb). Report errors on malloc/delete, new/free, new/delete[], etc. strrchr asctime_r vsprintf cs[ BLKROSET CDROMVOLREAD EVIOCGABS EVIOCGRAB HDIO_GET_MULTCOUNT PPPIOCSDEBUG SIOCADDRT SIOCSIFHWADDR SNDCTL_FM_4OP_ENABLE SNDCTL_SEQ_NRMIDIS TCGETS VT_GETSTATE VT_SENDSIG [1m [36m || `[%p, %p]` || MidMem || asan_mapping.h:%zd -- %zd out/llvm-project/compiler-rt/lib/asan/asan_thread.cpp ((t->context())) == ((AsanTSDGet())) control flow integrity check for type %0 failed during %1 (vtable address %2) unsupported x86 register libunwind: malformed DW_CFA_def_cfa_register DWARF unwind, reg too big Can't binary search on variable length encoded data. SizeClassAllocator ((x)) != ((0U)) ((!empty())) != (0) FATAL: %s: internal allocator is out of memory trying to allocate 0x%zx bytes out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_common.cpp %s %s.%s.%zu log_suffix Experimental heap profiler, asan-only If set, uses custom wrappers for strlen and strnlen functions to find more errors. exitcode ((count)) <= ((arr_size - 1)) Process memory map follows: %p-%p %s (((getNumBuckets() & (getNumBuckets() - 1)))) == ((0)) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_common_libcdep.cpp ((to >= from)) != (0) Could not attach to thread %zu (errno %d). ((max_depth)) >= ((2)) out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace_libcdep.cpp Unsupported specifier in stack frame format: %c (%p)! armv7 --demangle ((outfd)) != (0) Consider pointers found in poisoned memory to be valid. Stack at %p-%p (SP = %p). : integer-divide-by-zero alignment implicit-signed-integer-truncation,implicit-integer-sign-change constructor call on ((0 && "unexpected error type!")) != (0) assumption of %0 byte alignment (with offset of %1 byte) for pointer of type %2 failed load of value %0, which is not a valid value for type %1 implicit conversion from type %0 of value %1 (%2-bit, %3signed) to type %4 changed the value to %5 (%6-bit, %7signed) un ((getType().isSignedIntegerTy())) != (0) ' stack-use-after-return Heap left redzone: Array cookie: ((f->min_uar_stack_size_log)) <= ((f->max_uar_stack_size_log)) unmap_shadow_on_exit Check position of ASan runtime in library list (needs to be disabled when other library has to be preloaded system-wide) strncasecmp strchr recvmsg ptsname_r lgamma_r out/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors_format.inc SIOCGIFBRDADDR SIOCSIFADDR EVIOCGNAME FDFMTEND PPPIOCSXASYNCMAP SOUND_MIXER_READ_TREBLE TCXONC ((tsd_key_inited)) != (0) AppendToErrorMessageBuffer ((!asan_init_is_running && "ASan init calls itself!")) != (0) Stats: %zuM malloced (%zuM for red zones) by %zu calls getRegister DW_EH_PE_datarel is invalid with a datarelBase of 0 unknown register out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_allocator_secondary.h %s Strips this prefix from file paths in error reports. handle_ioctl Controls custom tool's SIGABRT handler (0 - do not registers the handler, 1 - register the handler and allow user to set own, 2 - registers the handler and block user from changing it). Print demangled symbols. Format string used to render stack frames. See sanitizer_stacktrace_printer.h for the format description. Use DEFAULT to get default format. Generate html coverage report. If true, dump values of CPU registers when SEGV happens. Only available on OS X for now. 0x%zx /proc/self/environ UNKNOWN SIGNAL DenseMap ((header->size)) <= ((kBlockSizeBytes)) ((trace.tag)) == ((static_cast<uptr>(tag))) WARNING: Command buffer too small WARNING: Failed to use and restart external symbolizer! out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_posix_libcdep.cpp ((__sanitizer_symbolize_set_inline_frames( common_flags()->symbolize_inline_frames))) != (0) swift_demangle ----------------------------------------------------- pointer-overflow nullability-assign nonnull-attribute downcast of null pointer returned from function declared to never return null ((stack)) != (0) ((IsAligned(needed_size, min_alignment))) != (0) ((rz_size)) == ((RZLog2Size(res))) thread_local_quarantine_size_kb ((res.trace)) != (0) ((free_stack->size)) > ((0)) ERROR: AddressSanitizer: attempting to call malloc_usable_size() for pointer which is not owned: %p container-overflow Freed heap region: Use mmap with 'noreserve' flag to allocate fake stack. If set, mprotect the shadow gap Print various statistics after printing an error message or if atexit=1. print_legend Print the scariness score. Experimental. atexit new_delete_type_mismatch If >= 2, detect operations like <, <=, >, >= and - on invalid pointer pairs (e.g. when pointers belong to different objects); If == 1, detect invalid operations only when both pointers are non-null. '%s' is ascii string '%s' resides in another non-instrumented module. fgets ctime_r clock_getcpuclockid opendir strtoumax fclose wcscat wcsxfrm_l strcpy mlockall TIOCOUTQ TIOCSCTTY EVIOCGEFFECTS EVIOCGKEYCODE FDSETEMSGTRESH SIOCGRARP SIOCSRARP SNDCTL_SEQ_NRSYNTHS TIOCGLCKTRMIOS TIOCSERGETLSR sigaction ((0)) == ((pthread_setspecific(tsd_key, tsd))) negative-size-param ((AddrIsInMem(stack_top_ - 1))) != (0) possibly invalid vptr libunwind: malformed DW_CFA_offset DWARF unwind, reg (%llu) out of range DW_OP_piece not implemented ` h p x "@ ( 0 8 , , @ H P X U " "@ R R R R R R R 5 w X X X X X X X X w w X X w X X X X X X X X X X X X X X X X X X w X X X X X X X X X X X w X X X X X X X X X X X X X w PPid: h mm mm mm mm mm mm mm mm mm mm .k \k mm mm mm mm mm mm mm mm mm mm mm wk mm mm h mm h mm mm h 0C ? 2 # ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' $ ' ' ' ' ' $ $ ' ' ' ' ' ]% ' ' ' ' ' ' ' ' ' ' ' ' ' ' % # ' ' % ' ' ' ' ' L& a& q& & & & ' & ) {) 5) =) E) M) U) ]) e) m) u) #%n %p %F %L D D D D D D D D D D D ?? ??:0 llvm-symbolizer :DEADLYSIGNAL : nested bug in the same thread, aborting. stack-overflow leak:*tls_get_addr* leak ld $ / G ( ^ vptr_check X X X X X X X X X X X X X X X X X X X X X X X X X X X X H H X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X P P X I o X V p b b b b b b b b b b b b b b Z b b b b b b b b b b b b b b J J b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b p p p b R j J R p p b J R Z " 2 B R b r " 2 B R ) : K \ u . G ` ! 8! Q! b! s! }! ! ! ! ! ! ! " &" 7" P" i" " " " interceptor_name interceptor_via_fun interceptor_via_lib odr_violation J Z b j 0 < u @ E J O T Y @ ^ c h ` e j ` H & , 2 8 > D 5 \ u 4 j E j j 8 = - B & U ) \ c j & q x  / E ` / : i / : ) ' : / A x " Q Q \ b n Q Q z z n t # 0 ? N ] X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X h h h h h h h h h h h h h h h h h h h h h h h h h h h h h h h h G S S O O O O
Ac y C : ` H @ $ D , X 4 P T t ( RT QT !T PT 1 2 ! " T T $T T T T T T T "T T T T T #T T T T @E E E E E E E E E E @ E E E E E E @ E @ E,@ E @ E @a ` c b ^ ] _ S S S S S S S S S S S S S S S S S S S S S S A C @K G I H @ X 4 F E 4 X T X@J L @B @Y V $ & # ! % " m Xt At Zt Vt Pt Wt @@t @Yt @Qt @Rt @Ot @ S ` T % ' p ) a U & $ q 0 b C C C C C C C C C @ C @ P P P P P P T T T %T T T T T VT T T T ST YT TT UT WT T V V V V V m m @ P P P P P P P P P P P Q @ Q(@ Qt m Q Q Q Q Q Q @ Q Q @ Q Q @ Q Q @ Q @ Q Q T @ T @ T T T M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M V V V V V V  p o o o o f f 4 n f z U ! \ e f $ E 1" 3 < L < 8 p E I  :< C< 0g ,p ,p ;" R< A]
Android (8490178, based on r450784d) clang version 14.0.6 (https://android.googlesource.com/toolchain/llvm-project 4c603efb0cca074e9238af8b4106c30add4418f6) Android (7714059, based on r416183c1) clang version 12.0.8 (https://android.googlesource.com/toolchain/llvm-project c935d99d7cf2016289302412d708641d52d2f7ee) Linker: LLD 14.0.6
Android (8490178, based on r450784d) clang version 14.0.6 (https://android.googlesource.com/toolchain/llvm-project 4c603efb0cca074e9238af8b4106c30add4418f6) dlsym GenericScopedLock RawInternalAlloc atomic_store<__sanitizer::atomic_uintptr_t> RoundUpMapSize GetBlockBegin UpdateProcessName mask removeEdgesFrom RegisterFlag<unsigned int> FormatString internal_memcmp internal_ftruncate ThreadLister ReportMmapFailureAndDie GetType MmapNoReserveOrDie MmapFixedImpl out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_printf.cpp SleepForMillis MmapFixedNoReserve MmapFixedNoAccess ScopedAllocatorErrorReport InsertIntoBucket<__sanitizer::detail::DenseMapPair<unsigned int, unsigned int> > Store GetOrUnpack LzwDecode<unsigned int, __sanitizer::SLeb128Decoder, unsigned int *> ExtractUptr StackDepotPut ChooseChunk QuarantineCallback SetAllocContext ReportCallocOverflow GetAsanChunkByAddrFastLocked UpdateAllocationStack RePoisonChunk EnsureSortedChunks Allocation GetFakeStackFast OnMalloc __asan_stack_malloc_5 __asan_stack_malloc_always_5 __asan_stack_free_5 internal_uname AddrHashMap __interceptor_memmem __interceptor_asctime_r __interceptor_recvmmsg __interceptor_pthread_attr_getscope __interceptor_wcsncat __sanitizer_syscall_pre_impl_symlinkat __interceptor_aligned_alloc __asan_address_is_poisoned __asan_unpoison_stack_memory ErrorAllocTypeMismatch ReportMacMzReallocUnknown GetThreadLocked SetThreadStackAndTls out/llvm-project/compiler-rt/lib/ubsan/ubsan_type_hash_itanium.cpp Reallocate ReadLongProcessName internal_memmove DD indexToNode findEdge is_space ll_strndup parse_flags atomic_compare_exchange_weak<__sanitizer::atomic_uint64_t> internal_fstat internal_close GetHandleSignalMode DumpListOfModules SetThreadUserId allocateBuckets PlatformPrepareForSandboxing SetShadowRegionHugePageMode out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_chained_origin_depot.cpp Stored IdToOffset StripPathPrefix ParseSymbolizeFrameOutput GetLinker GetThreadRegistryLocked CheckForLeaksCallback isFloatTy ~ScopedReport AtomicContextStore ReportAllocationSizeTooBig requested_size __asan_update_allocation_context PrintGlobalLocation GetFrame RequiredSize __asan_stack_malloc_0 __asan_stack_free_8 write_mntent __interceptor_strlen __interceptor_strchr __interceptor___wait4 __interceptor_strerror __sanitizer_syscall_pre_impl_delete_module __sanitizer_syscall_pre_impl_lsetxattr __sanitizer_syscall_pre_impl_access __sanitizer_syscall_pre_impl_sysctl __interceptor_calloc PoisonShadowPartialRightRedzone __asan_unpoison_memory_region ReportInvalidPointerPair AsanCheckDynamicRTPrereqs AsanInitializer AsanDie ProtectGap __sanitizer_finish_switch_fiber IsAligned push_front internal_memcpy AllocateBatch getAndClearFirstOne CreateLogicalThread DirExists __sanitizer_get_report_path atomic_load<__sanitizer::atomic_uintptr_t> internal_mmap length TranslateDigit IsHex incrementNumTombstones __cxx_global_var_init procmapsInit ScopedSetTracerPID MprotectNoAccess SanitizerDumpCoverage WriteModuleCoverage Default inc_use_count_unsafe out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer.cpp full_name SymbolizeFrame DemangleSwiftAndCXX ReportStackOverflowImpl ReportDeadlySignalImpl MemoryByte out/llvm-project/compiler-rt/lib/lsan/lsan_common.cpp Leak ClassifyAllChunks ProcessGlobalRegions CheckForLeaks PrintSummary IgnoredSuppressedCb InitializePlatformEarly getSourceLocation AddrIsAtLeft GetAllocatorCache GetMallocContextSize Log2 ReportSanitizerGetAllocatedSizeNotOwned UserRequestedAlignment Enqueue AsShadow out/llvm-project/compiler-rt/lib/asan/asan_flags.cpp __asan_register_globals scanf_parse_next __interceptor_vfscanf unpoison_passwd read_msghdr __interceptor_sendmmsg __interceptor_mbsrtowcs __interceptor_sem_getvalue __interceptor_sem_unlink write_protoent __sanitizer_syscall_pre_impl_lgetxattr __sanitizer_syscall_pre_impl_io_submit __sanitizer_syscall_pre_impl_swapoff __sanitizer_syscall_pre_impl_getrandom MemToShadowSize Callocate ErrorReallocArrayOverflow IsInvalidPointerPair ErrorInvalidPointerPair __asan_describe_address CheckASLR InitializeAllocator UnpoisonDefaultStack DeleteFakeStack getSubobjectTypeName isDerivedFromAtOffset atomic_exchange<__sanitizer::atomic_uint8_t> Lock CacheBinaryName InstallMallocFreeHooks ReadBinaryDir MutexEnsureID addLock internal_strlcat internal_atoll IsPcInstrumented MemoryMappedSegment out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_procmaps_common.cpp InsertIntoBucket<const unsigned int &, unsigned int &> __sanitizer_set_death_callback pthread_attr_getstack IsProcessRunning KillAllThreads SignalContext TracePcGuard hash GetOrCreate LockAndStop ExtractSptr SupportsColoredOutput ReportSupportsColors Warning UnsuppressedLeakCount __lsan_unregister_root_region UnlockThreadRegistry IsPCSuppressed InitializeFlags InitAsPlugin handleTypeMismatchImpl out/llvm-project/compiler-rt/lib/ubsan/ubsan_value.cpp GetOptions AtomicallySetQuarantineFlagIfAllocated FreeTid asan_calloc __asan_stack_malloc_always_10 ioctl_lookup ioctl_table_lookup FixRealStrtolEndptr StrstrCheck __interceptor_puts __interceptor_pthread_attr_getdetachstate __interceptor_sincosl __interceptor_listxattr __interceptor_wcslen __sanitizer_syscall_pre_impl_sched_setaffinity __asan_poison_memory_region IsValid context ScopedInErrorReport MergeFrom FillMallocStatistics __sanitizer_get_heap_size __sanitizer_get_free_bytes MergeThreadStats AsanTSDGet stack_size operator delete handleFunctionTypeMismatch Unlock InternalAllocatorUnlock onLockAfter next removeNode findPath SetReportPath operator new out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_libignore.cpp OnLibraryLoaded internal_stat GetKernelAreaSize internal_sched_yield ParseDecimal Suppression setNumTombstones MremapCreateAlias real_pthread_attr_getstack Bottom ~ScopedErrorReportLock StackTraceHeader get PlatformInit SuppressInvalid ApplySuppressions IgnoreObjectLocked ScanRootRegion ProcessPlatformSpecificAllocations ScopedStopTheWorldLock MaybePrintStackTrace InitializeCoverage handleInvalidObjCCast handlePointerOverflowImpl GetAsanChunkByAddr ReportInvalidFree OverheadSize FindHeapChunkByAddress asan_memalign asan_mz_force_unlock GetStackTraceFromId get_or_create_fake_stack __asan_stack_malloc_always_3 OnExit PosixSpawnImpl<int (int *, const char *, const void *, const void *, char *const *, char *const *)> __interceptor_poll __interceptor_pthread_attr_getschedparam __interceptor_tmpnam __interceptor_fopen __interceptor_sem_open __interceptor_readlink __sanitizer_syscall_pre_impl_symlink __sanitizer_syscall_pre_impl_lchown __sanitizer_syscall_pre_impl_epoll_pwait __sanitizer_syscall_pre_impl_readlinkat Use __interceptor_posix_memalign PoisonAlignedStackMemory ErrorMallocUsableSizeNotOwned ErrorOutOfMemory ~ScopedUnwinding GetStackVariableShadowStart HandleDynamicTypeCacheMiss ComputeRegionId SetRssLimitExceeded removeEdgesTo setAll getNumLocks copyFrom MutexDestroy CheckLocked FileExists Format IsInRange GetHandleSignalModeImpl GetArgsAndEnv FutexWake IntervalsAreSeparate LoadFromCache SetCreated SetUserDieCallback BackgroudThreadStarted out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_allocator_checks.cpp pthread_self internal_mremap getlim combineHashValue Run ParseSymbolizeDataOutput HandleDeadlySignal ~CheckForLeaksParam Decorator handleShiftOutOfBoundsImpl handleMissingReturnImpl isInlineFloat append_back SizeSub RangesOverlap ioctl_common_pre HasReportedLeaks __interceptor_strcasecmp __interceptor_fwrite __interceptor_fprintf __interceptor_getnameinfo __interceptor_wcstombs __interceptor_initgroups __interceptor_recv __interceptor_getgrouplist __sanitizer_syscall_pre_impl_write __sanitizer_syscall_pre_impl_utimensat format_get_value_size __asan_poison_stack_memory CheckForInvalidPointerPair InitializePlatformExceptionHandlers AsanTSDInit CreateMainThread AsanTSDSet FinishSwitchFiber DynamicTypeInfo AllocationSizeRequiredForNElements MaxCachedHint push_back Refill reserve ReadFromFile atomic_load_relaxed<__sanitizer::atomic_uint64_t> internal_sigfillset out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_posix.cpp LoadedModule ParseHex erase SetThreadNameByUserId try_emplace<const unsigned int &> Trap __sanitizer_dump_coverage SanitizerCommonDecorator contains GetCanonicFrame UnwindFast ProcessAddressFrames __sanitizer_symbolize_global arch New SymbolizerProcess MaybeReportNonExecRegion ReportDeadlySignal HandleLeaks ~LeakReport out/llvm-project/compiler-rt/lib/lsan/lsan_common_linux.cpp Range GetSize AsanChunkView AllocationSize IsAllocated GetStackAddressInformation __asan_stack_malloc_1 __asan_stack_malloc_3 __asan_stack_free_6 HaveStackTraceBasedSuppressions ReportStringFunctionMemoryRangesOverlap MlockIsUnsupported MemcmpInterceptorCommon __interceptor_ioctl __interceptor_clock_getcpuclockid __interceptor_pthread_getcpuclockid __interceptor_waitpid __interceptor_sysinfo __interceptor_getcwd __interceptor_lgamma_r __interceptor_fclose __asan_memcpy Insert MemoryProfileCB ProcessChunk __sanitizer_contiguous_container_find_bad_address PrintCmdline get_fake_stack operator delete[] ~GenericScopedLock Size Min<unsigned int> InternalAllocatorLock StripModuleName ReportErrorSummary nodeToIndex newNode FlagHandlerInclude RegisterFlag<bool> Verbosity mem_is_zero AndroidDetectApiLevel internal_read atomic_compare_exchange_weak<__sanitizer::atomic_uint32_t> Write StripPrefix allocate_buffer MaybeStartBackgroudThread ScopedStackSpaceWithGuard internal_clone SuspendAllThreads ScopedErrorReportLock Alloc NewWorkNotify PrintAll uuid_size out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_libcdep.cpp Restart LLVMSymbolizer PlatformDemangle SupportsColors LeakSuppressionContext Swap<__lsan::Leak> InternalLowerBound<__sanitizer::InternalMmapVector<unsigned long long>, unsigned long long, __sanitizer::CompareLess<unsigned long long> > getTypeName SetCommonFlagsDefaults isInlineInt ReportNewDeleteTypeMismatch IsRssLimitExceeded asan_malloc_usable_size AddressDescription PrintGlobalNameIfASCII DescribeAddressIfStack GetDescription ErrorGeneric FlagsOffset __asan_stack_malloc_6 __asan_stack_free_9 maybe_parse_length_modifier __interceptor_vsscanf printf_parse_next GetInterceptorMetadata Handle __interceptor_frexpf printf_common __interceptor_clock_settime __interceptor_ftime __interceptor_wcsdup __interceptor_setvbuf __sanitizer_syscall_pre_impl_setxattr FindDynamicShadowStart out/llvm-project/compiler-rt/lib/asan/asan_rtl.cpp TSDDtor out/llvm-project/compiler-rt/lib/ubsan/ubsan_handlers_cxx.cpp out/llvm-project/compiler-rt/lib/ubsan/ubsan_type_hash.cpp ForceLock Count CreateBatch PopulateFreeList findShortestPath findPathToLock internal_getpid GetProcessName out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_flags.cpp atomic_compare_exchange_strong<__sanitizer::atomic_uint32_t> MemoryRangeIsAvailable AddAddressRanges ParseUnixMemoryProfile CheckWriteLocked WriteOneLineToSyslog openlog CreateAliases AddressSpaceIsUnlimited TracerThread InitializeSancovFlags __sanitizer_cov_trace_pc_guard atomic_load_relaxed<__sanitizer::atomic_uint32_t> try_emplace<unsigned int> is_valid ParseSymbolizePCOutput InitializePlatformSpecificModules PrintMemorySnippet Diag atomic_store<__sanitizer::atomic_uint16_t> PrintStats ReportMallocUsableSizeNotOwned out/llvm-project/compiler-rt/lib/asan/asan_activation.cpp FindInfoForStackVar DescribeThread PrintShadowMemoryForAddress AddrIsAlignedByGranularity __interceptor_getgrnam __interceptor_getsockname __interceptor_munlockall __interceptor_strxfrm __interceptor_uname __sanitizer_syscall_pre_impl_add_key Sort<__asan::AllocationSite, (lambda at out/llvm-project/compiler-rt/lib/asan/asan_memory_profile.cpp:52:10)> ~ScopedInErrorReport CheckUnwind __sanitizer_get_current_allocated_bytes AsanThreadContext GetPthreadDestructorIterations ThreadStart MostSignificantSetBitIndex EnsureSpace MaxCached internal_strdup LeastSignificantSetBitIndex getAvailableNode ParseStringFromEnv ReserveStandardFds fallbackInit out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_posix_libcdep.cpp SetStackSizeLimitInBytes TracerThreadDieCallback out/llvm-project/compiler-rt/lib/sanitizer_common/sancov_flags.cpp GetBlockIdx IsPacked ModuleNameOwner Symbolizer ExtractToken LLVMSymbolizerProcess GetCacheSize RZLog2Size SizeAdd can_merge asan_mz_size DescribeAddressIfGlobal ToLower ReadUnlock __interceptor_time __interceptor_localtime_r __interceptor_asctime __interceptor_waitid __interceptor_setlocale __interceptor_ether_aton __interceptor_pthread_condattr_getpshared __interceptor___wcsxfrm_l __sanitizer_syscall_pre_impl_link __sanitizer_syscall_pre_impl_chdir __sanitizer_syscall_pre_impl_ppoll Min<signed char> __asan_get_report_address Init ForceUnlock UnmapOrDie containsAddress DecreaseTotalMmap ReadBinaryNameCached ensureCurrentEpoch ReopenIfNecessary internal_strnlen Min<unsigned long long> internal_iserror ReadNullSepFileToArray RemoveANSIEscapeSequencesFromString incrementNumEntries TracerThreadArgument CovPcsInit TestOnlyUnmap StackDepotStopBackgroundThread IsValidFrame Flush FormatAndSendCommand LazyInit GetSuppressionForAddr LockStuffAndStopTheWorld PrintLeakedObjectsForLeak RegisterLsanFlags ~UndefinedBehaviorReport RenderLocation Highlight RenderSourceLocation isDisabled handleImplicitConversion isSourceLocation out/llvm-project/compiler-rt/lib/asan/asan_allocator.cpp AtomicContextLoad GetAllocContext SwallowCache SetFreeContext asan_reallocarray SetShadow __asan_stack_malloc_7 __asan_addr_is_in_fake_stack __asan_unregister_globals ScopedInterceptorDisabler __interceptor_strncmp __interceptor_memcpy __interceptor_pwrite __interceptor_localtime scanf_common __interceptor_sscanf __interceptor_vsprintf __interceptor_printf __interceptor_wait3 __interceptor_pthread_rwlockattr_getpshared __interceptor_getxattr __sanitizer_syscall_pre_impl_io_getevents release ErrorDoubleFree ErrorInvalidPosixMemalignAlignment operator new[] InitLinkerInitialized Die GetHeader ~InternalScopedString atomic_fetch_add<__sanitizer::atomic_uintptr_t> Swap<__sanitizer::DeadlockDetector<__sanitizer::TwoLevelBitVector<1U, __sanitizer::BasicBitVector<unsigned int> > >::Edge> onLockFast intersectsWith isHeld ReportDeadlock operator[] internal_strlcpy LibIgnore SetSigProcMask InitPcSpBp Match decrementNumEntries FindThread pthread_attr_setstacksize operator() ReleaseMemoryPagesToOS internal_sigaction_norestorer __sanitizer_cov_pcs_init PrintHintAllocatorCannotReturnNull OffsetToId CompressStackStore RenderNeedsSymbolization MaybeBuildIdToBuffer FillModuleInfo SendCommandImpl GetModuleNameAndOffsetForPC SubstituteForFlagValue Unwind_GetIP InitializeSuppressions IndirectUnsuppressedLeakCount addNoOverflow OverrideCommonFlags atomic_exchange<__sanitizer::atomic_uint32_t> SourceLocation ReportReallocArrayOverflow ReportPvallocOverflow QuarantineCache EnqueueBatch merge QuarantineChunk GetThreadContextByTidLocked __asan_stack_malloc_always_7 RegisterAsanFlags exists __interceptor_strpbrk __interceptor_mlockall __interceptor_mincore __interceptor_eventfd_read __sanitizer_syscall_pre_impl_capget __sanitizer_syscall_pre_impl_truncate __sanitizer_syscall_pre_impl_fchmodat __sanitizer_syscall_pre_impl_sigaction __interceptor_strdup __interceptor_atoll out/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp SetAbortMessage ErrorSanitizerGetAllocatedSizeNotOwned ErrorStringFunctionSizeOverflow PlatformUnpoisonStacks UnwindImpl UnsetAlternateSignalStack SetAlternateSignalStack tls_end getTypeCacheHashTableBucket InternalRealloc Clear hasEdge isReachable removeLock CloseFile internal_strcspn ListOfModules ScopedBlockSignals IsDecimal InsertIntoBucketImpl<unsigned int> StopStackDepotBackgroundThread InitAligned MmapNoAccess AddDieCallback TracerThreadSignalHandler Red Get operator== RenderFrame CopyStringToBuffer SymbolizedStack RefreshModules FindModuleForAddress DemangleCXXABI pipe Addr2LinePool Addr2LineProcess EnsureMainThreadIDIsCorrect ReportUnsuspendedThreads ProcessThreads ForEachExtraStackRange GetUserBegin PrintResults isSignedIntegerTy isMinusOne looksLikeFloatCastOverflowDataV1 UsedSize atomic_compare_exchange_strong<__sanitizer::atomic_uint8_t> atomic_store<__sanitizer::atomic_uint64_t> ReportDoubleFree ComputeRZLog AddrIsInMem Calloc extract DrainAndRecycle AddrIsInHighShadow PrintShadowBytes PrintLegend GetFakeStack AddressIsPoisoned char_is_one_of __interceptor_vfprintf __interceptor_memchr write_iovec __interceptor_gmtime_r __interceptor_vasprintf write_hostent __interceptor_gethostbyname_r __interceptor_mbstowcs __interceptor_flistxattr __interceptor_pthread_setcanceltype __interceptor_setbuffer __sanitizer_syscall_pre_impl_recvmsg __sanitizer_syscall_pre_impl_newstat __sanitizer_syscall_pre_impl_lstat64 __sanitizer_syscall_pre_impl_removexattr __sanitizer_syscall_pre_impl_fchownat __sanitizer_unaligned_load64 ErrorNewDeleteTypeMismatch ErrorInvalidAlignedAllocAlignment ErrorBadParamsToAnnotateContiguousContainer out/llvm-project/compiler-rt/lib/asan/asan_suppressions.cpp set_context DTLS_Destroy StartSwitchFiber IsVptrCheckSuppressed out/llvm-project/compiler-rt/lib/interception/interception_linux.cpp GetFuncAddr InterceptFunction PointerIsMine Realloc ReadBinaryName RegisterFlag<int> IsDigit internal_open real_pthread_create ListThreads ParseNumber ReadProcMaps SetThreadName DetachThread pthread_attr_destroy GetMmapGranularity MaybeInstallSigaction out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cpp __sanitizer_dump_trace_pc_guard_coverage out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stack_store.cpp UncompressDelta InsertIntoBucketImpl<__sanitizer::detail::DenseMapPair<unsigned int, unsigned int> > internal_join_thread MonotonicNanoTime out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace.cpp StackTraceTextPrinter AddressInfo InternalSymbolizer atomic_store_relaxed<__sanitizer::atomic_uintptr_t> ProcessRootRegions getText handleNonNullArg UndefinedBehaviorReport GetAsanChunk CommitBack SetUsedSize AddrIsInHighMem AddrIsInShadowGap CheckOptions SetCanPoisonMemory AsanDeactivate AsanActivate GetGlobalAddressInformation GetShadowAddressInformation __asan_stack_free_1 ReportStringFunctionSizeOverflow CharCaseCmp printf_get_value_size read_msghdr_control InitializePlatformInterceptors __interceptor_frexp __interceptor_frexpl __interceptor_accept __interceptor_sigprocmask __interceptor_ptsname_r __interceptor_sem_timedwait __sanitizer_syscall_pre_impl_futimesat __interceptor_strcat out/llvm-project/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cpp out/llvm-project/compiler-rt/lib/asan/asan_poisoning.cpp out/llvm-project/compiler-rt/lib/asan/asan_report.cpp out/llvm-project/compiler-rt/lib/asan/asan_shadow_setup.cpp ScopedUnwinding ClearShadowForThreadStackAndTLS AddRange checkDynamicType atomic_store<__sanitizer::atomic_uint8_t> RoundUpTo CheckFailed clearBit out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_file.cpp size run_handler stat64_to_stat LockSlow SuppressionAt LookupBucketFor<unsigned int> getrlimit pthread_attr_init ShouldLogAfterPrintf internal_dup2 RegisterSancovFlags MemoryUsage LockAll Unmap Pack get_handle ExtendDedupToken IsAllocatorOutOfMemory CheckForLeaksParam Suppress GetThreadRangesLocked PrintReportForLeak IsLinker LockAllocator LockStuffAndStopTheWorldCallback getMemoryLocation ~SymbolizedStackHolder CommonStandaloneInit GetFlag Value handleBuiltinUnreachableImpl handleInvalidBuiltin AddrIsAtRight ReportFreeNotMalloced CheckForPvallocOverflow AllocTid FindHeapChunkByAllocBeg asan_malloc asan_valloc stack_size_log SizeRequiredForFrames NumberOfFrames __asan_stack_malloc_always_8 ReserveShadowMemoryRange GlobalFilename CheckODRViolationViaPoisoning parse_number maybe_parse_number __interceptor_fputs __interceptor_lgetxattr __interceptor_strlcat __sanitizer_syscall_pre_impl_read __sanitizer_syscall_pre_impl_uselib __sanitizer_syscall_pre_impl_mkdirat __interceptor_reallocarray ShadowSegmentEndpoint ReplaceSystemMalloc AsanStats GetStackBounds GetStackFrameAccessByAddr asan_delete getVtablePrefix atomic_store_relaxed<__sanitizer::atomic_uint8_t> GetSizeClassInfo InternalMmapVector clear OpenFile Parse FindFile GetPathAssumingFileIsRelativeToExec out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_tls_get_addr.cpp setNumEntries SetFinished SetStarted getBuckets out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_linux_libcdep.cpp Sort<unsigned int, __sanitizer::CompareLess<unsigned int> > Atexit GetOrInit Demangle pop_back AddArg Note ConvertTypeToFlagName ignoreReport ComputeUserAlignment DoRecycle Access GC __asan_stack_malloc_always_2 ~ScopedInterceptorDisabler internal_wcslen __interceptor_strcmp __interceptor_strerror_r __interceptor_sigwait __interceptor__exit __interceptor_getmntent __interceptor_pthread_mutexattr_gettype __interceptor_remquof __interceptor_pthread_setcancelstate __interceptor_getnetbyname __sanitizer_syscall_pre_impl_lstat __sanitizer_syscall_pre_impl_getxattr __sanitizer_syscall_pre_impl_listxattr __sanitizer_syscall_pre_impl_epoll_pwait2 __sanitizer_unaligned_load32 __sanitizer_unaligned_store32 InitTlsSize AsyncSignalSafeLazyInitFakeStack isValid __ubsan_handle_cfi_bad_type out/lib/compiler-rt-i386 SetAllocatorOutOfMemory pop_front internal_strlen IncreaseTotalMmap setDifference FindPathToBinary ~ThreadLister FutexWait out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_procmaps_linux.cpp GetDestroyed decrementNumTombstones deallocate_buffer RunCallbackForEachThreadLocked SleepForSeconds internal_fork sysconf MmapFixedSuperNoReserve StartSubprocess sched_yield UnlockAll operator* DenseMapPair<unsigned int *, unsigned int *> try_emplace<int> SymbolizeData Magenta GetModuleNameForPc Swap<unsigned long long> UnlockAllocator getObjCClassName handleIntegerOverflowImpl<__ubsan::Value> ComputeUserRequestedAlignmentLog RunMallocHooks ReportInvalidAlignedAllocAlignment GetBlockBeginFastLocked FastPoisonShadowPartialRightRedzone asan_mz_force_lock RegisterActivationFlags BytesInSizeClass ModuloNumberOfFrames CharCmpX format_get_char_size EnableInThisThread __interceptor_mktime __interceptor_clock_gettime __interceptor_inet_aton __interceptor_ether_ntoa __interceptor_remquol __interceptor_strxfrm_l __interceptor_getnetbyaddr __sanitizer_syscall_pre_impl_capset __sanitizer_syscall_pre_impl_fsetxattr __sanitizer_syscall_pre_impl_chmod __sanitizer_syscall_pre_impl_open UseImpl __asan_region_is_poisoned MaybeReexec internal_memset CheckForCallocOverflow AllocateRegion internal_allocator Destroy SpinMutex Printf RecursiveCreateParentDirs Semaphore ~ScopedBlockSignals out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_platform_limits_posix.cpp SetName ContainsTid ThreadSuspender StopTheWorld GetRegistersAndSP InitTracePcGuard GetInBlockIdx out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stackdepot.cpp StackDepotPut_WithHandle LocatePcInTrace out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace_printer.cpp ChooseExternalSymbolizer AddLeakedChunks ReportTopLeaks __lsan_ignore_object Black InitAsStandaloneIfNecessary operator<< handleVLABoundNotPositive handleFloatCastOverflow getSIntValue getUIntValue Beg AsanInitFromRtl IsItaniumABIArrayCookie RZSize2Log __asan_locate_address GetShadowKind GetGlobalsForAddress AddrIsInFakeStack SavedFlagPtr __asan_stack_malloc_always_4 __asan_stack_free_7 IsODRViolationSuppressed StopInitOrderChecking QuickCheckForUnpoisonedRegion scanf_get_value_size RealStrLen __interceptor_fread unpoison_tm __interceptor_modfl __interceptor_fdopen __sanitizer_syscall_pre_impl_clock_nanosleep __sanitizer_syscall_pre_impl_semtimedop __sanitizer_syscall_pre_impl_move_pages __sanitizer_syscall_pre_impl_linkat __interceptor_pthread_create InitializeAsanInterceptors CanUnwind __sanitizer_print_stack_trace GetAsanThreadContext Max<unsigned int> empty GetUser ReportInternalAllocatorOutOfMemory hasAllEdges RoundDownTo internal_strstr atomic_load<__sanitizer::atomic_uint64_t> internal_sigprocmask DecorateMapping internal_dup IsAbsolutePath HasSuppressionType QuarantinePop SetDestroyed moveFromOldBuckets MmapSharedNoReserve AndroidLogInit WaitForProcess Append ~ScopedSetTracerPID ThreadCount GetStats atomic_load_relaxed<__sanitizer::atomic_uintptr_t> operator= LzwEncode<unsigned int, const unsigned int *, __sanitizer::SLeb128Encoder> PrintTo out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_unwind_linux_libcdep.cpp WordIsPoisoned GetSanititizerToolName Location handleDivremOverflowImpl SharedInitCode tid Recycle FlushUnneededASanShadowMemory out/llvm-project/compiler-rt/lib/asan/asan_globals.cpp write_pollfd InitializeSignalInterceptors __interceptor_strndup __interceptor_pthread_getschedparam __interceptor_pthread_attr_getschedpolicy __interceptor_tempnam __sanitizer_syscall_pre_impl_fremovexattr __sanitizer_syscall_pre_impl_pivot_root __interceptor_free __interceptor_malloc __interceptor_realloc AsanPoisonOrUnpoisonIntraObjectRedzone setUnwinding PrintInternalAllocatorStats dtls getDynamicTypeInfoFromObject RawInternalFree Add CopyToArray set setBit Swap<__sanitizer::DeadlockDetectorTLS<__sanitizer::TwoLevelBitVector<1U, __sanitizer::BasicBitVector<unsigned int> > >::LockWithContext> internal_snprintf InitializeCommonFlags fatal_error ~ListOfModules internal_filesize Wait GetCodeRangeForFile Describe AppendPointer internal_memchr Next ConsumeThreadUserId GetTid __sanitizer_sandbox_on_notify internal_ptrace SetDefaults Cov8bitCountersInit Abs<int> StackDepotUnlockAll WriteToSymbolizer ParseFileLineInfo CanBeAHeapPointer Sort<unsigned long long, __sanitizer::CompareLess<unsigned long long> > PrintMatchedSuppressions LockThreadRegistry isIntegerTy IsQuarantined Unwind AddrIsInMidMem PoisonShadow CheckAlignedAllocAlignmentAndSize ReportInvalidPosixMemalignAlignment Purge AddrIsInLowShadow GetCurrentTidOrInvalid ForEachFakeFrame __asan_stack_free_0 ReportODRViolation format_is_float_conv __interceptor_vprintf MaybeRealStrnlen calcHash __interceptor_strptime __interceptor_vsnprintf __interceptor_getsockopt __interceptor_readdir_r __interceptor_stat __interceptor_wcscat __interceptor_regcomp __interceptor_regfree __sanitizer_syscall_pre_impl_fgetxattr __sanitizer_syscall_pre_impl_io_setup __sanitizer_syscall_pre_impl_migrate_pages __sanitizer_syscall_pre_impl_perf_event_open __interceptor_strcpy __interceptor_valloc __sanitizer_unaligned_store16 AsanInitInternal __asan_extra_spill_area out/llvm-project/compiler-rt/lib/asan/asan_stack.cpp PrintMallocStatsArray AddrIsInStack Report Allocate MmapAlignedOrDieOnFatalError __sanitizer_install_malloc_and_free_hooks out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_deadlock_detector1.cpp nodeToEpoch skip_whitespace parse_flag MemoryMappingLayout SuppressionCount GetMatched out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_thread_registry.cpp try_emplace<unsigned int &> GetTls MapDynamicShadow internal_waitpid SuspendThread lock store add out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_libbacktrace.cpp StartSymbolizerSubprocess IsReadable ScanRangeForPointers GetFreeContext GetCurrentThread quarantined_size __sanitizer_get_ownership ReInitializeAllocator AsanGetStack __asan_stack_malloc_2 __asan_stack_free_2 __asan_stack_malloc_always_9 PoisonRedZones RegisterGlobal __asan_before_dynamic_init out/llvm-project/compiler-rt/lib/asan/asan_interceptors.cpp ioctl_request_fixup __interceptor_strcspn __interceptor_inet_pton __interceptor_wcsxfrm_l __interceptor_getnetent __interceptor_popen __interceptor_pclose __sanitizer_syscall_pre_impl_llistxattr __sanitizer_syscall_pre_impl_swapon __sanitizer_syscall_pre_impl_spu_create __sanitizer_syscall_pre_impl_unlinkat __sanitizer_syscall_pre_impl_newfstatat __sanitizer_syscall_pre_impl_fstatat64 out/llvm-project/compiler-rt/lib/asan/asan_memory_profile.cpp __sanitizer_unaligned_load16 __sanitizer_annotate_contiguous_container __asan_set_error_report_callback FlushToDeadThreadStats __sanitizer_start_switch_fiber atomic_load<__sanitizer::atomic_uint8_t> TryLock ClassIdToSize check_idx onFirstLock RegisterFlag<__sanitizer::HandleSignalMode> SetVerbosity InitializePlatformCommonFlags out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_flag_parser.cpp atomic_load<__sanitizer::atomic_uint32_t> ParseString IsSpace dl_iterate_phdr internal_start_thread CallPrintfAndReportCallback LogMessageOnPrintf SuppressionContext getNumBuckets OnFork BackgroundThread my_pthread_attr_getstack init internal_sigaltstack Dump ~ScopedAllocatorErrorReport Put DenseMapPair FindModuleNameAndOffsetForAddress LateInitialize dlopen UnwindSlow Bold handleNegateOverflowImpl out/llvm-project/compiler-rt/lib/ubsan/ubsan_monitor.cpp atomic_load<__sanitizer::atomic_uint16_t> AllocatorMayReturnNull GetCurrentThreadStats get_arg out/llvm-project/compiler-rt/lib/asan/asan_debugging.cpp out/llvm-project/compiler-rt/lib/asan/asan_fake_stack.cpp __asan_stack_malloc_always_0 __asan_stack_free_4 __interceptor_memset __interceptor_memmove __interceptor_getpeername __interceptor_pthread_mutexattr_getpshared __interceptor_ttyname_r __interceptor_sincos __interceptor_getresuid __sanitizer_syscall_pre_impl_recvmmsg __sanitizer_syscall_pre_impl_unlink __sanitizer_syscall_pre_impl_mknodat __interceptor_strncat __interceptor_atoi __asan_memmove asan_free Free AsanOnDeadlySignal stack_top checkTypeInfoEquality IsPowerOfTwo InitCache Initialize ~InternalMmapVector ReadProcessName ReadFileToBuffer atomic_store<__sanitizer::atomic_uint32_t> internal_readlink out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_linux.cpp syscall data IsWritable getHashValue FindThreadContextByOsIDLocked internal_sigaction SetAddressSpaceUnlimited MaybeCallSancovDefaultOptions Error InsertIntoBucket<__sanitizer::detail::DenseMapPair<unsigned int, unsigned int>, unsigned int> Load __sanitizer_get_module_and_offset_for_pc StripFunctionName uuid MaybeDumpInstructionBytes Sort<__lsan::Leak, bool (*)(const __lsan::Leak &, const __lsan::Leak &)> Blue ForEachChunk InternalLowerBound<__sanitizer::InternalMmapVector<unsigned int>, unsigned int, __sanitizer::CompareLess<unsigned int> > ReportIfNotSuspended isMemoryLocation __ubsan_get_current_report_data RunFreeHooks ReportAllocTypeMismatch ReportRssLimitExceeded asan_pvalloc GetFakeStackFastAlways __asan_stack_free_10 __asan_get_current_fake_stack IsAddressNearGlobal UnregisterGlobal DisableInThisThread __interceptor_fgets __interceptor_modf __interceptor_fgetxattr __interceptor_strlcpy __sanitizer_syscall_pre_impl_stat64 __sanitizer_syscall_pre_impl_chroot __sanitizer_syscall_pre_impl_rename __sanitizer_syscall_pre_impl_openat __sanitizer_syscall_pre_impl_rt_sigaction __interceptor_strncpy InitializeCommonInterceptors __interceptor_pvalloc ErrorDescription DisableCoreDumperIfNecessary UnpoisonStack UnpoisonFakeStack GetAccumulatedStats ThreadStackContainsAddress OnCreated CanAllocate DestroyBatch resize idx0 check_node Iterator FlagHandler out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_libc.cpp capacity RoundUpToPowerOfTwo GetRandom internal_prctl SetJoined QuarantinePush StackSizeIsUnlimited __sanitizer_cov_dump __sanitizer_cov_reset eq EncodeSLEB128<int, unsigned char *> DenseMapPair<const unsigned int &, unsigned int &> use_count GetModuleAndOffsetForPc ClearAll SearchForModule DemangleSwift PrintMemoryByte PointsIntoChunk ProcessRootRegion InitCommonLsan getauxval MaybeReportErrorSummary out/llvm-project/compiler-rt/lib/ubsan/ubsan_init.cpp handleAlignmentAssumptionImpl isUnsignedIntegerTy getFloatValue asan_realloc Transfer ParseFrameDescription Address PrintShadowByte __asan_stack_free_3 ReadLock Swap<ioctl_desc> __interceptor_strtok __interceptor_strrchr __interceptor_scanf __interceptor_clock_getres __interceptor_pthread_attr_getstack __interceptor_getresgid SuppressErrorReport ErrorDeadlySignal stack_bottom GetActuallyAllocatedSize idx1 hasNext RegisterIncludeFlags out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_mutex.cpp IsExecutable SharedPrintfCodeNoBuffer Reset ThreadContextBase JoinThread GetThreadStackTopAndBottom CompressLzw MurMur2Hash64Builder WaitForWork __invoke Print GetThreadSelf InitAsStandalone out/llvm-project/compiler-rt/lib/ubsan/ubsan_handlers.cpp SetErrnoToENOMEM AddrIsInLowMem ReportOutOfMemory IsSpecialCaseOfOperatorNew0 ReInitialize GetAdditionalThreadContextPtrs ErrorBase PoisonAll OnMallocAlways __asan_stack_malloc_always_1 __asan_stack_malloc_always_6 __asan_alloca_poison PoisonShadowForGlobal created __interceptor_pread __interceptor_write __interceptor_getaddrinfo __interceptor_sigpending __interceptor_freopen __interceptor_munlock __sanitizer_syscall_pre_impl_rmdir out/llvm-project/compiler-rt/lib/asan/asan_linux.cpp Swap<__asan::AllocationSite> ReportError SetPrintfAndReportCallback GetAsanThreadByOsIDLocked RawInternalRealloc GetSizeClass MmapOrDieOnFatalError SetFromArray InternalCalloc internal_strncpy onLockBefore nodeToIndexUnchecked MutexAfterLock ReadFileToVector ReportUnrecognizedFlags internal_write internal_lstat internal_munmap MapFileToMemory AppendNumber FindThreadContextLocked find FinishThread UnmapFromTo UncompressLzw ~DenseMap GetPreviousInstructionPc SendCommand CatastrophicErrorWrite GetCallerPC pointer_alignment GetSortedSuppressedStacks LeakComparator ProcessThreadRegistry ubsan_GetStackTrace getSymbolizedLocation handleNonNullReturn MemToShadow OnMap out/llvm-project/compiler-rt/lib/asan/asan_descriptions.cpp __asan_stack_malloc_8 read_pollfd DeleteInterceptorMetadata __interceptor_inet_ntop __interceptor_wcsrtombs __interceptor_pthread_sigmask __interceptor_remquo __interceptor_lgamma __interceptor_wcsxfrm __sanitizer_syscall_pre_impl_lremovexattr __sanitizer_syscall_pre_impl_faccessat __sanitizer_unaligned_store64 MmapOrDieQuietly ErrorInvalidAllocationAlignment SetLowLevelAllocateCallback InstallDeadlySignalHandlers isUnwinding InternalAlloc Deallocate PopulateBatches InternalReallocArray DeallocateBatch getLocks Create internal_strcmp internal_strncat TemplateMatch GetMaxUserVirtualAddress internal_strncmp DumpProcessMap AppendChar AppendString append CacheMemoryMappings FindThreadContextByOsIdCallback initEmpty CreateThread GetTlsSize ~RunOnDestruction internal_getppid __sanitizer_cov_trace_pc_guard_init ColorizeReports StackTrace StackDepotHandle load StackDepotTestOnlyUnmap SymbolizerTool InitializeSwiftDemangler SanitizerInitializeUnwinder GetSuppressionContext FloodFillTag DoRecoverableLeakCheck out/llvm-project/compiler-rt/lib/ubsan/ubsan_diag.cpp getType BufferedStackTrace ScopedReport acquire isNegative getIntegerBitWidth handleCFIBadIcall CheckPosixMemalignAlignment AddrIsInside GetAllocStackId MergeBatches out/llvm-project/compiler-rt/lib/asan/asan_errors.cpp AddrIsInMidShadow GetFlags SanitizerBreakOptimization CheckODRViolationViaIndicator ioctl_common_post format_is_integer_conv __interceptor_strspn __interceptor_gethostbyaddr __interceptor_modff __interceptor_readdir __interceptor_realpath __interceptor_llistxattr __interceptor_send __interceptor_wcsnlen __sanitizer_syscall_pre_impl_chown __sanitizer_syscall_pre_impl_timerfd_settime __interceptor___cxa_atexit ErrorCallocOverflow getDynamicTypeInfoFromVtable MmapOrDie RawWrite internal_strrchr __sanitizer_acquire_crash_state onUnlock addEdges RegisterFlag<const char *> internal_simple_strtoll back AndroidGetApiLevel MmapNamed AppendUnsigned ParseFromFile pthread_getattr_np AddModuleSegments internal_execve ResumeAllThreads ~StopTheWorldScope MprotectReadOnly LookupBucketFor<__sanitizer::detail::DenseMapPair<unsigned int, unsigned int> > StackDepotGetStats RenderData ModuleArchToString GetOwnedCopy LocalInfo IsAccessibleMemoryRange atomic_compare_exchange_strong<__sanitizer::atomic_uintptr_t> DoLeakCheck ConvertTypeToString CommonInit handleLoadInvalidValue getFloatBitWidth Set asan_posix_memalign PrintAccessAndVarIntersection AddrIsInShadow SizeRequiredForFlags OnFree __asan_stack_malloc_10 __interceptor_read __interceptor_opendir StrtolFixAndCheck __interceptor_pthread_attr_getguardsize __interceptor_lgammaf __interceptor_lgammal __interceptor_mlock __sanitizer_syscall_pre_impl_timer_settime __sanitizer_syscall_pre_impl_sigaltstack ReportBadParamsToAnnotateContiguousContainer out/llvm-project/compiler-rt/lib/asan/asan_posix.cpp ErrorStringFunctionMemoryRangesOverlap __asan_print_accumulated_stats SetAllocatorMayReturnNull InternalScopedString nodeBelongsToCurrentEpoch getLock RegisterCommonFlags instrumented internal_getdents proc_yield Post isEqual StartThread grow WriteToSyslog MapDynamicShadowAndAliases AdjustStackSize ~ScopedStackSpaceWithGuard SuspendedThreadsListLinux RemoveDieCallback out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_coverage_libcdep_new.cpp out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_allocator_report.cpp DecodeSLEB128<int, const unsigned char *> begin FindAndConstruct allocated IsSameModule ExtractInt CreateTwoHighNumberedPipes dlerror SuppressByRule SortAndDedup<__sanitizer::InternalMmapVector<unsigned int>, __sanitizer::CompareLess<unsigned int> > isInvalid Green ~Diag CanPoisonMemory End SetErrnoOnNull DisabledInThisThread ReportInvalidAllocationAlignment DequeueBatch OnUnmap GetFreeStackId GetAllocatorOptions stack_trace_id __asan_stack_malloc_4 __asan_stack_malloc_9 maybe_parse_param_index __interceptor_prctl __interceptor_gmtime __interceptor_getgroups __interceptor_pthread_attr_getstacksize __interceptor_sincosf __interceptor_lgammaf_r __interceptor___strxfrm_l __interceptor_setbuf __interceptor_regexec __sanitizer_syscall_pre_impl_clock_settime __sanitizer_syscall_pre_impl_init_module __sanitizer_syscall_pre_impl_stat __sanitizer_syscall_pre_impl_pwrite64 __sanitizer_syscall_pre_impl_mkdir __sanitizer_syscall_pre_impl_request_key __sanitizer_syscall_pre_impl_renameat OnAllocate ErrorAllocationSizeTooBig InitializeShadowMemory out/llvm-project/compiler-rt/lib/asan/asan_stats.cpp out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_allocator.cpp ClassID front InternalFree operator!= check Swap<unsigned int> MutexBeforeLock internal_strchrnul ParseFile end ShouldMockFailureToOpen internal_lseek out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_suppressions.cpp ThreadRegistry out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_termination.cpp GetRSS dl_iterate_phdr_cb internal_madvise ~SuspendedThreadsListLinux ~ThreadSuspender __sanitizer_cov_8bit_counters_init DumpCoverage ToUptr Map StackDepotLockAll RenderModuleLocation SymbolizePC MaybeDumpRegisters Unwind_Trace subtractNoOverflow upperBound out/llvm-project/compiler-rt/lib/ubsan/ubsan_flags.cpp handleOutOfBoundsImpl asan_aligned_alloc DescribeAddressRelativeToGlobal PrintContainerOverflowHint __asan_after_dynamic_init IsInterceptorSuppressed IsStackTraceSuppressed ReportGenericError internal_wcsnlen __interceptor_strncasecmp __interceptor_ctime __interceptor_ctime_r __interceptor_getpwnam __interceptor_getitimer __interceptor_wait write_msghdr __interceptor_times __interceptor_sendto __interceptor_readlinkat __interceptor_getprotobyname __interceptor_regerror __interceptor_sigaltstack __sanitizer_syscall_pre_impl_mknod __sanitizer_syscall_pre_impl_readlink Sort<ioctl_desc, ioctl_desc_compare> __interceptor_memalign PrintZoneForPointer AsanCheckIncompatibleRT extra_spill_area out/llvm-project/compiler-rt/lib/asan/asan_thread.cpp DTLS_Get tls_begin Sub SetLowLevelAllocateMinAlignment out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_common.cpp AddressRange getBit IsPathSeparator GetReportPath internal_strchr internal_sigdelset atomic_fetch_add<__sanitizer::atomic_uint32_t> AppendSignedDecimal GetNumberOfThreads InsertIntoBucket<const unsigned int &, const unsigned int &> out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_common_libcdep.cpp clearOrInit GetThreadStackAndTls ~FileCloser DenseMapPair<unsigned int &, const unsigned int &> Stop Distance out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace_libcdep.cpp __sanitizer_symbolize_pc out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_report.cpp LeakReport ~ScopedStopTheWorldLock Initializer RegisterUbsanFlags getPositiveIntValue malloc_storage __sanitizer_get_allocated_size asanThreadRegistry AsanThreadIdAndName GetAccessToHeapChunkInformation FindThreadByStackAddress GetHeapAddressInformation PrintAddressDescription OnStackUnwind ReportGlobal FindRegistrationSite __interceptor_vscanf ioctl_decode ~Handle ioctl_init __interceptor_memrchr __interceptor_fscanf __interceptor_setitimer __sanitizer_syscall_pre_impl_creat __sanitizer_syscall_pre_impl_quotactl __sanitizer_syscall_pre_impl_msgsnd __sanitizer_syscall_pre_impl_inotify_add_watch DTLS_on_libc_memalign __interceptor___libc_memalign HeapProfile ~HeapProfile StartReportDeadlySignal ErrorFreeNotMalloced DescribeAddressIfHeap AppendToErrorMessageBuffer AsanDoesNotSupportStaticLinkage SetCheckUnwindCallback PrintAddressSpaceLayout PrintAccumulatedStats SetCurrentThread Drain atomic_fetch_sub<__sanitizer::atomic_uintptr_t> addAddressRange setUnion findLockContext getData MutexBeforeUnlock WriteToFile CreateDir GetEnv ParseBool Mutex atomic_compare_exchange_strong<__sanitizer::atomic_uint64_t> AddIgnoredLibrary GetPcSpBp VSNPrintf DenseMap SetDead getNumEntries GetMaxAliveThreads MmapFixed GetThreadID StopTheWorldScope GetCoverageFilename unlock CompressDelta InsertIntoBucket<__sanitizer::detail::DenseMapPair<unsigned int, unsigned int>, int> StackDepotGet out/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_posix_libcdep.cpp ChooseSymbolizerTools __lsan_register_root_region getKind getCallerLocation RegisterUndefinedBehaviorReport FromPrimary __sanitizer_purge_allocator SetMallocContextSize OverrideFromActivationFlags PrintHeapChunkAccess MaybeDemangleGlobalName DescribeAddressIfShadow Scare FastPoisonShadow maybe_parse_number_or_star __interceptor_strnlen __interceptor_strchrnul read_iovec unpoison_group __interceptor_fflush __interceptor_recvfrom __sanitizer_syscall_pre_impl_acct __sanitizer_syscall_pre_impl_sched_setparam __sanitizer_syscall_pre_impl_rt_sigtimedwait __sanitizer_syscall_pre_impl_newlstat __interceptor_atol __asan_memset Max<signed char> ErrorPvallocOverflow ErrorRssLimitExceeded ErrorODRViolation __asan_handle_no_return SetTLSFakeStack out/llvm-project/compiler-rt/lib/asan/asan_new_delete.cpp
.note.android.ident .note.gnu.build-id .dynsym .gnu.version .gnu.version_r .gnu.hash .dynstr .rel.dyn .rel.plt .rodata .eh_frame_hdr .eh_frame .text .plt .tbss .data.rel.ro .fini_array .init_array .dynamic .got .got.plt .data .bss .comment .debug_abbrev .debug_info .debug_str .debug_line .debug_ranges .debug_aranges .symtab .shstrtab .strtab
crtbegin_so.c __dso_handle_const __on_dlclose __on_dlclose_late ndk_build_number ndk_version note_android_ident note_data note_end note_name interception_linux.cpp interception_mac.cpp interception_win.cpp interception_type_test.cpp sanitizer_allocator.cpp _ZN11__sanitizerL30internal_allocator_initializedE _ZN11__sanitizerL22internal_alloc_init_muE _ZN11__sanitizerL26internal_alloc_placeholderE _ZN11__sanitizerL27internal_allocator_cache_muE _ZN11__sanitizerL24internal_allocator_cacheE _ZN11__sanitizerL34ReportInternalAllocatorOutOfMemoryEj _ZN11__sanitizerL23allocator_out_of_memoryE _ZN11__sanitizerL29low_level_alloc_min_alignmentE _ZN11__sanitizerL24low_level_alloc_callbackE _ZN11__sanitizerL25allocator_may_return_nullE _ZN11__sanitizerL18rss_limit_exceededE sanitizer_common.cpp _ZZN11__sanitizer23ReportMmapFailureAndDieEjPKcS1_ibE15recursion_count _ZN11__sanitizerL14g_total_mmapedE _ZN11__sanitizerL22process_name_cache_strE _ZN11__sanitizerL21binary_name_cache_strE _ZN11__sanitizerL7MFHooksE _ZZ31__sanitizer_acquire_crash_stateE14in_crash_state sanitizer_deadlock_detector1.cpp sanitizer_deadlock_detector2.cpp sanitizer_errno.cpp sanitizer_file.cpp sanitizer_flags.cpp sanitizer_flag_parser.cpp sanitizer_fuchsia.cpp sanitizer_libc.cpp sanitizer_libignore.cpp sanitizer_linux.cpp _ZZN11__sanitizer6GetEnvEPKcE6inited _ZZN11__sanitizer6GetEnvEPKcE3len _ZZN11__sanitizer6GetEnvEPKcE7environ _ZN11__sanitizerL13GetArgsAndEnvEPPPcS2_ _ZZN11__sanitizer12ThreadLister7IsAliveEiE7kPrefix _ZN11__sanitizerL17android_api_levelE _ZN11__sanitizerL23dl_iterate_phdr_test_cbEP12dl_phdr_infojPv sanitizer_linux_s390.cpp sanitizer_mac.cpp sanitizer_mutex.cpp sanitizer_netbsd.cpp sanitizer_platform_limits_freebsd.cpp sanitizer_platform_limits_linux.cpp sanitizer_platform_limits_netbsd.cpp sanitizer_platform_limits_posix.cpp sanitizer_platform_limits_solaris.cpp sanitizer_posix.cpp sanitizer_printf.cpp _ZN11__sanitizerL12AppendNumberEPPcPKcyhhbbb _ZN11__sanitizerL23PrintfAndReportCallbackE _ZN11__sanitizerL16SharedPrintfCodeEbPKcPc _ZN11__sanitizerL24SharedPrintfCodeNoBufferEbPciPKcS0_ sanitizer_procmaps_common.cpp _ZN11__sanitizerL10cache_lockE _ZN11__sanitizerL21cached_proc_self_mapsE sanitizer_procmaps_bsd.cpp sanitizer_procmaps_fuchsia.cpp sanitizer_procmaps_linux.cpp sanitizer_procmaps_mac.cpp sanitizer_procmaps_solaris.cpp sanitizer_solaris.cpp sanitizer_stoptheworld_fuchsia.cpp sanitizer_stoptheworld_mac.cpp sanitizer_stoptheworld_win.cpp sanitizer_suppressions.cpp sanitizer_tls_get_addr.cpp sanitizer_thread_registry.cpp sanitizer_type_traits.cpp sanitizer_win.cpp sanitizer_termination.cpp _ZN11__sanitizerL20InternalDieCallbacksE _ZN11__sanitizerL15UserDieCallbackE _ZN11__sanitizerL19CheckUnwindCallbackE _ZZN11__sanitizer11CheckFailedEPKciS1_yyE9first_tid sanitizer_common_libcdep.cpp _ZZN11__sanitizer25MaybeStartBackgroudThreadEvE7started _ZN11__sanitizerL19sandboxing_callbackE _GLOBAL__sub_I_sanitizer_common_libcdep.cpp sanitizer_allocator_checks.cpp sanitizer_linux_libcdep.cpp _ZN11__sanitizerL18dl_iterate_phdr_cbEP12dl_phdr_infojPv _ZN11__sanitizerL17AddModuleSegmentsEPKcP12dl_phdr_infoPNS_24InternalMmapVectorNoCtorINS_12LoadedModuleEEE _ZN11__sanitizerL23android_log_initializedE sanitizer_mac_libcdep.cpp sanitizer_posix_libcdep.cpp _ZN11__sanitizerL6setlimEim _ZN11__sanitizerL21MaybeInstallSigactionEiPFviPvS0_E sanitizer_stoptheworld_linux_libcdep.cpp _ZN11__sanitizerL14blocked_sigsetE _ZN11__sanitizerL10old_sigsetE _ZN11__sanitizerL12TracerThreadEPv _ZN11__sanitizerL23TracerThreadDieCallbackEv _ZN11__sanitizerL25thread_suspender_instanceE _ZN11__sanitizerL25TracerThreadSignalHandlerEiPNS_19__sanitizer_siginfoEPv _ZZNK11__sanitizer25SuspendedThreadsListLinux17GetRegistersAndSPEjPNS_18InternalMmapVectorIjEEPjENK3$_0clEj _ZN11__sanitizerL10kExtraRegsE sanitizer_stoptheworld_netbsd_libcdep.cpp sancov_flags.cpp sanitizer_coverage_fuchsia.cpp sanitizer_coverage_libcdep_new.cpp _ZZN11__sanitizer18InitializeCoverageEbPKcE16coverage_enabled _ZN8__sancov12_GLOBAL__N_119pc_guard_controllerE _ZN8__sancov12_GLOBAL__N_119WriteModuleCoverageEPcPKcPKjj _ZN8__sancov12_GLOBAL__N_124SingletonCounterCoverage12counters_begE _ZN8__sancov12_GLOBAL__N_124SingletonCounterCoverage12counters_endE _ZN8__sancov12_GLOBAL__N_124SingletonCounterCoverage12DumpCoverageEv _ZN8__sancov12_GLOBAL__N_124SingletonCounterCoverage7pcs_begE _ZN8__sancov12_GLOBAL__N_124SingletonCounterCoverage7pcs_endE _ZN8__sancov12_GLOBAL__N_15MagicE sanitizer_coverage_win_sections.cpp sanitizer_allocator_report.cpp sanitizer_chained_origin_depot.cpp sanitizer_stack_store.cpp sanitizer_stackdepot.cpp _ZN11__sanitizerL9useCountsE _ZN11__sanitizerL10stackStoreE _ZN11__sanitizer12_GLOBAL__N_114CompressThread13NewWorkNotifyEv _ZN11__sanitizer12_GLOBAL__N_115compress_threadE _ZZN11__sanitizer12_GLOBAL__N_114CompressThread13NewWorkNotifyEvEN3$_08__invokeEPv _ZN11__sanitizerL18CompressStackStoreEv _ZN11__sanitizerL8theDepotE sanitizer_stacktrace.cpp sanitizer_stacktrace_libcdep.cpp _ZN11__sanitizer12_GLOBAL__N_121StackTraceTextPrinter20ProcessAddressFramesEj sanitizer_stacktrace_printer.cpp _ZN11__sanitizerL14kDefaultFormatE sanitizer_stacktrace_sparc.cpp sanitizer_symbolizer.cpp sanitizer_symbolizer_libbacktrace.cpp sanitizer_symbolizer_libcdep.cpp _ZN11__sanitizerL17ParseFileLineInfoEPNS_11AddressInfoEPKc sanitizer_symbolizer_mac.cpp sanitizer_symbolizer_markup.cpp sanitizer_symbolizer_posix_libcdep.cpp _ZN11__sanitizerL16swift_demangle_fE sanitizer_symbolizer_report.cpp _ZZN11__sanitizer23StartReportDeadlySignalEvE13kDeadlySignal _ZZN11__sanitizerL23ReportStackOverflowImplERKNS_13SignalContextEjPFvS2_PKvPNS_18BufferedStackTraceEES4_E12kDescription _ZZN11__sanitizer21ScopedErrorReportLock4LockEvE3msg sanitizer_symbolizer_win.cpp sanitizer_unwind_linux_libcdep.cpp _ZN11__sanitizer12_GLOBAL__N_112Unwind_TraceEP15_Unwind_ContextPv sanitizer_unwind_win.cpp lsan_common.cpp _ZN6__lsanL15suppression_ctxE _ZN6__lsanL23suppression_placeholderE _ZN6__lsanL17kSuppressionTypesE _ZN6__lsanL16kStdSuppressionsE _ZN6__lsanL16kSuppressionLeakE _ZN6__lsanL12root_regionsE _ZN6__lsanL18has_reported_leaksE _ZZN6__lsan11DoLeakCheckEvE12already_done _ZN6__lsanL13CheckForLeaksEv _ZN6__lsanL21CheckForLeaksCallbackERKN11__sanitizer20SuspendedThreadsListEPv _ZN6__lsanL12PrintResultsERNS_10LeakReportE _ZN6__lsanL22DoRecoverableLeakCheckEv _ZN6__lsanL20ReportIfNotSuspendedEPN11__sanitizer17ThreadContextBaseEPv _ZN6__lsanL19IgnoredSuppressedCbEjPv _ZN6__lsanL16CollectIgnoredCbEjPv _ZZN6__lsanL14ProcessThreadsERKN11__sanitizer20SuspendedThreadsListEPNS0_18InternalMmapVectorIjEEEN3$_08__invokeEPvS8_jS8_ _ZN6__lsanL22MarkIndirectlyLeakedCbEjPv _ZN6__lsanL14CollectLeaksCbEjPv _ZN6__lsanL11ResetTagsCbEjPv lsan_common_fuchsia.cpp lsan_common_linux.cpp _ZN6__lsanL18linker_placeholderE _ZN6__lsanL6linkerE _ZN6__lsanL11kLinkerNameE _ZN6__lsanL28ProcessGlobalRegionsCallbackEP12dl_phdr_infojPv _ZN6__lsanL32LockStuffAndStopTheWorldCallbackEP12dl_phdr_infojPv lsan_common_mac.cpp ubsan_diag.cpp _ZL10RenderTextPN11__sanitizer20InternalScopedStringEPKcPKN7__ubsan4Diag3ArgE _ZL10upperBoundjPN7__ubsan5RangeEj _ZL15suppression_ctx _ZL17kSuppressionTypes _ZL23suppression_placeholder _ZL10kVptrCheck ubsan_init.cpp _ZL13ubsan_init_mu _ZL17ubsan_initialized _ZL8UbsanDiev ubsan_flags.cpp ubsan_handlers.cpp _ZL22handleTypeMismatchImplPN7__ubsan16TypeMismatchDataEjNS_13ReportOptionsE _ZL29handleAlignmentAssumptionImplPN7__ubsan23AlignmentAssumptionDataEjjjNS_13ReportOptionsE _ZL25handleIntegerOverflowImplIN7__ubsan5ValueEEvPNS0_12OverflowDataEjPKcT_NS0_13ReportOptionsE _ZL24handleNegateOverflowImplPN7__ubsan12OverflowDataEjNS_13ReportOptionsE _ZL24handleDivremOverflowImplPN7__ubsan12OverflowDataEjjNS_13ReportOptionsE _ZL26handleShiftOutOfBoundsImplPN7__ubsan20ShiftOutOfBoundsDataEjjNS_13ReportOptionsE _ZL21handleOutOfBoundsImplPN7__ubsan15OutOfBoundsDataEjNS_13ReportOptionsE _ZL28handleBuiltinUnreachableImplPN7__ubsan15UnreachableDataENS_13ReportOptionsE _ZL23handleMissingReturnImplPN7__ubsan15UnreachableDataENS_13ReportOptionsE _ZL25handleVLABoundNotPositivePN7__ubsan12VLABoundDataEjNS_13ReportOptionsE _ZL23handleFloatCastOverflowPvjN7__ubsan13ReportOptionsE _ZL22handleLoadInvalidValuePN7__ubsan16InvalidValueDataEjNS_13ReportOptionsE _ZL24handleImplicitConversionPN7__ubsan22ImplicitConversionDataENS_13ReportOptionsEjj _ZL20handleInvalidBuiltinPN7__ubsan18InvalidBuiltinDataENS_13ReportOptionsE _ZL21handleInvalidObjCCastPN7__ubsan15InvalidObjCCastEjNS_13ReportOptionsE _ZL19handleNonNullReturnPN7__ubsan17NonNullReturnDataEPNS_14SourceLocationENS_13ReportOptionsEb _ZL16handleNonNullArgPN7__ubsan14NonNullArgDataENS_13ReportOptionsEb _ZL25handlePointerOverflowImplPN7__ubsan19PointerOverflowDataEjjNS_13ReportOptionsE _ZL17handleCFIBadIcallPN7__ubsan16CFICheckFailDataEjNS_13ReportOptionsE ubsan_monitor.cpp _ZL10CurrentUBR ubsan_value.cpp asan_allocator.cpp _ZN6__asanL8instanceE _ZN6__asanL10RZSize2LogEj asan_activation.cpp _ZN6__asanL19asan_is_deactivatedE _ZN6__asanL22asan_deactivated_flagsE asan_debugging.cpp _ZN12_GLOBAL__N_112AsanGetStackEjPjjS0_b asan_descriptions.cpp _ZN6__asanL11ShadowNamesE asan_errors.cpp _ZN6__asanL13OnStackUnwindERKN11__sanitizer13SignalContextEPKvPNS0_18BufferedStackTraceE _ZZN6__asan22ErrorAllocTypeMismatch5PrintEvE13dealloc_names _ZZN6__asan22ErrorAllocTypeMismatch5PrintEvE11alloc_names _ZN6__asanL11MemToShadowEj asan_fake_stack.cpp asan_flags.cpp asan_fuchsia.cpp asan_globals.cpp _ZN6__asanL14mu_for_globalsE _ZN6__asanL19list_of_all_globalsE _ZN6__asanL20FindRegistrationSiteEPK13__asan_global _ZN6__asanL31global_registration_site_vectorE _ZN6__asanL20dynamic_init_globalsE _ZN6__asanL21allocator_for_globalsE asan_globals_win.cpp asan_interceptors.cpp _ZN6__asanL29QuickCheckForUnpoisonedRegionEjj _ZL11StrstrCheckPvPcPKcS2_ _ZL11write_iovecPvPN11__sanitizer17__sanitizer_iovecEjj _ZL10read_iovecPvPN11__sanitizer17__sanitizer_iovecEjj _ZL11unpoison_tmPvPN11__sanitizer14__sanitizer_tmE _ZL12scanf_commonPvibPKcPc _ZL21format_get_value_sizecPKcb _ZL13printf_commonPvPKcPc _ZZL13printf_commonPvPKcPcE12ReportedOnce _ZL17ioctl_initialized _ZL16ioctl_table_size _ZL11ioctl_table _ZL15unpoison_passwdPvPN11__sanitizer18__sanitizer_passwdE _ZL14unpoison_groupPvPN11__sanitizer17__sanitizer_groupE _ZL14PosixSpawnImplIFiPiPKcPKvS4_PKPcS7_EEiPvPT_S0_S2_S4_S4_S7_S7_ _ZL13write_hostentPvPN11__sanitizer19__sanitizer_hostentE _ZL12write_msghdrPvPN11__sanitizer18__sanitizer_msghdrEi _ZL11read_msghdrPvPN11__sanitizer18__sanitizer_msghdrEi _ZL17StrtolFixAndCheckPvPKcPPcS2_i _ZL24interceptor_metadata_map _ZZL18MlockIsUnsupportedvE7printed _ZL14write_protoentPvPN11__sanitizer20__sanitizer_protoentE _ZL17asan_thread_startPv _ZL11AtCxaAtexitPv _ZZN6__asan26InitializeAsanInterceptorsEvE15was_called_once _ZL28InitializeCommonInterceptorsv _ZZL28InitializeSignalInterceptorsvE15was_called_once _ZZL28InitializeCommonInterceptorsvE12metadata_mem _ZL16ioctl_table_fillv asan_interceptors_memintrinsics.cpp asan_linux.cpp asan_mac.cpp asan_malloc_linux.cpp _ZL22asan_malloc_dispatch_l _ZL22asan_malloc_dispatch_k asan_malloc_mac.cpp asan_malloc_win.cpp asan_memory_profile.cpp _ZN6__asanL15MemoryProfileCBERKN11__sanitizer20SuspendedThreadsListEPv _ZN6__asanL13ChunkCallbackEjPv asan_poisoning.cpp _ZN6__asanL17can_poison_memoryE asan_posix.cpp _ZN6__asanL14tsd_key_initedE _ZN6__asanL7tsd_keyE asan_premap_shadow.cpp asan_report.cpp _ZN6__asanL23error_message_buf_mutexE _ZN6__asanL20error_message_bufferE _ZN6__asanL24error_message_buffer_posE _ZN6__asanL21error_report_callbackE _ZN6__asanL15AsanBuggyPcPoolE _ZN6__asanL26CheckForInvalidPointerPairEPvS0_ _ZN6__asanL24ReportInvalidPointerPairEjjjjj asan_rtl.cpp _ZN6__asanL25ReportGenericErrorWrapperEjbiib _ZN6__asanL16AsanInitInternalEv _ZN6__asanL20InitializeHighMemEndEv _ZN6__asanL7AsanDieEv _ZN6__asanL11CheckUnwindEv _ZN6__asanL18OnLowLevelAllocateEjj _ZN6__asanL11asan_atexitEv _ZN6__asanL23force_interface_symbolsEv _ZZN6__asan13UnpoisonStackEjjPKcE16reported_warning _ZZN6__asanL7AsanDieEvE9num_calls _GLOBAL__sub_I_asan_rtl.cpp asan_shadow_setup.cpp asan_stack.cpp _ZN6__asanL19malloc_context_sizeE asan_stats.cpp _ZN6__asanL23dead_threads_stats_lockE _ZN6__asanL18dead_threads_statsE _ZN6__asanL19GetAccumulatedStatsEPNS_9AsanStatsE _ZN6__asanL19max_malloced_memoryE _ZN6__asanL16MergeThreadStatsEPN11__sanitizer17ThreadContextBaseEPv _ZN6__asanL20unknown_thread_statsE _ZN6__asanL10print_lockE asan_suppressions.cpp _ZN6__asanL15suppression_ctxE _ZN6__asanL17kSuppressionTypesE _ZN6__asanL23suppression_placeholderE _ZN6__asanL16kInterceptorNameE _ZN6__asanL23kInterceptorViaFunctionE _ZN6__asanL22kInterceptorViaLibraryE _ZN6__asanL13kODRViolationE asan_thread.cpp _ZZN6__asan18asanThreadRegistryEvE11initialized _ZN6__asanL20asan_thread_registryE _ZN6__asanL20GetAsanThreadContextEj _ZN6__asanL27thread_registry_placeholderE _ZN6__asanL21mu_for_thread_contextE _ZN6__asanL28allocator_for_thread_contextE _ZN6__asanL26ThreadStackContainsAddressEPN11__sanitizer17ThreadContextBaseEPv asan_win.cpp asan_new_delete.cpp dummy.cpp ubsan_handlers_cxx.cpp _ZL26HandleDynamicTypeCacheMissPN7__ubsan24DynamicTypeCacheMissDataEjjNS_13ReportOptionsE _ZN7__ubsanL26handleFunctionTypeMismatchEPNS_24FunctionTypeMismatchDataEjjjNS_13ReportOptionsE ubsan_type_hash.cpp ubsan_type_hash_itanium.cpp _ZZL27getTypeCacheHashTableBucketjE21__ubsan_vptr_hash_set _ZL21isDerivedFromAtOffsetPKN10__cxxabiv117__class_type_infoES2_i _ZL16findBaseAtOffsetPKN10__cxxabiv117__class_type_infoEi ubsan_type_hash_win.cpp UnwindLevel1.c unwind_phase2 libunwind.cpp _ZN9libunwindL24findUnwindSectionsByPhdrEP12dl_phdr_infojPv UnwindLevel1-gcc-ext.c __FRAME_END__ _GLOBAL_OFFSET_TABLE_ __atexit_handler_wrapper __cxa_atexit __cxa_finalize __dso_handle __emutls_unregister_key __register_atfork atexit pthread_atfork _ZN14__interception17InterceptFunctionEPKcPmmm dlsym _ZN11__sanitizer18internal_allocatorEv _ZN11__sanitizer15internal_memsetEPvij _ZN11__sanitizer15StaticSpinMutex8LockSlowEv _ZN11__sanitizer13InternalAllocEjPNS_30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32INS_4AP32EEEEEj _ZN11__sanitizer17CombinedAllocatorINS_20SizeClassAllocator32INS_4AP32EEENS_32LargeMmapAllocatorPtrArrayStaticEE8AllocateEPNS_30SizeClassAllocator32LocalCacheIS3_EEjj _ZN11__sanitizer17SanitizerToolNameE _ZN11__sanitizer6ReportEPKcz _ZN11__sanitizer3DieEv _ZN11__sanitizer14InternalCallocEjjPNS_30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32INS_4AP32EEEEE _ZN11__sanitizer12InternalFreeEPvPNS_30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32INS_4AP32EEEEE _ZN11__sanitizer30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32INS_4AP32EEEE10DeallocateEPS3_jPv _ZN11__sanitizer18LargeMmapAllocatorINS_20NoOpMapUnmapCallbackENS_32LargeMmapAllocatorPtrArrayStaticENS_21LocalAddressSpaceViewEE10DeallocateEPNS_14AllocatorStatsEPv _ZN11__sanitizer17LowLevelAllocator8AllocateEj _ZN11__sanitizer9MmapOrDieEjPKcb _ZN11__sanitizer8RawWriteEPKc _ZN11__sanitizer11CheckFailedEPKciS1_yy _ZN11__sanitizer31SetLowLevelAllocateMinAlignmentEj _ZN11__sanitizer27SetLowLevelAllocateCallbackEPFvjjE _ZN11__sanitizer22IsAllocatorOutOfMemoryEv _ZN11__sanitizer23SetAllocatorOutOfMemoryEv _ZN11__sanitizer22AllocatorMayReturnNullEv _ZN11__sanitizer25SetAllocatorMayReturnNullEb _ZN11__sanitizer34PrintHintAllocatorCannotReturnNullEv _ZN11__sanitizer18IsRssLimitExceededEv _ZN11__sanitizer19SetRssLimitExceededEb _ZN11__sanitizer18LargeMmapAllocatorINS_20NoOpMapUnmapCallbackENS_32LargeMmapAllocatorPtrArrayStaticENS_21LocalAddressSpaceViewEE8AllocateEPNS_14AllocatorStatsEjj _ZN11__sanitizer30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32INS_4AP32EEEE6RefillEPNS4_8PerClassEPS3_j _ZN11__sanitizer22SecondaryAllocatorNameE _ZN11__sanitizer21MmapOrDieOnFatalErrorEjPKc _ZN11__sanitizer20SizeClassAllocator32INS_4AP32EE13AllocateBatchEPNS_14AllocatorStatsEPNS_30SizeClassAllocator32LocalCacheIS2_EEj _ZN11__sanitizer20SizeClassAllocator32INS_4AP32EE16PopulateFreeListEPNS_14AllocatorStatsEPNS_30SizeClassAllocator32LocalCacheIS2_EEPNS2_13SizeClassInfoEj _ZN11__sanitizer20PrimaryAllocatorNameE _ZN11__sanitizer28MmapAlignedOrDieOnFatalErrorEjjPKc _ZN11__sanitizer30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32INS_4AP32EEEE11CreateBatchEjPS3_PNS3_13TransferBatchE _ZN11__sanitizer30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32INS_4AP32EEEE5DrainEPNS4_8PerClassEPS3_j _ZN11__sanitizer20SizeClassAllocator32INS_4AP32EE15DeallocateBatchEPNS_14AllocatorStatsEjPNS2_13TransferBatchE _ZN11__sanitizer15internal_memcpyEPvPKvj _ZN11__sanitizer10UnmapOrDieEPvj _ZN11__sanitizer23ReportMmapFailureAndDieEjPKcS1_ib _ZN11__sanitizer14DumpProcessMapEv _ZN11__sanitizer15StripPathPrefixEPKcS1_ _ZN11__sanitizer15internal_strstrEPKcS1_ _ZN11__sanitizer15internal_strlenEPKc _ZN11__sanitizer15StripModuleNameEPKc _ZN11__sanitizer16internal_strrchrEPKci _ZN11__sanitizer18ReportErrorSummaryEPKcS1_ _ZN11__sanitizer21common_flags_dont_useE _ZN11__sanitizer20InternalScopedString6appendEPKcz __sanitizer_report_error_summary _ZN11__sanitizer6PrintfEPKcz _ZN11__sanitizer35RemoveANSIEscapeSequencesFromStringEPc _ZN11__sanitizer18internal_strchrnulEPKci _ZN11__sanitizer12LoadedModule3setEPKcj _ZN11__sanitizer15internal_strdupEPKc _ZN11__sanitizer12LoadedModule5clearEv _ZN11__sanitizer12LoadedModule7setUuidEPKcj _ZN11__sanitizer12LoadedModule15addAddressRangeEjjbbPKc _ZN11__sanitizer16internal_strncpyEPcPKcj _ZNK11__sanitizer12LoadedModule15containsAddressEj _ZN11__sanitizer17IncreaseTotalMmapEj _ZN11__sanitizer17DecreaseTotalMmapEj _ZN11__sanitizer13TemplateMatchEPKcS1_ _ZN11__sanitizer15internal_strchrEPKci _ZN11__sanitizer14GetProcessNameEv _ZN11__sanitizer17UpdateProcessNameEv _ZN11__sanitizer19ReadLongProcessNameEPcj _ZN11__sanitizer16internal_memmoveEPvPKvj _ZN11__sanitizer15CacheBinaryNameEv _ZN11__sanitizer14ReadBinaryNameEPcj _ZN11__sanitizer20ReadBinaryNameCachedEPcj _ZN11__sanitizer13ReadBinaryDirEPcj _ZN11__sanitizer12PrintCmdlineEv _ZN11__sanitizer7GetArgvEv _ZN11__sanitizer14RunMallocHooksEPKvj _ZN11__sanitizer12RunFreeHooksEPKv _ZN11__sanitizer15internal_usleepEy _ZN11__sanitizer15SleepForSecondsEj _ZN11__sanitizer14SleepForMillisEj __sanitizer_acquire_crash_state __sanitizer_install_malloc_and_free_hooks _ZN11__sanitizer17current_verbosityE _ZN11__sanitizer23stoptheworld_tracer_pidE _ZN11__sanitizer24stoptheworld_tracer_ppidE _ZN11__sanitizer22CatastrophicErrorWriteEPKcj _ZN11__sanitizer11WriteToFileEiPKvjPjPi _ZN11__sanitizer11report_fileE _ZN11__sanitizer10ReportFile5WriteEPKcj _ZN11__sanitizer10ReportFile17ReopenIfNecessaryEv _ZN11__sanitizer15internal_getpidEv _ZN11__sanitizer9CloseFileEi _ZN11__sanitizer17internal_snprintfEPcjPKcz _ZN11__sanitizer16internal_strlcatEPcPKcj _ZN11__sanitizer8OpenFileEPKcNS_14FileAccessModeEPi _ZN11__sanitizer10ReportFile13SetReportPathEPKc _ZN11__sanitizer15internal_strcmpEPKcS1_ _ZN11__sanitizer15IsPathSeparatorEc _ZN11__sanitizer9DirExistsEPKc _ZN11__sanitizer9CreateDirEPKc _ZN11__sanitizer16ReadFileToBufferEPKcPPcPjS4_jPi _ZN11__sanitizer12ReadFromFileEiPvjPjPi _ZN11__sanitizer16ReadFileToVectorEPKcPNS_24InternalMmapVectorNoCtorIcEEjPi _ZN11__sanitizer24InternalMmapVectorNoCtorIcE7ReallocEj _ZN11__sanitizer16FindPathToBinaryEPKc _ZN11__sanitizer10FileExistsEPKc _ZN11__sanitizer6GetEnvEPKc __sanitizer_set_report_path __sanitizer_set_report_fd __sanitizer_get_report_path _ZN11__sanitizer14report_file_muE _ZN11__sanitizer11CommonFlags11SetDefaultsEv _ZN11__sanitizer11CommonFlags8CopyFromERKS0_ _ZN11__sanitizer22SubstituteForFlagValueEPKcPcj _ZN11__sanitizer20RegisterIncludeFlagsEPNS_10FlagParserEPNS_11CommonFlagsE _ZN11__sanitizer10FlagParser5AllocE _ZTVN11__sanitizer18FlagHandlerIncludeE _ZN11__sanitizer10FlagParser15RegisterHandlerEPKcPNS_15FlagHandlerBaseES2_ _ZN11__sanitizer19RegisterCommonFlagsEPNS_10FlagParserEPNS_11CommonFlagsE _ZTVN11__sanitizer11FlagHandlerIbEE _ZTVN11__sanitizer11FlagHandlerIPKcEE _ZTVN11__sanitizer11FlagHandlerIiEE _ZTVN11__sanitizer11FlagHandlerINS_16HandleSignalModeEEE _ZTVN11__sanitizer11FlagHandlerIjEE _ZN11__sanitizer21InitializeCommonFlagsEPNS_11CommonFlagsE _ZN11__sanitizer29InitializePlatformCommonFlagsEPNS_11CommonFlagsE _ZN11__sanitizer18FlagHandlerInclude5ParseEPKc _ZN11__sanitizer10FlagParser9ParseFileEPKcb _ZN11__sanitizer18FlagHandlerInclude6FormatEPcj _ZN11__sanitizer11FlagHandlerIbE5ParseEPKc _ZN11__sanitizer11FlagHandlerIbE6FormatEPcj _ZN11__sanitizer11FlagHandlerIPKcE5ParseES2_ _ZN11__sanitizer11FlagHandlerIPKcE6FormatEPcj _ZN11__sanitizer11FlagHandlerIiE5ParseEPKc _ZN11__sanitizer23internal_simple_strtollEPKcPS1_i _ZN11__sanitizer11FlagHandlerIiE6FormatEPcj _ZN11__sanitizer11FlagHandlerINS_16HandleSignalModeEE5ParseEPKc _ZN11__sanitizer11FlagHandlerINS_16HandleSignalModeEE6FormatEPcj _ZN11__sanitizer11FlagHandlerIjE5ParseEPKc _ZN11__sanitizer11FlagHandlerIjE6FormatEPcj _ZN11__sanitizer23ReportUnrecognizedFlagsEv _ZN11__sanitizer13unknown_flagsE _ZN11__sanitizer16internal_strnlenEPKcj _ZN11__sanitizer10FlagParser21PrintFlagDescriptionsEv _ZN11__sanitizer10FlagParser15skip_whitespaceEv _ZN11__sanitizer10FlagParser10parse_flagEPKc _ZN11__sanitizer10FlagParser18ParseStringFromEnvEPKc _ZN11__sanitizer10FlagParser11ParseStringEPKcS2_ _ZN11__sanitizer10FlagParserC2Ev _ZN11__sanitizer10FlagParserC1Ev _ZN11__sanitizer14internal_atollEPKc _ZN11__sanitizer15internal_memchrEPKvij _ZN11__sanitizer15internal_memcmpEPKvS1_j _ZN11__sanitizer16internal_strcspnEPKcS1_ _ZN11__sanitizer16internal_strncmpEPKcS1_j _ZN11__sanitizer16internal_strncatEPcPKcj _ZN11__sanitizer16internal_strlcpyEPcPKcj _ZN11__sanitizer15internal_wcslenEPKw _ZN11__sanitizer16internal_wcsnlenEPKwj _ZN11__sanitizer11mem_is_zeroEPKcj _ZN11__sanitizer9Semaphore4WaitEv _ZN11__sanitizer9Semaphore4PostEj _ZN11__sanitizer13ListOfModules4initEv syscall _ZN11__sanitizer20internal_sigprocmaskEiPmS0_ _ZN11__sanitizer19internal_sigfillsetEPm _ZN11__sanitizer18internal_sigdelsetEPmi _ZN11__sanitizer16internal_iserrorEjPi __errno _ZN11__sanitizer13internal_mmapEPvjiiiy _ZN11__sanitizer15internal_munmapEPvj _ZN11__sanitizer17internal_mprotectEPvji _ZN11__sanitizer16internal_madviseEjji _ZN11__sanitizer14internal_closeEi _ZN11__sanitizer13internal_openEPKcij _ZN11__sanitizer13internal_readEiPvj _ZN11__sanitizer14internal_writeEiPKvj _ZN11__sanitizer12internal_dupEi _ZN11__sanitizer13internal_dup2Eii _ZN11__sanitizer20internal_sched_yieldEv __udivdi3 _ZN11__sanitizer15internal_execveEPKcPKPcS4_ _ZN11__sanitizer14internal__exitEi _ZN11__sanitizer23ShouldMockFailureToOpenEPKc _ZN11__sanitizer6GetTidEv clock_gettime __libc_stack_end _ZN11__sanitizer10GetEnvironEv _ZN11__sanitizer9FutexWaitEPNS_15atomic_uint32_tEj _ZN11__sanitizer9FutexWakeEPNS_15atomic_uint32_tEj _ZN11__sanitizer15internal_ptraceEiiPvS0_ _ZN11__sanitizer16internal_waitpidEiPii _ZN11__sanitizer16internal_getppidEv _ZN11__sanitizer14internal_prctlEijjjj _ZN11__sanitizer20internal_sigaltstackEPKvPv _ZN11__sanitizer13internal_forkEv _ZN11__sanitizer29internal_sigaction_norestorerEiPKvPv _ZN11__sanitizer12ThreadListerC2Ei _ZN11__sanitizer12ThreadLister11ListThreadsEPNS_18InternalMmapVectorIyEE _ZN11__sanitizer24InternalMmapVectorNoCtorIyE9push_backERKy _ZN11__sanitizer12ThreadLister7IsAliveEi _ZN11__sanitizer24InternalMmapVectorNoCtorIyE7ReallocEj _ZN11__sanitizer24InternalMmapVectorNoCtorIcE9push_backERKc _ZN11__sanitizer12ThreadListerD2Ev _ZN11__sanitizer24GetMaxUserVirtualAddressEv _ZN11__sanitizer19MemoryMappingLayoutC1Eb _ZNK11__sanitizer19MemoryMappingLayout5ErrorEv _ZN11__sanitizer19MemoryMappingLayoutD1Ev _ZN11__sanitizer19MemoryMappingLayout4NextEPNS_19MemoryMappedSegmentE _ZN11__sanitizer14internal_cloneEPFiPvES0_iS0_PiS0_S3_ _ZN11__sanitizer14internal_unameEP7utsname _ZN11__sanitizer18AndroidGetApiLevelEv _DYNAMIC dl_iterate_phdr _ZN11__sanitizer19GetHandleSignalModeEi _ZN11__sanitizer21internal_start_threadEPFPvS0_ES0_ _ZN11__sanitizer19real_pthread_createEPvS0_PFS0_S0_ES0_ _ZN11__sanitizer20internal_join_threadEPv _ZN11__sanitizer17real_pthread_joinEPvPS0_ _ZNK11__sanitizer13SignalContext12GetWriteFlagEv _ZNK11__sanitizer13SignalContext21IsTrueFaultingAddressEv _ZN11__sanitizer13SignalContext16DumpAllRegistersEPv _ZN11__sanitizer13SignalContext10InitPcSpBpEv _ZN11__sanitizer23InitializePlatformEarlyEv _ZN11__sanitizer11MaybeReexecEv _ZN11__sanitizer9CheckASLREv _ZN11__sanitizer12ThreadListerC1Ei _ZN11__sanitizer12ThreadListerD1Ev _ZN11__sanitizer22__sanitizer_in_addr_szEi _ZN11__sanitizer17struct_utsname_szE _ZN11__sanitizer14struct_stat_szE _ZN11__sanitizer16struct_rusage_szE _ZN11__sanitizer12siginfo_t_szE _ZN11__sanitizer17struct_stack_t_szE _ZN11__sanitizer19struct_itimerval_szE _ZN11__sanitizer8pid_t_szE _ZN11__sanitizer10timeval_szE _ZN11__sanitizer8uid_t_szE _ZN11__sanitizer8gid_t_szE _ZN11__sanitizer12mbstate_t_szE _ZN11__sanitizer13struct_tms_szE _ZN11__sanitizer21struct_sched_param_szE _ZN11__sanitizer15struct_regex_szE _ZN11__sanitizer18struct_regmatch_szE _ZN11__sanitizer17struct_sysinfo_szE _ZN11__sanitizer27__user_cap_header_struct_szE _ZN11__sanitizer25__user_cap_data_struct_szE _ZN11__sanitizer18struct_timespec_szE _ZN11__sanitizer20struct_itimerspec_szE _ZN11__sanitizer7af_inetE _ZN11__sanitizer8path_maxE _ZN11__sanitizer15struct_ifreq_szE _ZN11__sanitizer17struct_termios_szE _ZN11__sanitizer17struct_winsize_szE _ZN11__sanitizer16struct_arpreq_szE _ZN11__sanitizer19struct_cdrom_msf_szE _ZN11__sanitizer28struct_cdrom_multisession_szE _ZN11__sanitizer26struct_cdrom_read_audio_szE _ZN11__sanitizer23struct_cdrom_subchnl_szE _ZN11__sanitizer18struct_cdrom_ti_szE _ZN11__sanitizer24struct_cdrom_tocentry_szE _ZN11__sanitizer22struct_cdrom_tochdr_szE _ZN11__sanitizer23struct_cdrom_volctrl_szE _ZN11__sanitizer19struct_ff_effect_szE _ZN11__sanitizer29struct_floppy_drive_params_szE _ZN11__sanitizer29struct_floppy_drive_struct_szE _ZN11__sanitizer26struct_floppy_fdc_state_szE _ZN11__sanitizer27struct_floppy_max_errors_szE _ZN11__sanitizer24struct_floppy_raw_cmd_szE _ZN11__sanitizer23struct_floppy_struct_szE _ZN11__sanitizer29struct_floppy_write_errors_szE _ZN11__sanitizer22struct_format_descr_szE _ZN11__sanitizer20struct_hd_driveid_szE _ZN11__sanitizer21struct_hd_geometry_szE _ZN11__sanitizer23struct_input_absinfo_szE _ZN11__sanitizer18struct_input_id_szE _ZN11__sanitizer15struct_mtpos_szE _ZN11__sanitizer17struct_rtentry_szE _ZN11__sanitizer20struct_vt_consize_szE _ZN11__sanitizer18struct_vt_sizes_szE _ZN11__sanitizer17struct_vt_stat_szE _ZN11__sanitizer21struct_copr_buffer_szE _ZN11__sanitizer24struct_copr_debug_buf_szE _ZN11__sanitizer18struct_copr_msg_szE _ZN11__sanitizer19struct_midi_info_szE _ZN11__sanitizer15struct_mtget_szE _ZN11__sanitizer14struct_mtop_szE _ZN11__sanitizer24struct_sbi_instrument_szE _ZN11__sanitizer23struct_seq_event_rec_szE _ZN11__sanitizer20struct_synth_info_szE _ZN11__sanitizer17struct_vt_mode_szE _ZN11__sanitizer18__sanitizer_bufsizE _ZN11__sanitizer17IOCTL_NOT_PRESENTE _ZN11__sanitizer14IOCTL_FIOASYNCE _ZN11__sanitizer13IOCTL_FIOCLEXE _ZN11__sanitizer15IOCTL_FIOGETOWNE _ZN11__sanitizer13IOCTL_FIONBIOE _ZN11__sanitizer14IOCTL_FIONCLEXE _ZN11__sanitizer15IOCTL_FIOSETOWNE _ZN11__sanitizer18IOCTL_SIOCADDMULTIE _ZN11__sanitizer16IOCTL_SIOCATMARKE _ZN11__sanitizer18IOCTL_SIOCDELMULTIE _ZN11__sanitizer17IOCTL_SIOCGIFADDRE _ZN11__sanitizer20IOCTL_SIOCGIFBRDADDRE _ZN11__sanitizer17IOCTL_SIOCGIFCONFE _ZN11__sanitizer20IOCTL_SIOCGIFDSTADDRE _ZN11__sanitizer18IOCTL_SIOCGIFFLAGSE _ZN11__sanitizer19IOCTL_SIOCGIFMETRICE _ZN11__sanitizer16IOCTL_SIOCGIFMTUE _ZN11__sanitizer20IOCTL_SIOCGIFNETMASKE _ZN11__sanitizer15IOCTL_SIOCGPGRPE _ZN11__sanitizer17IOCTL_SIOCSIFADDRE _ZN11__sanitizer20IOCTL_SIOCSIFBRDADDRE _ZN11__sanitizer20IOCTL_SIOCSIFDSTADDRE _ZN11__sanitizer18IOCTL_SIOCSIFFLAGSE _ZN11__sanitizer19IOCTL_SIOCSIFMETRICE _ZN11__sanitizer16IOCTL_SIOCSIFMTUE _ZN11__sanitizer20IOCTL_SIOCSIFNETMASKE _ZN11__sanitizer15IOCTL_SIOCSPGRPE _ZN11__sanitizer14IOCTL_TIOCCONSE _ZN11__sanitizer14IOCTL_TIOCEXCLE _ZN11__sanitizer14IOCTL_TIOCGETDE _ZN11__sanitizer15IOCTL_TIOCGPGRPE _ZN11__sanitizer16IOCTL_TIOCGWINSZE _ZN11__sanitizer14IOCTL_TIOCMBICE _ZN11__sanitizer14IOCTL_TIOCMBISE _ZN11__sanitizer14IOCTL_TIOCMGETE _ZN11__sanitizer14IOCTL_TIOCMSETE _ZN11__sanitizer15IOCTL_TIOCNOTTYE _ZN11__sanitizer14IOCTL_TIOCNXCLE _ZN11__sanitizer14IOCTL_TIOCOUTQE _ZN11__sanitizer13IOCTL_TIOCPKTE _ZN11__sanitizer15IOCTL_TIOCSCTTYE _ZN11__sanitizer14IOCTL_TIOCSETDE _ZN11__sanitizer15IOCTL_TIOCSPGRPE _ZN11__sanitizer13IOCTL_TIOCSTIE _ZN11__sanitizer16IOCTL_TIOCSWINSZE _ZN11__sanitizer15IOCTL_EVIOCGABSE _ZN11__sanitizer15IOCTL_EVIOCGBITE _ZN11__sanitizer19IOCTL_EVIOCGEFFECTSE _ZN11__sanitizer14IOCTL_EVIOCGIDE _ZN11__sanitizer15IOCTL_EVIOCGKEYE _ZN11__sanitizer19IOCTL_EVIOCGKEYCODEE _ZN11__sanitizer15IOCTL_EVIOCGLEDE _ZN11__sanitizer16IOCTL_EVIOCGNAMEE _ZN11__sanitizer16IOCTL_EVIOCGPHYSE _ZN11__sanitizer15IOCTL_EVIOCGRABE _ZN11__sanitizer15IOCTL_EVIOCGREPE _ZN11__sanitizer15IOCTL_EVIOCGSNDE _ZN11__sanitizer14IOCTL_EVIOCGSWE _ZN11__sanitizer16IOCTL_EVIOCGUNIQE _ZN11__sanitizer19IOCTL_EVIOCGVERSIONE _ZN11__sanitizer15IOCTL_EVIOCRMFFE _ZN11__sanitizer15IOCTL_EVIOCSABSE _ZN11__sanitizer14IOCTL_EVIOCSFFE _ZN11__sanitizer19IOCTL_EVIOCSKEYCODEE _ZN11__sanitizer15IOCTL_EVIOCSREPE _ZN11__sanitizer15IOCTL_BLKFLSBUFE _ZN11__sanitizer16IOCTL_BLKGETSIZEE _ZN11__sanitizer14IOCTL_BLKRAGETE _ZN11__sanitizer14IOCTL_BLKRASETE _ZN11__sanitizer14IOCTL_BLKROGETE _ZN11__sanitizer14IOCTL_BLKROSETE _ZN11__sanitizer15IOCTL_BLKRRPARTE _ZN11__sanitizer16IOCTL_CDROMEJECTE _ZN11__sanitizer19IOCTL_CDROMEJECT_SWE _ZN11__sanitizer23IOCTL_CDROMMULTISESSIONE _ZN11__sanitizer16IOCTL_CDROMPAUSEE _ZN11__sanitizer18IOCTL_CDROMPLAYMSFE _ZN11__sanitizer21IOCTL_CDROMPLAYTRKINDE _ZN11__sanitizer20IOCTL_CDROMREADAUDIOE _ZN11__sanitizer21IOCTL_CDROMREADCOOKEDE _ZN11__sanitizer20IOCTL_CDROMREADMODE1E _ZN11__sanitizer20IOCTL_CDROMREADMODE2E _ZN11__sanitizer18IOCTL_CDROMREADRAWE _ZN11__sanitizer23IOCTL_CDROMREADTOCENTRYE _ZN11__sanitizer21IOCTL_CDROMREADTOCHDRE _ZN11__sanitizer16IOCTL_CDROMRESETE _ZN11__sanitizer17IOCTL_CDROMRESUMEE _ZN11__sanitizer15IOCTL_CDROMSEEKE _ZN11__sanitizer16IOCTL_CDROMSTARTE _ZN11__sanitizer15IOCTL_CDROMSTOPE _ZN11__sanitizer18IOCTL_CDROMSUBCHNLE _ZN11__sanitizer18IOCTL_CDROMVOLCTRLE _ZN11__sanitizer18IOCTL_CDROMVOLREADE _ZN11__sanitizer19IOCTL_CDROM_GET_UPCE _ZN11__sanitizer14IOCTL_FDCLRPRME _ZN11__sanitizer14IOCTL_FDDEFPRME _ZN11__sanitizer13IOCTL_FDFLUSHE _ZN11__sanitizer14IOCTL_FDFMTBEGE _ZN11__sanitizer14IOCTL_FDFMTENDE _ZN11__sanitizer14IOCTL_FDFMTTRKE _ZN11__sanitizer17IOCTL_FDGETDRVPRME _ZN11__sanitizer18IOCTL_FDGETDRVSTATE _ZN11__sanitizer17IOCTL_FDGETDRVTYPE _ZN11__sanitizer18IOCTL_FDGETFDCSTATE _ZN11__sanitizer18IOCTL_FDGETMAXERRSE _ZN11__sanitizer14IOCTL_FDGETPRME _ZN11__sanitizer14IOCTL_FDMSGOFFE _ZN11__sanitizer13IOCTL_FDMSGONE _ZN11__sanitizer19IOCTL_FDPOLLDRVSTATE _ZN11__sanitizer14IOCTL_FDRAWCMDE _ZN11__sanitizer13IOCTL_FDRESETE _ZN11__sanitizer17IOCTL_FDSETDRVPRME _ZN11__sanitizer20IOCTL_FDSETEMSGTRESHE _ZN11__sanitizer18IOCTL_FDSETMAXERRSE _ZN11__sanitizer14IOCTL_FDSETPRME _ZN11__sanitizer15IOCTL_FDTWADDLEE _ZN11__sanitizer17IOCTL_FDWERRORCLRE _ZN11__sanitizer17IOCTL_FDWERRORGETE _ZN11__sanitizer20IOCTL_HDIO_DRIVE_CMDE _ZN11__sanitizer17IOCTL_HDIO_GETGEOE _ZN11__sanitizer20IOCTL_HDIO_GET_32BITE _ZN11__sanitizer18IOCTL_HDIO_GET_DMAE _ZN11__sanitizer23IOCTL_HDIO_GET_IDENTITYE _ZN11__sanitizer27IOCTL_HDIO_GET_KEEPSETTINGSE _ZN11__sanitizer24IOCTL_HDIO_GET_MULTCOUNTE _ZN11__sanitizer21IOCTL_HDIO_GET_NOWERRE _ZN11__sanitizer25IOCTL_HDIO_GET_UNMASKINTRE _ZN11__sanitizer20IOCTL_HDIO_SET_32BITE _ZN11__sanitizer18IOCTL_HDIO_SET_DMAE _ZN11__sanitizer27IOCTL_HDIO_SET_KEEPSETTINGSE _ZN11__sanitizer24IOCTL_HDIO_SET_MULTCOUNTE _ZN11__sanitizer21IOCTL_HDIO_SET_NOWERRE _ZN11__sanitizer25IOCTL_HDIO_SET_UNMASKINTRE _ZN11__sanitizer14IOCTL_MTIOCPOSE _ZN11__sanitizer21IOCTL_PPPIOCGASYNCMAPE _ZN11__sanitizer18IOCTL_PPPIOCGDEBUGE _ZN11__sanitizer18IOCTL_PPPIOCGFLAGSE _ZN11__sanitizer17IOCTL_PPPIOCGUNITE _ZN11__sanitizer22IOCTL_PPPIOCGXASYNCMAPE _ZN11__sanitizer21IOCTL_PPPIOCSASYNCMAPE _ZN11__sanitizer18IOCTL_PPPIOCSDEBUGE _ZN11__sanitizer18IOCTL_PPPIOCSFLAGSE _ZN11__sanitizer19IOCTL_PPPIOCSMAXCIDE _ZN11__sanitizer16IOCTL_PPPIOCSMRUE _ZN11__sanitizer22IOCTL_PPPIOCSXASYNCMAPE _ZN11__sanitizer15IOCTL_SIOCADDRTE _ZN11__sanitizer14IOCTL_SIOCDARPE _ZN11__sanitizer15IOCTL_SIOCDELRTE _ZN11__sanitizer15IOCTL_SIOCDRARPE _ZN11__sanitizer14IOCTL_SIOCGARPE _ZN11__sanitizer18IOCTL_SIOCGIFENCAPE _ZN11__sanitizer19IOCTL_SIOCGIFHWADDRE _ZN11__sanitizer16IOCTL_SIOCGIFMAPE _ZN11__sanitizer16IOCTL_SIOCGIFMEME _ZN11__sanitizer17IOCTL_SIOCGIFNAMEE _ZN11__sanitizer18IOCTL_SIOCGIFSLAVEE _ZN11__sanitizer15IOCTL_SIOCGRARPE _ZN11__sanitizer16IOCTL_SIOCGSTAMPE _ZN11__sanitizer14IOCTL_SIOCSARPE _ZN11__sanitizer18IOCTL_SIOCSIFENCAPE _ZN11__sanitizer19IOCTL_SIOCSIFHWADDRE _ZN11__sanitizer17IOCTL_SIOCSIFLINKE _ZN11__sanitizer16IOCTL_SIOCSIFMAPE _ZN11__sanitizer16IOCTL_SIOCSIFMEME _ZN11__sanitizer18IOCTL_SIOCSIFSLAVEE _ZN11__sanitizer15IOCTL_SIOCSRARPE _ZN11__sanitizer22IOCTL_SNDCTL_COPR_HALTE _ZN11__sanitizer22IOCTL_SNDCTL_COPR_LOADE _ZN11__sanitizer23IOCTL_SNDCTL_COPR_RCODEE _ZN11__sanitizer24IOCTL_SNDCTL_COPR_RCVMSGE _ZN11__sanitizer23IOCTL_SNDCTL_COPR_RDATAE _ZN11__sanitizer23IOCTL_SNDCTL_COPR_RESETE _ZN11__sanitizer21IOCTL_SNDCTL_COPR_RUNE _ZN11__sanitizer25IOCTL_SNDCTL_COPR_SENDMSGE _ZN11__sanitizer23IOCTL_SNDCTL_COPR_WCODEE _ZN11__sanitizer23IOCTL_SNDCTL_COPR_WDATAE _ZN11__sanitizer25IOCTL_SOUND_PCM_READ_BITSE _ZN11__sanitizer29IOCTL_SOUND_PCM_READ_CHANNELSE _ZN11__sanitizer27IOCTL_SOUND_PCM_READ_FILTERE _ZN11__sanitizer25IOCTL_SOUND_PCM_READ_RATEE _ZN11__sanitizer30IOCTL_SOUND_PCM_WRITE_CHANNELSE _ZN11__sanitizer28IOCTL_SOUND_PCM_WRITE_FILTERE _ZN11__sanitizer12IOCTL_TCFLSHE _ZN11__sanitizer12IOCTL_TCGETSE _ZN11__sanitizer12IOCTL_TCSBRKE _ZN11__sanitizer13IOCTL_TCSBRKPE _ZN11__sanitizer12IOCTL_TCSETSE _ZN11__sanitizer13IOCTL_TCSETSFE _ZN11__sanitizer13IOCTL_TCSETSWE _ZN11__sanitizer12IOCTL_TCXONCE _ZN11__sanitizer20IOCTL_TIOCGLCKTRMIOSE _ZN11__sanitizer18IOCTL_TIOCGSOFTCARE _ZN11__sanitizer13IOCTL_TIOCINQE _ZN11__sanitizer15IOCTL_TIOCLINUXE _ZN11__sanitizer19IOCTL_TIOCSERCONFIGE _ZN11__sanitizer19IOCTL_TIOCSERGETLSRE _ZN11__sanitizer18IOCTL_TIOCSERGWILDE _ZN11__sanitizer18IOCTL_TIOCSERSWILDE _ZN11__sanitizer20IOCTL_TIOCSLCKTRMIOSE _ZN11__sanitizer18IOCTL_TIOCSSOFTCARE _ZN11__sanitizer20IOCTL_VT_DISALLOCATEE _ZN11__sanitizer17IOCTL_VT_GETSTATEE _ZN11__sanitizer15IOCTL_VT_RESIZEE _ZN11__sanitizer16IOCTL_VT_RESIZEXE _ZN11__sanitizer16IOCTL_VT_SENDSIGE _ZN11__sanitizer14IOCTL_MTIOCGETE _ZN11__sanitizer14IOCTL_MTIOCTOPE _ZN11__sanitizer27IOCTL_SNDCTL_DSP_GETBLKSIZEE _ZN11__sanitizer24IOCTL_SNDCTL_DSP_GETFMTSE _ZN11__sanitizer25IOCTL_SNDCTL_DSP_NONBLOCKE _ZN11__sanitizer21IOCTL_SNDCTL_DSP_POSTE _ZN11__sanitizer22IOCTL_SNDCTL_DSP_RESETE _ZN11__sanitizer23IOCTL_SNDCTL_DSP_SETFMTE _ZN11__sanitizer28IOCTL_SNDCTL_DSP_SETFRAGMENTE _ZN11__sanitizer22IOCTL_SNDCTL_DSP_SPEEDE _ZN11__sanitizer23IOCTL_SNDCTL_DSP_STEREOE _ZN11__sanitizer26IOCTL_SNDCTL_DSP_SUBDIVIDEE _ZN11__sanitizer21IOCTL_SNDCTL_DSP_SYNCE _ZN11__sanitizer26IOCTL_SNDCTL_FM_4OP_ENABLEE _ZN11__sanitizer26IOCTL_SNDCTL_FM_LOAD_INSTRE _ZN11__sanitizer22IOCTL_SNDCTL_MIDI_INFOE _ZN11__sanitizer25IOCTL_SNDCTL_MIDI_PRETIMEE _ZN11__sanitizer25IOCTL_SNDCTL_SEQ_CTRLRATEE _ZN11__sanitizer27IOCTL_SNDCTL_SEQ_GETINCOUNTE _ZN11__sanitizer28IOCTL_SNDCTL_SEQ_GETOUTCOUNTE _ZN11__sanitizer24IOCTL_SNDCTL_SEQ_NRMIDISE _ZN11__sanitizer25IOCTL_SNDCTL_SEQ_NRSYNTHSE _ZN11__sanitizer26IOCTL_SNDCTL_SEQ_OUTOFBANDE _ZN11__sanitizer22IOCTL_SNDCTL_SEQ_PANICE _ZN11__sanitizer25IOCTL_SNDCTL_SEQ_PERCMODEE _ZN11__sanitizer22IOCTL_SNDCTL_SEQ_RESETE _ZN11__sanitizer29IOCTL_SNDCTL_SEQ_RESETSAMPLESE _ZN11__sanitizer21IOCTL_SNDCTL_SEQ_SYNCE _ZN11__sanitizer25IOCTL_SNDCTL_SEQ_TESTMIDIE _ZN11__sanitizer26IOCTL_SNDCTL_SEQ_THRESHOLDE _ZN11__sanitizer23IOCTL_SNDCTL_SYNTH_INFOE _ZN11__sanitizer25IOCTL_SNDCTL_SYNTH_MEMAVLE _ZN11__sanitizer26IOCTL_SNDCTL_TMR_METRONOMEE _ZN11__sanitizer23IOCTL_SNDCTL_TMR_SELECTE _ZN11__sanitizer23IOCTL_SNDCTL_TMR_SOURCEE _ZN11__sanitizer22IOCTL_SNDCTL_TMR_TEMPOE _ZN11__sanitizer25IOCTL_SNDCTL_TMR_TIMEBASEE _ZN11__sanitizer29IOCTL_SOUND_MIXER_READ_ALTPCME _ZN11__sanitizer27IOCTL_SOUND_MIXER_READ_BASSE _ZN11__sanitizer27IOCTL_SOUND_MIXER_READ_CAPSE _ZN11__sanitizer25IOCTL_SOUND_MIXER_READ_CDE _ZN11__sanitizer30IOCTL_SOUND_MIXER_READ_DEVMASKE _ZN11__sanitizer30IOCTL_SOUND_MIXER_READ_ENHANCEE _ZN11__sanitizer28IOCTL_SOUND_MIXER_READ_IGAINE _ZN11__sanitizer27IOCTL_SOUND_MIXER_READ_IMIXE _ZN11__sanitizer27IOCTL_SOUND_MIXER_READ_LINEE _ZN11__sanitizer28IOCTL_SOUND_MIXER_READ_LINE1E _ZN11__sanitizer28IOCTL_SOUND_MIXER_READ_LINE2E _ZN11__sanitizer28IOCTL_SOUND_MIXER_READ_LINE3E _ZN11__sanitizer26IOCTL_SOUND_MIXER_READ_MICE _ZN11__sanitizer28IOCTL_SOUND_MIXER_READ_OGAINE _ZN11__sanitizer26IOCTL_SOUND_MIXER_READ_PCME _ZN11__sanitizer29IOCTL_SOUND_MIXER_READ_RECLEVE _ZN11__sanitizer30IOCTL_SOUND_MIXER_READ_RECMASKE _ZN11__sanitizer29IOCTL_SOUND_MIXER_READ_RECSRCE _ZN11__sanitizer30IOCTL_SOUND_MIXER_READ_SPEAKERE _ZN11__sanitizer33IOCTL_SOUND_MIXER_READ_STEREODEVSE _ZN11__sanitizer28IOCTL_SOUND_MIXER_READ_SYNTHE _ZN11__sanitizer29IOCTL_SOUND_MIXER_READ_TREBLEE _ZN11__sanitizer29IOCTL_SOUND_MIXER_READ_VOLUMEE _ZN11__sanitizer30IOCTL_SOUND_MIXER_WRITE_ALTPCME _ZN11__sanitizer28IOCTL_SOUND_MIXER_WRITE_BASSE _ZN11__sanitizer26IOCTL_SOUND_MIXER_WRITE_CDE _ZN11__sanitizer31IOCTL_SOUND_MIXER_WRITE_ENHANCEE _ZN11__sanitizer29IOCTL_SOUND_MIXER_WRITE_IGAINE _ZN11__sanitizer28IOCTL_SOUND_MIXER_WRITE_IMIXE _ZN11__sanitizer28IOCTL_SOUND_MIXER_WRITE_LINEE _ZN11__sanitizer29IOCTL_SOUND_MIXER_WRITE_LINE1E _ZN11__sanitizer29IOCTL_SOUND_MIXER_WRITE_LINE2E _ZN11__sanitizer29IOCTL_SOUND_MIXER_WRITE_LINE3E _ZN11__sanitizer27IOCTL_SOUND_MIXER_WRITE_MICE _ZN11__sanitizer29IOCTL_SOUND_MIXER_WRITE_OGAINE _ZN11__sanitizer27IOCTL_SOUND_MIXER_WRITE_PCME _ZN11__sanitizer30IOCTL_SOUND_MIXER_WRITE_RECLEVE _ZN11__sanitizer30IOCTL_SOUND_MIXER_WRITE_RECSRCE _ZN11__sanitizer31IOCTL_SOUND_MIXER_WRITE_SPEAKERE _ZN11__sanitizer29IOCTL_SOUND_MIXER_WRITE_SYNTHE _ZN11__sanitizer30IOCTL_SOUND_MIXER_WRITE_TREBLEE _ZN11__sanitizer30IOCTL_SOUND_MIXER_WRITE_VOLUMEE _ZN11__sanitizer17IOCTL_VT_ACTIVATEE _ZN11__sanitizer16IOCTL_VT_GETMODEE _ZN11__sanitizer16IOCTL_VT_OPENQRYE _ZN11__sanitizer16IOCTL_VT_RELDISPE _ZN11__sanitizer16IOCTL_VT_SETMODEE _ZN11__sanitizer19IOCTL_VT_WAITACTIVEE _ZN11__sanitizer14si_SEGV_MAPERRE _ZN11__sanitizer14si_SEGV_ACCERRE _ZN11__sanitizer18GetMmapGranularityEv _ZN11__sanitizer9MmapNamedEPvjiiPKc _ZN11__sanitizer18MmapNoReserveOrDieEjPKc _ZN11__sanitizer16MprotectNoAccessEjj _ZN11__sanitizer16MprotectReadOnlyEjj _ZN11__sanitizer19MprotectMallocZonesEPvi _ZN11__sanitizer14IsAbsolutePathEPKc _ZNK11__sanitizer13SignalContext10GetAddressEv _ZNK11__sanitizer13SignalContext14IsMemoryAccessEv _ZNK11__sanitizer13SignalContext8DescribeEv _ZN11__sanitizer9VSNPrintfEPciPKcS0_ _ZN11__sanitizer26SetPrintfAndReportCallbackEPFvPKcE __sanitizer_on_print _ZN11__sanitizer18LogMessageOnPrintfEPKc _ZN11__sanitizer9IsDecimalEc _ZN11__sanitizer8ParseHexEPPKc _ZN11__sanitizer19MemoryMappingLayoutC2Eb _ZTVN11__sanitizer19MemoryMappingLayoutE _ZN11__sanitizer12ReadProcMapsEPNS_16ProcSelfMapsBuffE _ZN11__sanitizer19MemoryMappingLayout19CacheMemoryMappingsEv _ZN11__sanitizer19MemoryMappingLayout5ResetEv _ZN11__sanitizer19MemoryMappingLayoutD2Ev _ZN11__sanitizer19MemoryMappingLayout17DumpListOfModulesEPNS_24InternalMmapVectorNoCtorINS_12LoadedModuleEEE _ZN11__sanitizer24InternalMmapVectorNoCtorINS_12LoadedModuleEE9push_backERKS1_ _ZN11__sanitizer24InternalMmapVectorNoCtorINS_12LoadedModuleEE7ReallocEj _ZN11__sanitizer18SuppressionContextC2EPPKci _ZN11__sanitizer18SuppressionContext13ParseFromFileEPKc _ZN11__sanitizer18SuppressionContext5ParseEPKc _ZN11__sanitizer24InternalMmapVectorNoCtorINS_11SuppressionEE9push_backERKS1_ _ZN11__sanitizer18SuppressionContext5MatchEPKcS2_PPNS_11SuppressionE _ZNK11__sanitizer18SuppressionContext18HasSuppressionTypeEPKc _ZN11__sanitizer24InternalMmapVectorNoCtorINS_11SuppressionEE7ReallocEj _ZN11__sanitizer18SuppressionContext10GetMatchedEPNS_18InternalMmapVectorIPNS_11SuppressionEEE _ZN11__sanitizer24InternalMmapVectorNoCtorIPNS_11SuppressionEE9push_backERKS2_ _ZN11__sanitizer24InternalMmapVectorNoCtorIPNS_11SuppressionEE7ReallocEj _ZN11__sanitizer18SuppressionContextC1EPPKci _ZN11__sanitizer21DTLS_on_libc_memalignEPvj _ZN11__sanitizer8DTLS_GetEv _ZN11__sanitizer12DTLS_DestroyEv _ZN11__sanitizer17ThreadContextBaseC2Ej _ZTVN11__sanitizer17ThreadContextBaseE _ZN11__sanitizer14ThreadRegistryC2EPFPNS_17ThreadContextBaseEjE _ZN11__sanitizer14ThreadRegistry12CreateThreadEjbjPv _ZN11__sanitizer24InternalMmapVectorNoCtorIPNS_17ThreadContextBaseEE9push_backERKS2_ _ZN11__sanitizer12DenseMapBaseINS_8DenseMapIjjNS_12DenseMapInfoIjEENS_6detail12DenseMapPairIjjEEEEjjS3_S6_E11try_emplaceIJRjEEENS5_IPS6_bEERKjDpOT_ _ZN11__sanitizer24InternalMmapVectorNoCtorIPNS_17ThreadContextBaseEE7ReallocEj _ZN11__sanitizer12DenseMapBaseINS_8DenseMapIjjNS_12DenseMapInfoIjEENS_6detail12DenseMapPairIjjEEEEjjS3_S6_E16InsertIntoBucketIRKjJRjEEEPS6_SD_OT_DpOT0_ _ZN11__sanitizer14ThreadRegistry30RunCallbackForEachThreadLockedEPFvPNS_17ThreadContextBaseEPvES3_ _ZN11__sanitizer14ThreadRegistry23FindThreadContextLockedEPFbPNS_17ThreadContextBaseEPvES3_ _ZN11__sanitizer14ThreadRegistry29FindThreadContextByOsIDLockedEy _ZN11__sanitizer14ThreadRegistry13SetThreadNameEjPKc _ZN11__sanitizer14ThreadRegistry14QuarantinePushEPNS_17ThreadContextBaseE _ZN11__sanitizer14ThreadRegistry12FinishThreadEj _ZN11__sanitizer14ThreadRegistry11StartThreadEjyNS_10ThreadTypeEPv _ZN11__sanitizer17ThreadContextBase6OnDeadEv _ZN11__sanitizer17ThreadContextBase8OnJoinedEPv _ZN11__sanitizer17ThreadContextBase10OnFinishedEv _ZN11__sanitizer17ThreadContextBase9OnStartedEPv _ZN11__sanitizer17ThreadContextBase9OnCreatedEPv _ZN11__sanitizer17ThreadContextBase7OnResetEv _ZN11__sanitizer17ThreadContextBase10OnDetachedEPv _ZN11__sanitizer8DenseMapIjjNS_12DenseMapInfoIjEENS_6detail12DenseMapPairIjjEEE4growEj _ZN11__sanitizer8DenseMapIjjNS_12DenseMapInfoIjEENS_6detail12DenseMapPairIjjEEE15allocateBucketsEj _ZN11__sanitizer12DenseMapBaseINS_8DenseMapIjjNS_12DenseMapInfoIjEENS_6detail12DenseMapPairIjjEEEEjjS3_S6_E18moveFromOldBucketsEPS6_S9_ _ZN11__sanitizer17ThreadContextBaseC1Ej _ZN11__sanitizer14ThreadRegistryC1EPFPNS_17ThreadContextBaseEjE _ZN11__sanitizer14AddDieCallbackEPFvvE _ZN11__sanitizer17RemoveDieCallbackEPFvvE _ZN11__sanitizer18SetUserDieCallbackEPFvvE _ZN11__sanitizer5AbortEv _ZN11__sanitizer22SetCheckUnwindCallbackEPFvvE __sanitizer_set_death_callback _ZN11__sanitizer18StackDepotGetStatsEv _ZN11__sanitizer16BackgroundThreadEPv _ZN11__sanitizer6GetRSSEv __sanitizer_print_memory_profile _ZN11__sanitizer13WriteToSyslogEPKc _ZN11__sanitizer20WriteOneLineToSyslogEPKc _ZN11__sanitizer24ReserveShadowMemoryRangeEjjPKcb _ZN11__sanitizer23MmapFixedSuperNoReserveEjjPKc _ZN11__sanitizer20DontDumpShadowMemoryEjj _ZN11__sanitizer18MmapFixedNoReserveEjjPKc _ZN11__sanitizer10ProtectGapEjjjj _ZN11__sanitizer17MmapFixedNoAccessEjjPKc _ZN11__sanitizer30StackDepotStopBackgroundThreadEv __sanitizer_sandbox_on_notify _ZN11__sanitizer28PlatformPrepareForSandboxingEP29__sanitizer_sandbox_arguments _ZN11__sanitizer16SetErrnoToENOMEMEv _ZN11__sanitizer18internal_sigactionEiPKvPv _ZN11__sanitizer14real_sigactionEiPKvPv sigaction _ZN11__sanitizer26GetThreadStackTopAndBottomEbPjS0_ getrlimit pthread_attr_init pthread_self pthread_getattr_np _ZN11__sanitizer24my_pthread_attr_getstackEPvPS0_Pj pthread_attr_destroy _ZN11__sanitizer11InitTlsSizeEv __libc_get_static_tls_bounds _ZN11__sanitizer20GetThreadStackAndTlsEbPjS0_S0_S0_ _ZN11__sanitizer13ListOfModules12fallbackInitEv getrusage _ZN11__sanitizer14AndroidLogInitEv openlog async_safe_write_log syslog __android_log_write _ZN11__sanitizer15SetAbortMessageEPKc android_set_abort_message _ZN11__sanitizer17MonotonicNanoTimeEv getauxval _ZN11__sanitizer16MapDynamicShadowEjjjRj _ZN11__sanitizer12MmapNoAccessEj _ZN11__sanitizer13GetThreadSelfEv _ZN11__sanitizer22ReleaseMemoryPagesToOSEjj _ZN11__sanitizer28DisableCoreDumperIfNecessaryEv setrlimit abort _ZN11__sanitizer6AtexitEPFvvE mkdir _ZN11__sanitizer21SupportsColoredOutputEi isatty _ZN11__sanitizer23SetAlternateSignalStackEv sigaltstack _ZN11__sanitizer25UnsetAlternateSignalStackEv _ZN11__sanitizer27InstallDeadlySignalHandlersEPFviPvS0_E _ZNK11__sanitizer13SignalContext15IsStackOverflowEv _ZN11__sanitizer23IsAccessibleMemoryRangeEjj pipe real_pthread_attr_getstack pthread_attr_getstack _ZN11__sanitizer15StartSubprocessEPKcPKS1_S3_iii sysconf _ZN11__sanitizer16IsProcessRunningEi _ZN11__sanitizer15ThreadSuspender13SuspendThreadEy _ZNK11__sanitizer25SuspendedThreadsListLinux11ThreadCountEv _ZNK11__sanitizer25SuspendedThreadsListLinux11GetThreadIDEj _ZN11__sanitizer15ThreadSuspender17SuspendAllThreadsEv _ZN11__sanitizer12StopTheWorldEPFvRKNS_20SuspendedThreadsListEPvES3_ sched_yield _ZTVN11__sanitizer25SuspendedThreadsListLinuxE _ZNK11__sanitizer25SuspendedThreadsListLinux17GetRegistersAndSPEjPNS_18InternalMmapVectorIjEEPj _ZN11__sanitizer24InternalMmapVectorNoCtorIjE7ReallocEj __sancov_default_options _ZN8__sancov21InitializeSancovFlagsEv _ZN8__sancov30sancov_flags_dont_use_directlyE _ZN11__sanitizer18InitializeCoverageEbPKc __sanitizer_cov_dump __sanitizer_dump_coverage __sanitizer_get_module_and_offset_for_pc __sanitizer_cov_trace_pc_guard __sanitizer_cov_trace_pc_guard_init __sanitizer_dump_trace_pc_guard_coverage __sanitizer_cov_reset __sanitizer_cov_trace_cmp __sanitizer_cov_trace_cmp1 __sanitizer_cov_trace_cmp2 __sanitizer_cov_trace_cmp4 __sanitizer_cov_trace_cmp8 __sanitizer_cov_trace_const_cmp1 __sanitizer_cov_trace_const_cmp2 __sanitizer_cov_trace_const_cmp4 __sanitizer_cov_trace_const_cmp8 __sanitizer_cov_trace_switch __sanitizer_cov_trace_div4 __sanitizer_cov_trace_div8 __sanitizer_cov_trace_gep __sanitizer_cov_trace_pc_indir __sanitizer_cov_8bit_counters_init __sanitizer_cov_bool_flag_init __sanitizer_cov_pcs_init __sancov_lowest_stack _ZN11__sanitizer21ScopedErrorReportLock4LockEv _ZN11__sanitizer15ColorizeReportsEv _ZNK11__sanitizer10StackTrace5PrintEv _ZN11__sanitizer18ReportErrorSummaryEPKcPKNS_10StackTraceES1_ _ZN11__sanitizer21ScopedErrorReportLock6UnlockEv _ZN11__sanitizer10StackStore5StoreERKNS_10StackTraceEPj _ZN11__sanitizer10StackStore4LoadEj _ZN11__sanitizer10StackStore9BlockInfo11GetOrUnpackEPS0_ _ZN11__sanitizer9LzwDecodeIjNS_14SLeb128DecoderEPjEET1_T0_S4_S3_ _ZNK11__sanitizer10StackStore9AllocatedEv _ZN11__sanitizer10StackStore4PackENS0_11CompressionE _ZN11__sanitizer10StackStore9BlockInfo4PackENS0_11CompressionEPS0_ _ZN11__sanitizer9LzwEncodeIjPKjNS_14SLeb128EncoderEEET1_T0_S5_S4_ _ZN11__sanitizer24InternalMmapVectorNoCtorINS_6detail12DenseMapPairIPjS3_EEE9push_backERKS4_ _ZN11__sanitizer24InternalMmapVectorNoCtorINS_6detail12DenseMapPairIPjS3_EEE7ReallocEj _ZNK11__sanitizer12DenseMapBaseINS_8DenseMapINS_6detail12DenseMapPairIjjEEjNS_12DenseMapInfoIS4_EENS3_IS4_jEEEES4_jS6_S7_E15LookupBucketForIS4_EEbRKT_RPKS7_ _ZN11__sanitizer12DenseMapBaseINS_8DenseMapINS_6detail12DenseMapPairIjjEEjNS_12DenseMapInfoIS4_EENS3_IS4_jEEEES4_jS6_S7_E20InsertIntoBucketImplIS4_EEPS7_RKS4_RKT_SB_ _ZN11__sanitizer24InternalMmapVectorNoCtorIjE9push_backERKj _ZN11__sanitizer8DenseMapINS_6detail12DenseMapPairIjjEEjNS_12DenseMapInfoIS3_EENS2_IS3_jEEE4growEj _ZN11__sanitizer8DenseMapINS_6detail12DenseMapPairIjjEEjNS_12DenseMapInfoIS3_EENS2_IS3_jEEE15allocateBucketsEj _ZN11__sanitizer12DenseMapBaseINS_8DenseMapINS_6detail12DenseMapPairIjjEEjNS_12DenseMapInfoIS4_EENS3_IS4_jEEEES4_jS6_S7_E18moveFromOldBucketsEPS7_SA_ _ZN11__sanitizer14StackDepotNode5storeEjRKNS_10StackTraceEy _ZN11__sanitizer13StackDepotPutENS_10StackTraceE _ZN11__sanitizer14StackDepotBaseINS_14StackDepotNodeELi1ELi16EE3PutENS_10StackTraceEPb _ZNK11__sanitizer11TwoLevelMapINS_14StackDepotNodeELy32768ELy65536ENS_21LocalAddressSpaceViewENS_20NoOpMapUnmapCallbackEE6CreateEj _ZN11__sanitizer14StackDepotBaseINS_14StackDepotNodeELi1ELi16EE4lockEPNS_15atomic_uint32_tE _ZN11__sanitizer13StackDepotGetEj _ZN11__sanitizer10StackTrace20GetNextInstructionPcEj _ZN11__sanitizer10StackTrace12GetCurrentPcEv _ZN11__sanitizer18BufferedStackTrace10UnwindFastEjjjjj _ZN11__sanitizer18BufferedStackTrace14PopStackFramesEj _ZN11__sanitizer18BufferedStackTrace15LocatePcInTraceEj _ZNK11__sanitizer10StackTrace7PrintToEPNS_20InternalScopedStringE _ZN11__sanitizer24RenderNeedsSymbolizationEPKc _ZN11__sanitizer10Symbolizer9GetOrInitEv _ZN11__sanitizer10Symbolizer11SymbolizePCEj _ZN11__sanitizer15SymbolizedStack3NewEj _ZN11__sanitizer11RenderFrameEPNS_20InternalScopedStringEPKcijPKNS_11AddressInfoEbS3_S3_ _ZN11__sanitizer15SymbolizedStack8ClearAllEv _ZN11__sanitizer18BufferedStackTrace6UnwindEjjjPvjjb _ZN11__sanitizer18BufferedStackTrace10UnwindSlowEjPvj _ZN11__sanitizer18BufferedStackTrace10UnwindSlowEjj __sanitizer_symbolize_pc __sanitizer_symbolize_global _ZN11__sanitizer8DataInfoC1Ev _ZN11__sanitizer10Symbolizer13SymbolizeDataEjPNS_8DataInfoE _ZN11__sanitizer10RenderDataEPNS_20InternalScopedStringEPKcPKNS_8DataInfoES3_ _ZN11__sanitizer10Symbolizer27GetModuleNameAndOffsetForPCEjPPKcPj _ZN11__sanitizer20RenderModuleLocationEPNS_20InternalScopedStringEPKcjNS_10ModuleArchES3_ _ZN11__sanitizer20RenderSourceLocationEPNS_20InternalScopedStringEPKciibS3_ _ZN11__sanitizer11AddressInfoC2Ev _ZN11__sanitizer11AddressInfo5ClearEv _ZN11__sanitizer11AddressInfo14FillModuleInfoEPKcjNS_10ModuleArchE _ZN11__sanitizer11AddressInfo14FillModuleInfoERKNS_12LoadedModuleE _ZN11__sanitizer8DataInfoC2Ev _ZN11__sanitizer8DataInfo5ClearEv _ZN11__sanitizer10Symbolizer15ModuleNameOwner12GetOwnedCopyEPKc _ZN11__sanitizer24InternalMmapVectorNoCtorIPKcE9push_backERKS2_ _ZN11__sanitizer24InternalMmapVectorNoCtorIPKcE7ReallocEj _ZN11__sanitizer10SymbolizerC2ENS_13IntrusiveListINS_14SymbolizerToolEEE _ZN11__sanitizer10Symbolizer15SymbolizerScopeC2EPKS0_ _ZN11__sanitizer10Symbolizer15SymbolizerScopeD2Ev _ZN11__sanitizer10Symbolizer11symbolizer_E _ZN11__sanitizer10Symbolizer8init_mu_E _ZN11__sanitizer10Symbolizer21symbolizer_allocator_E _ZN11__sanitizer11AddressInfoC1Ev _ZN11__sanitizer10SymbolizerC1ENS_13IntrusiveListINS_14SymbolizerToolEEE _ZN11__sanitizer10Symbolizer15SymbolizerScopeC1EPKS0_ _ZN11__sanitizer10Symbolizer15SymbolizerScopeD1Ev _ZN11__sanitizer22LibbacktraceSymbolizer3getEPNS_17LowLevelAllocatorE _ZN11__sanitizer14SymbolizerTool14SymbolizeFrameEjPNS_9FrameInfoE _ZN11__sanitizer14SymbolizerTool5FlushEv _ZN11__sanitizer10Symbolizer12PlatformInitEv _ZN11__sanitizer10Symbolizer20FindModuleForAddressEj _ZN11__sanitizer10Symbolizer8DemangleEPKc _ZN11__sanitizer10Symbolizer16PlatformDemangleEPKc _ZN11__sanitizer14LLVMSymbolizerC2EPKcPNS_17LowLevelAllocatorE _ZTVN11__sanitizer14LLVMSymbolizerE _ZTVN11__sanitizer17SymbolizerProcessE _ZTVN11__sanitizer21LLVMSymbolizerProcessE _ZN11__sanitizer22ParseSymbolizePCOutputEPKcPNS_15SymbolizedStackE _ZN11__sanitizer24ParseSymbolizeDataOutputEPKcPNS_8DataInfoE _ZN11__sanitizer14LLVMSymbolizer11SymbolizePCEjPNS_15SymbolizedStackE _ZN11__sanitizer14LLVMSymbolizer20FormatAndSendCommandEPKcS2_jNS_10ModuleArchE _ZN11__sanitizer17SymbolizerProcess11SendCommandEPKc _ZN11__sanitizer14LLVMSymbolizer13SymbolizeDataEjPNS_8DataInfoE _ZN11__sanitizer14LLVMSymbolizer14SymbolizeFrameEjPNS_9FrameInfoE _ZN11__sanitizer24InternalMmapVectorNoCtorINS_9LocalInfoEE9push_backERKS1_ _ZN11__sanitizer17SymbolizerProcessC2EPKcb _ZN11__sanitizer17SymbolizerProcess18ReadFromSymbolizerEPcj _ZN11__sanitizer14SymbolizerTool8DemangleEPKc _ZN11__sanitizer17SymbolizerProcess7GetEnvPEv _ZNK11__sanitizer21LLVMSymbolizerProcess18ReachedEndOfOutputEPKcj _ZNK11__sanitizer21LLVMSymbolizerProcess7GetArgVEPKcRA16_S2_ _ZN11__sanitizer24InternalMmapVectorNoCtorINS_9LocalInfoEE7ReallocEj _ZN11__sanitizer17SymbolizerProcess25StartSymbolizerSubprocessEv _ZN11__sanitizer14LLVMSymbolizerC1EPKcPNS_17LowLevelAllocatorE _ZN11__sanitizer17SymbolizerProcessC1EPKcb __cxa_demangle _ZNK11__sanitizer16Addr2LineProcess18ReachedEndOfOutputEPKcj _ZN11__sanitizer16Addr2LineProcess18output_terminator_E __sanitizer_symbolize_set_demangle __sanitizer_symbolize_set_inline_frames __sanitizer_symbolize_data __sanitizer_symbolize_code _ZTVN11__sanitizer18InternalSymbolizerE _ZTVN11__sanitizer13Addr2LinePoolE _ZN11__sanitizer10Symbolizer14LateInitializeEv dlerror _ZNK11__sanitizer17SymbolizerProcess18ReachedEndOfOutputEPKcj _ZNK11__sanitizer17SymbolizerProcess7GetArgVEPKcRA16_S2_ _ZN11__sanitizer16Addr2LineProcess18ReadFromSymbolizerEPcj _ZNK11__sanitizer16Addr2LineProcess7GetArgVEPKcRA16_S2_ _ZN11__sanitizer18InternalSymbolizer11SymbolizePCEjPNS_15SymbolizedStackE _ZN11__sanitizer18InternalSymbolizer13SymbolizeDataEjPNS_8DataInfoE _ZN11__sanitizer18InternalSymbolizer5FlushEv __sanitizer_symbolize_flush _ZN11__sanitizer18InternalSymbolizer8DemangleEPKc __sanitizer_symbolize_demangle _ZN11__sanitizer13Addr2LinePool11SymbolizePCEjPNS_15SymbolizedStackE _ZN11__sanitizer13Addr2LinePool11SendCommandEPKcj _ZN11__sanitizer13Addr2LinePool13SymbolizeDataEjPNS_8DataInfoE _ZN11__sanitizer24InternalMmapVectorNoCtorIPNS_16Addr2LineProcessEE7ReallocEj _ZTVN11__sanitizer16Addr2LineProcessE _ZN11__sanitizer24InternalMmapVectorNoCtorIPNS_16Addr2LineProcessEE9push_backERKS2_ _ZN11__sanitizer18ReportErrorSummaryEPKcRKNS_11AddressInfoES1_ _ZN11__sanitizer19ReportMmapWriteExecEii _ZN11__sanitizer23StartReportDeadlySignalEv _ZN11__sanitizer18ReportDeadlySignalERKNS_13SignalContextEjPFvS2_PKvPNS_18BufferedStackTraceEES4_ _ZN11__sanitizer21ScopedErrorReportLock17reporting_thread_E _ZN11__sanitizer21ScopedErrorReportLock6mutex_E _ZN11__sanitizer21ScopedErrorReportLock11CheckLockedEv _ZN11__sanitizer27SanitizerInitializeUnwinderEv dlopen acquire_my_map_info_list release_my_map_info_list unwind_backtrace_signal_arch _Unwind_Backtrace _Unwind_GetIP _ZN6__lsan23DisableCounterUnderflowEv _ZN6__lsan5Flags11SetDefaultsEv _ZN6__lsan17RegisterLsanFlagsEPN11__sanitizer10FlagParserEPNS_5FlagsE _ZN6__lsan10lsan_flagsE __lsan_default_suppressions _ZN6__lsan9GetLinkerEv _ZN6__lsan14InitCommonLsanEv _ZN6__lsan33InitializePlatformSpecificModulesEv _ZN6__lsan20ScanRangeForPointersEjjPN11__sanitizer18InternalMmapVectorIjEEPKcNS_8ChunkTagE _ZN6__lsan15PointsIntoChunkEPv _ZN6__lsan12LsanMetadataC1Ej _ZNK6__lsan12LsanMetadata3tagEv _ZN6__lsan14WordIsPoisonedEj _ZNK6__lsan12LsanMetadata14requested_sizeEv _ZN6__lsan12LsanMetadata7set_tagENS_8ChunkTagE _ZN6__lsan15ScanGlobalRangeEjjPN11__sanitizer18InternalMmapVectorIjEE _ZN6__lsan23GetAllocatorGlobalRangeEPjS0_ _ZN6__lsan24ForEachExtraStackRangeCbEjjPv _ZN6__lsan22LeakSuppressionContext24PrintMatchedSuppressionsEv _ZN6__lsan16HasReportedLeaksEv _ZN6__lsan11DoLeakCheckEv _ZN6__lsan12global_mutexE _ZN6__lsan11HandleLeaksEv __lsan_is_turned_off _ZN6__lsan27EnsureMainThreadIDIsCorrectEv _ZN6__lsan24LockStuffAndStopTheWorldEPFvRKN11__sanitizer20SuspendedThreadsListEPvEPNS_18CheckForLeaksParamE _ZN6__lsan10LeakReport15AddLeakedChunksERKN11__sanitizer18InternalMmapVectorINS_11LeakedChunkEEE _ZN11__sanitizer12SortAndDedupINS_18InternalMmapVectorIjEENS_11CompareLessIjEEEEvRT_T0_ _ZN6__lsan26DoRecoverableLeakCheckVoidEv _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__lsan4LeakEE9push_backERKS2_ _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__lsan12LeakedObjectEE9push_backERKS2_ _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__lsan4LeakEE7ReallocEj _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__lsan12LeakedObjectEE7ReallocEj _ZN6__lsan10LeakReport14ReportTopLeaksEj _ZN6__lsan10LeakReport18PrintReportForLeakEj _ZN6__lsan10LeakReport12PrintSummaryEv __lsan_ignore_object _ZN6__lsan18IgnoreObjectLockedEPKv __lsan_register_root_region _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__lsan10RootRegionEE9push_backERKS2_ _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__lsan10RootRegionEE7ReallocEj __lsan_unregister_root_region __lsan_disable _ZN6__lsan19DisableInThisThreadEv __lsan_enable _ZN6__lsan18EnableInThisThreadEv __lsan_do_leak_check __lsan_do_recoverable_leak_check __lsan_default_options _ZN6__lsan23GetThreadRegistryLockedEv _ZN6__lsan12ForEachChunkEPFvjPvES0_ _ZN6__lsan20ProcessGlobalRegionsEPN11__sanitizer18InternalMmapVectorIjEE __libc_iterate_dynamic_tls _ZN6__lsan21GetThreadRangesLockedEyPjS0_S0_S0_S0_S0_PPN11__sanitizer4DTLSE _ZN6__lsan22ForEachExtraStackRangeEyPFvjjPvES0_ _ZN6__lsan30GetAdditionalThreadContextPtrsEPN11__sanitizer17ThreadContextBaseEPv _ZNK6__lsan12LsanMetadata9allocatedEv _ZN6__lsan34ProcessPlatformSpecificAllocationsEPN11__sanitizer18InternalMmapVectorIjEE _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__lsan11LeakedChunkEE7ReallocEj _ZN6__lsan12GetUserBeginEj _ZNK6__lsan12LsanMetadata14stack_trace_idEv _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__lsan11LeakedChunkEE9push_backERKS2_ _ZN6__lsan20DisabledInThisThreadEv _ZN6__lsan15disable_counterE _ZN6__lsan18LockThreadRegistryEv _ZN6__lsan13LockAllocatorEv _ZN6__lsan15UnlockAllocatorEv _ZN6__lsan20UnlockThreadRegistryEv _ZN7__ubsan21getSymbolizedLocationEj _ZN7__ubsan27InitAsStandaloneIfNecessaryEv _ZN7__ubsan4DiaglsERKNS_14TypeDescriptorE _ZN7__ubsan4DiaglsERKNS_5ValueE _ZNK7__ubsan5Value12getSIntValueEv _ZNK7__ubsan5Value12getUIntValueEv _ZNK7__ubsan5Value13getFloatValueEv _ZN7__ubsan4DiagD2Ev _ZN7__ubsan23UndefinedBehaviorReportC1EPKcRNS_8LocationERN11__sanitizer20InternalScopedStringE snprintf _ZN7__ubsan12ScopedReportC2ENS_13ReportOptionsENS_8LocationENS_9ErrorTypeE _ZN7__ubsan12ScopedReportD2Ev _ZN7__ubsan11ubsan_flagsE _ZN7__ubsan22GetSanititizerToolNameEv _ZN7__ubsan22InitializeSuppressionsEv _ZN7__ubsan21IsVptrCheckSuppressedEPKc _ZN7__ubsan14IsPCSuppressedENS_9ErrorTypeEjPKc _ZN7__ubsan4DiagD1Ev _ZN7__ubsan12ScopedReportC1ENS_13ReportOptionsENS_8LocationENS_9ErrorTypeE _ZN7__ubsan12ScopedReportD1Ev _ZN7__ubsan16InitAsStandaloneEv _ZN7__ubsan15InitializeFlagsEv _ZN7__ubsan12InitAsPluginEv _ZN7__ubsan5Flags11SetDefaultsEv _ZN7__ubsan18RegisterUbsanFlagsEPN11__sanitizer10FlagParserEPNS_5FlagsE __ubsan_default_options _ZN7__ubsan12ignoreReportENS_14SourceLocationENS_13ReportOptionsENS_9ErrorTypeE __ubsan_handle_type_mismatch_v1 _ZN7__ubsan14TypeCheckKindsE __ubsan_handle_type_mismatch_v1_abort __ubsan_handle_alignment_assumption __ubsan_handle_alignment_assumption_abort __ubsan_handle_add_overflow __ubsan_handle_add_overflow_abort __ubsan_handle_sub_overflow __ubsan_handle_sub_overflow_abort __ubsan_handle_mul_overflow __ubsan_handle_mul_overflow_abort __ubsan_handle_negate_overflow __ubsan_handle_negate_overflow_abort __ubsan_handle_divrem_overflow __ubsan_handle_divrem_overflow_abort __ubsan_handle_shift_out_of_bounds _ZNK7__ubsan5Value19getPositiveIntValueEv __ubsan_handle_shift_out_of_bounds_abort __ubsan_handle_out_of_bounds __ubsan_handle_out_of_bounds_abort __ubsan_handle_builtin_unreachable __ubsan_handle_missing_return __ubsan_handle_vla_bound_not_positive __ubsan_handle_vla_bound_not_positive_abort __ubsan_handle_float_cast_overflow __ubsan_handle_float_cast_overflow_abort __ubsan_handle_load_invalid_value __ubsan_handle_load_invalid_value_abort __ubsan_handle_implicit_conversion __ubsan_handle_implicit_conversion_abort __ubsan_handle_invalid_builtin __ubsan_handle_invalid_builtin_abort __ubsan_handle_invalid_objc_cast _ZN7__ubsan16getObjCClassNameEj __ubsan_handle_invalid_objc_cast_abort __ubsan_handle_nonnull_return_v1 __ubsan_handle_nonnull_return_v1_abort __ubsan_handle_nullability_return_v1 __ubsan_handle_nullability_return_v1_abort __ubsan_handle_nonnull_arg __ubsan_handle_nonnull_arg_abort __ubsan_handle_nullability_arg __ubsan_handle_nullability_arg_abort __ubsan_handle_pointer_overflow __ubsan_handle_pointer_overflow_abort __ubsan_handle_cfi_check_fail __ubsan_handle_cfi_bad_type __ubsan_handle_cfi_check_fail_abort _ZN7__ubsan23UndefinedBehaviorReportC2EPKcRNS_8LocationERN11__sanitizer20InternalScopedStringE __ubsan_on_report __ubsan_get_current_report_data _ZNK7__ubsan14TypeDescriptor18getIntegerBitWidthEv _ZN6__asan9FakeStack17AddrIsInFakeStackEjPjS1_ _ZN6__asan12PoisonShadowEjjh _ZN6__asan21GetCurrentThreadStatsEv _ZN6__asan29FlushUnneededASanShadowMemoryEjj _ZN6__asan16AllocatorOptions7SetFromEPKNS_5FlagsEPKN11__sanitizer11CommonFlagsE _ZN6__asan16AllocatorOptions6CopyToEPNS_5FlagsEPN11__sanitizer11CommonFlagsE _ZNK6__asan13AsanChunkView7IsValidEv _ZNK6__asan13AsanChunkView11IsAllocatedEv _ZNK6__asan13AsanChunkView13IsQuarantinedEv _ZNK6__asan13AsanChunkView3BegEv _ZNK6__asan13AsanChunkView3EndEv _ZNK6__asan13AsanChunkView8UsedSizeEv _ZNK6__asan13AsanChunkView22UserRequestedAlignmentEv _ZNK6__asan13AsanChunkView8AllocTidEv _ZNK6__asan13AsanChunkView7FreeTidEv _ZNK6__asan13AsanChunkView12GetAllocTypeEv _ZNK6__asan13AsanChunkView15GetAllocStackIdEv _ZNK6__asan13AsanChunkView14GetFreeStackIdEv _ZN6__asan19InitializeAllocatorERKNS_16AllocatorOptionsE _ZN6__asan9Allocator21InitLinkerInitializedERKNS_16AllocatorOptionsE _ZNK6__asan9Allocator12CheckOptionsERKNS_16AllocatorOptionsE _ZN6__asan21ReInitializeAllocatorERKNS_16AllocatorOptionsE _ZN6__asan9Allocator12ReInitializeERKNS_16AllocatorOptionsE _ZN6__asan15CanPoisonMemoryEv _ZN6__asan9Allocator13RePoisonChunkEj _ZN11__sanitizer18LargeMmapAllocatorIN6__asan20AsanMapUnmapCallbackENS_32LargeMmapAllocatorPtrArrayStaticENS_21LocalAddressSpaceViewEE18EnsureSortedChunksEv _ZN6__asan19GetAllocatorOptionsEPNS_16AllocatorOptionsE _ZN6__asan22FindHeapChunkByAddressEj _ZN6__asan9Allocator22FindHeapChunkByAddressEj _ZNK11__sanitizer18LargeMmapAllocatorIN6__asan20AsanMapUnmapCallbackENS_32LargeMmapAllocatorPtrArrayStaticENS_21LocalAddressSpaceViewEE13GetBlockBeginEPKv _ZN6__asan23FindHeapChunkByAllocBegEj _ZN6__asan28AsanThreadLocalMallocStorage10CommitBackEv _ZN6__asan20GetMallocContextSizeEv _ZN11__sanitizer18BufferedStackTrace10UnwindImplEjjPvbj _ZN11__sanitizer10QuarantineIN6__asan18QuarantineCallbackENS1_9AsanChunkEE5DrainEPNS_15QuarantineCacheIS2_EES2_ _ZN11__sanitizer30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32IN6__asan4AP32INS_21LocalAddressSpaceViewEEEEEE5DrainEPNS7_8PerClassEPS6_j _ZN6__asan27PrintInternalAllocatorStatsEv _ZN6__asan9Allocator10PrintStatsEv _ZN6__asan9asan_freeEPvPN11__sanitizer18BufferedStackTraceENS_9AllocTypeE _ZN6__asan9Allocator10DeallocateEPvjjPN11__sanitizer18BufferedStackTraceENS_9AllocTypeE __sanitizer_free_hook _ZN6__asan28asan_flags_dont_use_directlyE _ZN6__asan27ReportNewDeleteTypeMismatchEjjjPN11__sanitizer18BufferedStackTraceE _ZN6__asan16ReportDoubleFreeEjPN11__sanitizer18BufferedStackTraceE _ZN6__asan23ReportAllocTypeMismatchEjPN11__sanitizer18BufferedStackTraceENS_9AllocTypeES3_ _ZN6__asan9Allocator15QuarantineChunkEPNS_9AsanChunkEPvPN11__sanitizer18BufferedStackTraceE _ZN6__asan21ReportFreeNotMallocedEjPN11__sanitizer18BufferedStackTraceE _ZN6__asan11asan_deleteEPvjjPN11__sanitizer18BufferedStackTraceENS_9AllocTypeE _ZN6__asan11asan_mallocEjPN11__sanitizer18BufferedStackTraceE _ZN6__asan9Allocator8AllocateEjjPN11__sanitizer18BufferedStackTraceENS_9AllocTypeEb _ZN6__asan11asan_initedE _ZN6__asan16GetCurrentThreadEv _ZN11__sanitizer17CombinedAllocatorINS_20SizeClassAllocator32IN6__asan4AP32INS_21LocalAddressSpaceViewEEEEENS_32LargeMmapAllocatorPtrArrayStaticEE8AllocateEPNS_30SizeClassAllocator32LocalCacheIS6_EEjj _ZN6__asan26ReportAllocationSizeTooBigEjjjPN11__sanitizer18BufferedStackTraceE __asan_shadow_memory_dynamic_address _ZN6__asan10kMidMemBegE _ZN6__asan10kMidMemEndE _ZN6__asan11kHighMemEndE _ZN14__interception11real_memsetE __sanitizer_malloc_hook _ZN6__asan15AsanInitFromRtlEv _ZN6__asan22ReportRssLimitExceededEPN11__sanitizer18BufferedStackTraceE _ZN6__asan17ReportOutOfMemoryEjPN11__sanitizer18BufferedStackTraceE _ZN6__asan11asan_callocEjjPN11__sanitizer18BufferedStackTraceE _ZN6__asan20ReportCallocOverflowEjjPN11__sanitizer18BufferedStackTraceE _ZN6__asan17asan_reallocarrayEPvjjPN11__sanitizer18BufferedStackTraceE _ZN6__asan9Allocator10ReallocateEPvjPN11__sanitizer18BufferedStackTraceE _ZN6__asan26ReportReallocArrayOverflowEjjPN11__sanitizer18BufferedStackTraceE _ZN6__asan12asan_reallocEPvjPN11__sanitizer18BufferedStackTraceE _ZN14__interception11real_memcpyE _ZN6__asan11asan_vallocEjPN11__sanitizer18BufferedStackTraceE _ZN6__asan12asan_pvallocEjPN11__sanitizer18BufferedStackTraceE _ZN6__asan21ReportPvallocOverflowEjPN11__sanitizer18BufferedStackTraceE _ZN6__asan13asan_memalignEjjPN11__sanitizer18BufferedStackTraceENS_9AllocTypeE _ZN6__asan32ReportInvalidAllocationAlignmentEjPN11__sanitizer18BufferedStackTraceE _ZN6__asan18asan_aligned_allocEjjPN11__sanitizer18BufferedStackTraceE _ZN6__asan34ReportInvalidAlignedAllocAlignmentEjjPN11__sanitizer18BufferedStackTraceE _ZN6__asan19asan_posix_memalignEPPvjjPN11__sanitizer18BufferedStackTraceE _ZN6__asan35ReportInvalidPosixMemalignAlignmentEjPN11__sanitizer18BufferedStackTraceE _ZN6__asan23asan_malloc_usable_sizeEPKvjj _ZN6__asan30ReportMallocUsableSizeNotOwnedEjPN11__sanitizer18BufferedStackTraceE _ZN11__sanitizer18LargeMmapAllocatorIN6__asan20AsanMapUnmapCallbackENS_32LargeMmapAllocatorPtrArrayStaticENS_21LocalAddressSpaceViewEE23GetBlockBeginFastLockedEPv _ZN6__lsan12LsanMetadataC2Ej _ZN11__sanitizer18LargeMmapAllocatorIN6__asan20AsanMapUnmapCallbackENS_32LargeMmapAllocatorPtrArrayStaticENS_21LocalAddressSpaceViewEE12ForEachChunkEPFvjPvES6_ __sanitizer_get_estimated_allocated_size __sanitizer_get_ownership __sanitizer_get_allocated_size _ZN6__asan39ReportSanitizerGetAllocatedSizeNotOwnedEjPN11__sanitizer18BufferedStackTraceE __sanitizer_purge_allocator _ZN11__sanitizer10QuarantineIN6__asan18QuarantineCallbackENS1_9AsanChunkEE15DrainAndRecycleEPNS_15QuarantineCacheIS2_EES2_ __asan_update_allocation_context _ZN6__asan9Allocator21UpdateAllocationStackEjPN11__sanitizer18BufferedStackTraceE _ZN11__sanitizer10QuarantineIN6__asan18QuarantineCallbackENS1_9AsanChunkEE7RecycleEjS2_ _ZN11__sanitizer15QuarantineCacheIN6__asan18QuarantineCallbackEE12MergeBatchesEPS3_ _ZN11__sanitizer10QuarantineIN6__asan18QuarantineCallbackENS1_9AsanChunkEE9DoRecycleEPNS_15QuarantineCacheIS2_EES2_ _ZN11__sanitizer30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32IN6__asan4AP32INS_21LocalAddressSpaceViewEEEEEE10DeallocateEPS6_jPv _ZN11__sanitizer18LargeMmapAllocatorIN6__asan20AsanMapUnmapCallbackENS_32LargeMmapAllocatorPtrArrayStaticENS_21LocalAddressSpaceViewEE10DeallocateEPNS_14AllocatorStatsEPv _ZN6__asan18QuarantineCallback7RecycleEPNS_9AsanChunkE _ZN11__sanitizer20SizeClassAllocator32IN6__asan4AP32INS_21LocalAddressSpaceViewEEEE15DeallocateBatchEPNS_14AllocatorStatsEjPNS5_13TransferBatchE _ZN11__sanitizer30SizeClassAllocator32LocalCacheINS_20SizeClassAllocator32IN6__asan4AP32INS_21LocalAddressSpaceViewEEEEEE6RefillEPNS7_8PerClassEPS6_j _ZN11__sanitizer20SizeClassAllocator32IN6__asan4AP32INS_21LocalAddressSpaceViewEEEE13AllocateBatchEPNS_14AllocatorStatsEPNS_30SizeClassAllocator32LocalCacheIS5_EEj _ZN11__sanitizer20SizeClassAllocator32IN6__asan4AP32INS_21LocalAddressSpaceViewEEEE16PopulateFreeListEPNS_14AllocatorStatsEPNS_30SizeClassAllocator32LocalCacheIS5_EEPNS5_13SizeClassInfoEj _ZN11__sanitizer15QuarantineCacheIN6__asan18QuarantineCallbackEE7EnqueueES2_Pvj _ZN11__sanitizer18LargeMmapAllocatorIN6__asan20AsanMapUnmapCallbackENS_32LargeMmapAllocatorPtrArrayStaticENS_21LocalAddressSpaceViewEE8AllocateEPNS_14AllocatorStatsEjj _ZN6__asan14AsanDeactivateEv _ZN6__asan18SetCanPoisonMemoryEb _ZN6__asan20SetMallocContextSizeEj _ZN6__asan12AsanActivateEv _ZN6__asan20AsanDeactivatedFlags27OverrideFromActivationFlagsEv _ZN6__asan20AsanDeactivatedFlags23RegisterActivationFlagsEPN11__sanitizer10FlagParserEPNS_5FlagsEPNS1_11CommonFlagsE __asan_locate_address _ZN6__asan18AddressDescriptionC2Ejjb _ZN6__asan21ParseFrameDescriptionEPKcPN11__sanitizer18InternalMmapVectorINS_13StackVarDescrEEE __asan_get_alloc_stack __asan_get_free_stack __asan_get_shadow_mapping _ZN6__asan19AsanThreadIdAndNameC2Ej _ZN6__asan18asanThreadRegistryEv _ZN6__asan27GetThreadContextByTidLockedEj _ZN6__asan14DescribeThreadEPNS_17AsanThreadContextE _ZN6__asan27GetShadowAddressInformationEjPNS_24ShadowAddressDescriptionE _ZNK6__asan24ShadowAddressDescription5PrintEv _ZN6__asan25GetHeapAddressInformationEjjPNS_22HeapAddressDescriptionE _ZNK6__asan22HeapAddressDescription5PrintEv _ZN6__asan24FindThreadByStackAddressEj _ZN6__asan10AsanThread25GetStackFrameAccessByAddrEjPNS0_16StackFrameAccessE _ZNK6__asan23StackAddressDescription5PrintEv _ZN6__asan27GetGlobalAddressInformationEjjPNS_24GlobalAddressDescriptionE _ZN6__asan20GetGlobalsForAddressEjP13__asan_globalPji _ZNK6__asan24GlobalAddressDescription5PrintEPKc _ZN6__asan23MaybeDemangleGlobalNameEPKc _ZN6__asan19PrintGlobalLocationEPN11__sanitizer20InternalScopedStringERK13__asan_global _ZN6__asan22PrintGlobalNameIfASCIIEPN11__sanitizer20InternalScopedStringERK13__asan_global _ZNK6__asan24GlobalAddressDescription27PointsInsideTheSameVariableERKS0_ _ZNK6__asan22WildAddressDescription5PrintEv _ZN6__asan23PrintAddressDescriptionEjjPKc _ZN6__asan19AsanThreadIdAndNameC1Ej _ZN6__asan18AddressDescriptionC1Ejjb _ZN6__asan17ErrorDeadlySignal5PrintEv _ZN6__asan15ErrorDoubleFree5PrintEv _ZN6__asan26ErrorNewDeleteTypeMismatch5PrintEv _ZN6__asan20ErrorFreeNotMalloced5PrintEv _ZNK6__asan18AddressDescription5PrintEPKc _ZN6__asan22ErrorAllocTypeMismatch5PrintEv _ZN6__asan29ErrorMallocUsableSizeNotOwned5PrintEv _ZN6__asan38ErrorSanitizerGetAllocatedSizeNotOwned5PrintEv _ZN6__asan19ErrorCallocOverflow5PrintEv _ZN6__asan25ErrorReallocArrayOverflow5PrintEv _ZN6__asan20ErrorPvallocOverflow5PrintEv _ZN6__asan31ErrorInvalidAllocationAlignment5PrintEv _ZN6__asan33ErrorInvalidAlignedAllocAlignment5PrintEv _ZN6__asan34ErrorInvalidPosixMemalignAlignment5PrintEv _ZN6__asan25ErrorAllocationSizeTooBig5PrintEv _ZN6__asan21ErrorRssLimitExceeded5PrintEv _ZN6__asan16ErrorOutOfMemory5PrintEv _ZN6__asan38ErrorStringFunctionMemoryRangesOverlap5PrintEv _ZN6__asan31ErrorStringFunctionSizeOverflow5PrintEv _ZN6__asan43ErrorBadParamsToAnnotateContiguousContainer5PrintEv _ZN6__asan17ErrorODRViolation5PrintEv _ZN6__asan23ErrorInvalidPointerPair5PrintEv _ZN6__asan12ErrorGenericC2Ejjjjjbj _ZN6__asan12ErrorGeneric5PrintEv _ZN6__asan15PrintMemoryByteEPN11__sanitizer20InternalScopedStringEPKchbS4_ _ZN6__asan12ErrorGenericC1Ejjjjjbj _ZN6__asan9FakeStack6CreateEj _ZN6__asan22GetCurrentTidOrInvalidEv _ZN6__asan9FakeStack7DestroyEi _ZN6__asan9FakeStack2GCEj _ZN6__asan9FakeStack14HandleNoReturnEv _ZN6__asan9FakeStack16ForEachFakeFrameEPFvjjPvES1_ _ZN6__asan15SetTLSFakeStackEPNS_9FakeStackE __asan_stack_malloc_0 __asan_option_detect_stack_use_after_return _ZN6__asan10AsanThread32AsyncSignalSafeLazyInitFakeStackEv __asan_stack_malloc_always_0 __asan_stack_free_0 __asan_stack_malloc_1 __asan_stack_malloc_always_1 __asan_stack_free_1 __asan_stack_malloc_2 __asan_stack_malloc_always_2 __asan_stack_free_2 __asan_stack_malloc_3 __asan_stack_malloc_always_3 __asan_stack_free_3 __asan_stack_malloc_4 __asan_stack_malloc_always_4 __asan_stack_free_4 __asan_stack_malloc_5 __asan_stack_malloc_always_5 __asan_stack_free_5 __asan_stack_malloc_6 __asan_stack_malloc_always_6 __asan_stack_free_6 __asan_stack_malloc_7 __asan_stack_malloc_always_7 __asan_stack_free_7 __asan_stack_malloc_8 __asan_stack_malloc_always_8 __asan_stack_free_8 __asan_stack_malloc_9 __asan_stack_malloc_always_9 __asan_stack_free_9 __asan_stack_malloc_10 __asan_stack_malloc_always_10 __asan_stack_free_10 __asan_get_current_fake_stack __asan_addr_is_in_fake_stack __asan_alloca_poison __asan_allocas_unpoison _ZN6__asan15InitializeFlagsEv __asan_default_options _ZN6__asan21StopInitOrderCheckingEv __asan_register_image_globals __asan_register_globals _ZN6__asan18AsanApplyToGlobalsEPFvP13__asan_globaljEPKv _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__asan22GlobalRegistrationSiteEE9push_backERKS2_ _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__asan13DynInitGlobalEE9push_backERKS2_ _ZN6__asan18ReportODRViolationEPK13__asan_globaljS2_j __asan_region_is_poisoned _ZN6__asan24IsODRViolationSuppressedEPKc __asan_unregister_image_globals __asan_unregister_globals __asan_register_elf_globals __asan_unregister_elf_globals _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__asan22GlobalRegistrationSiteEE7ReallocEj __asan_before_dynamic_init __asan_after_dynamic_init _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__asan13DynInitGlobalEE7ReallocEj __interceptor_strlen _ZN6__asan20asan_init_is_runningE _ZN14__interception11real_strlenE _ZN6__asan32ReportStringFunctionSizeOverflowEjjPN11__sanitizer18BufferedStackTraceE _ZN6__asan23IsInterceptorSuppressedEPKc _ZN6__asan31HaveStackTraceBasedSuppressionsEv _ZN6__asan22IsStackTraceSuppressedEPKN11__sanitizer10StackTraceE _ZN6__asan18ReportGenericErrorEjjjjbjjb __interceptor_strnlen _ZN14__interception12real_strnlenE __interceptor_strndup _ZN14__interception12real_strndupE __interceptor_malloc __sanitizer_weak_hook_strcmp __interceptor_strcmp _ZN14__interception11real_strcmpE __sanitizer_weak_hook_strncmp __interceptor_strncmp _ZN14__interception12real_strncmpE __sanitizer_weak_hook_strcasecmp __interceptor_strcasecmp _ZN14__interception15real_strcasecmpE __sanitizer_weak_hook_strncasecmp __interceptor_strncasecmp _ZN14__interception16real_strncasecmpE __sanitizer_weak_hook_strstr __interceptor_strstr _ZN14__interception11real_strstrE __sanitizer_weak_hook_strcasestr __interceptor_strcasestr _ZN14__interception15real_strcasestrE __interceptor_strtok _ZN14__interception11real_strtokE __sanitizer_weak_hook_memmem __interceptor_memmem _ZN14__interception11real_memmemE __interceptor_strchr _ZN14__interception11real_strchrE __interceptor_strchrnul _ZN14__interception14real_strchrnulE __interceptor_strrchr _ZN14__interception12real_strrchrE __interceptor_strspn _ZN14__interception11real_strspnE __interceptor_strcspn _ZN14__interception12real_strcspnE __interceptor_strpbrk _ZN14__interception12real_strpbrkE __interceptor_memset __interceptor_memmove __interceptor_memcpy _ZN6__asan39ReportStringFunctionMemoryRangesOverlapEPKcS1_jS1_jPN11__sanitizer18BufferedStackTraceE __sanitizer_weak_hook_memcmp _Z23MemcmpInterceptorCommonPvPFiPKvS1_jES1_S1_j __interceptor_memcmp _ZN14__interception11real_memcmpE __interceptor_bcmp _ZN14__interception9real_bcmpE __interceptor_memchr _ZN14__interception11real_memchrE __interceptor_memrchr _ZN14__interception12real_memrchrE __interceptor_frexp _ZN14__interception10real_frexpE __interceptor_frexpf _ZN14__interception11real_frexpfE __interceptor_frexpl _ZN14__interception11real_frexplE __interceptor_read _ZN14__interception9real_readE __interceptor_fread _ZN14__interception10real_freadE __interceptor_pread _ZN14__interception10real_preadE __interceptor_readv _ZN14__interception10real_readvE __interceptor_write _ZN14__interception10real_writeE __interceptor_fwrite _ZN14__interception11real_fwriteE __interceptor_pwrite _ZN14__interception11real_pwriteE __interceptor_writev _ZN14__interception11real_writevE __interceptor_fgets _ZN14__interception10real_fgetsE __interceptor_fputs _ZN14__interception10real_fputsE __interceptor_puts _ZN14__interception9real_putsE __interceptor_prctl _ZN14__interception10real_prctlE __interceptor_time _ZN14__interception9real_timeE __interceptor_localtime _ZN14__interception14real_localtimeE __interceptor_localtime_r _ZN14__interception16real_localtime_rE __interceptor_gmtime _ZN14__interception11real_gmtimeE __interceptor_gmtime_r _ZN14__interception13real_gmtime_rE __interceptor_ctime _ZN14__interception10real_ctimeE __interceptor_ctime_r _ZN14__interception12real_ctime_rE __interceptor_asctime _ZN14__interception12real_asctimeE __interceptor_asctime_r _ZN14__interception14real_asctime_rE __interceptor_mktime _ZN14__interception11real_mktimeE __interceptor_strptime _ZN14__interception13real_strptimeE __interceptor_vscanf _ZN14__interception11real_vscanfE __interceptor_vsscanf _ZN14__interception12real_vsscanfE __interceptor_vfscanf _ZN14__interception12real_vfscanfE __interceptor_scanf __interceptor_fscanf __interceptor_sscanf __interceptor_vprintf _ZN14__interception12real_vprintfE __interceptor_vfprintf _ZN14__interception13real_vfprintfE __interceptor_vsnprintf _ZN14__interception14real_vsnprintfE __interceptor_vsprintf _ZN14__interception13real_vsprintfE __interceptor_vasprintf _ZN14__interception14real_vasprintfE __interceptor_printf __interceptor_fprintf __interceptor_sprintf __interceptor_snprintf __interceptor_asprintf __interceptor_ioctl _ZN14__interception10real_ioctlE __interceptor_getpwnam _ZN14__interception13real_getpwnamE __interceptor_getpwuid _ZN14__interception13real_getpwuidE __interceptor_getgrnam _ZN14__interception13real_getgrnamE __interceptor_getgrgid _ZN14__interception13real_getgrgidE __interceptor_clock_getres _ZN14__interception17real_clock_getresE __interceptor_clock_gettime _ZN14__interception18real_clock_gettimeE __interceptor_clock_settime _ZN14__interception18real_clock_settimeE __interceptor_clock_getcpuclockid _ZN14__interception24real_clock_getcpuclockidE __interceptor_pthread_getcpuclockid _ZN14__interception26real_pthread_getcpuclockidE __interceptor_getitimer _ZN14__interception14real_getitimerE __interceptor_setitimer _ZN14__interception14real_setitimerE __interceptor_posix_spawn _ZN14__interception16real_posix_spawnE __interceptor_posix_spawnp _ZN14__interception17real_posix_spawnpE __interceptor_wait _ZN14__interception9real_waitE __interceptor_waitid _ZN14__interception11real_waitidE __interceptor_waitpid _ZN14__interception12real_waitpidE __interceptor_wait3 _ZN14__interception10real_wait3E __interceptor___wait4 _ZN14__interception12real___wait4E __interceptor_inet_ntop _ZN14__interception14real_inet_ntopE __interceptor_inet_pton _ZN14__interception14real_inet_ptonE __interceptor_inet_aton _ZN14__interception14real_inet_atonE __interceptor_pthread_getschedparam _ZN14__interception26real_pthread_getschedparamE __interceptor_getaddrinfo _ZN14__interception16real_getaddrinfoE __interceptor_getnameinfo _ZN14__interception16real_getnameinfoE __interceptor_getsockname _ZN14__interception16real_getsocknameE __interceptor_gethostbyname _ZN14__interception18real_gethostbynameE __interceptor_gethostbyaddr _ZN14__interception18real_gethostbyaddrE __interceptor_gethostent _ZN14__interception15real_gethostentE __interceptor_gethostbyname2 _ZN14__interception19real_gethostbyname2E __interceptor_gethostbyname_r _ZN14__interception20real_gethostbyname_rE __interceptor_getsockopt _ZN14__interception15real_getsockoptE __interceptor_accept _ZN14__interception11real_acceptE __interceptor_modf _ZN14__interception9real_modfE __interceptor_modff _ZN14__interception10real_modffE __interceptor_modfl _ZN14__interception10real_modflE __interceptor_recvmsg _ZN14__interception12real_recvmsgE __interceptor_recvmmsg _ZN14__interception13real_recvmmsgE __interceptor_sendmsg _ZN14__interception12real_sendmsgE __interceptor_sendmmsg _ZN14__interception13real_sendmmsgE __interceptor_getpeername _ZN14__interception16real_getpeernameE __interceptor_sysinfo _ZN14__interception12real_sysinfoE __interceptor_opendir _ZN14__interception12real_opendirE __interceptor_readdir _ZN14__interception12real_readdirE __interceptor_readdir_r _ZN14__interception14real_readdir_rE __interceptor_setlocale _ZN14__interception14real_setlocaleE __interceptor_getcwd _ZN14__interception11real_getcwdE __interceptor_strtoimax _ZN14__interception14real_strtoimaxE __interceptor_strtoumax _ZN14__interception14real_strtoumaxE __interceptor_mbstowcs _ZN14__interception13real_mbstowcsE __interceptor_mbsrtowcs _ZN14__interception14real_mbsrtowcsE __interceptor_wcstombs _ZN14__interception13real_wcstombsE __interceptor_wcsrtombs _ZN14__interception14real_wcsrtombsE __interceptor_realpath _ZN14__interception13real_realpathE __interceptor_free __interceptor_strerror _ZN14__interception13real_strerrorE __interceptor_strerror_r _ZN14__interception15real_strerror_rE __interceptor_getgroups _ZN14__interception14real_getgroupsE __interceptor_poll _ZN14__interception9real_pollE __interceptor_sigwait _ZN14__interception12real_sigwaitE __interceptor_sigpending _ZN14__interception15real_sigpendingE __interceptor_sigprocmask _ZN14__interception16real_sigprocmaskE __interceptor_pthread_sigmask _ZN14__interception20real_pthread_sigmaskE __interceptor__exit _ZN14__interception10real__exitE __interceptor_pthread_mutex_lock _ZN14__interception23real_pthread_mutex_lockE __interceptor_pthread_mutex_unlock _ZN14__interception25real_pthread_mutex_unlockE __interceptor_getmntent _ZN14__interception14real_getmntentE __interceptor_initgroups _ZN14__interception15real_initgroupsE __interceptor_ether_ntoa _ZN14__interception15real_ether_ntoaE __interceptor_ether_aton _ZN14__interception15real_ether_atonE __interceptor_pthread_attr_getdetachstate _ZN14__interception32real_pthread_attr_getdetachstateE __interceptor_pthread_attr_getguardsize _ZN14__interception30real_pthread_attr_getguardsizeE __interceptor_pthread_attr_getscope _ZN14__interception26real_pthread_attr_getscopeE __interceptor_pthread_attr_getstacksize _ZN14__interception30real_pthread_attr_getstacksizeE __interceptor_pthread_attr_getstack _ZN14__interception26real_pthread_attr_getstackE __interceptor_pthread_attr_getschedparam _ZN14__interception31real_pthread_attr_getschedparamE __interceptor_pthread_attr_getschedpolicy _ZN14__interception32real_pthread_attr_getschedpolicyE __interceptor_pthread_mutexattr_getpshared _ZN14__interception33real_pthread_mutexattr_getpsharedE __interceptor_pthread_mutexattr_gettype _ZN14__interception30real_pthread_mutexattr_gettypeE __interceptor_pthread_rwlockattr_getpshared _ZN14__interception34real_pthread_rwlockattr_getpsharedE __interceptor_pthread_condattr_getpshared _ZN14__interception32real_pthread_condattr_getpsharedE __interceptor_tmpnam _ZN14__interception11real_tmpnamE __interceptor_ptsname _ZN14__interception12real_ptsnameE __interceptor_ptsname_r _ZN14__interception14real_ptsname_rE __interceptor_ttyname _ZN14__interception12real_ttynameE __interceptor_ttyname_r _ZN14__interception14real_ttyname_rE __interceptor_tempnam _ZN14__interception12real_tempnamE __interceptor_sincos _ZN14__interception11real_sincosE __interceptor_sincosf _ZN14__interception12real_sincosfE __interceptor_sincosl _ZN14__interception12real_sincoslE __interceptor_remquo _ZN14__interception11real_remquoE __interceptor_remquof _ZN14__interception12real_remquofE __interceptor_remquol _ZN14__interception12real_remquolE __interceptor_lgamma _ZN14__interception11real_lgammaE signgam __interceptor_lgammaf _ZN14__interception12real_lgammafE __interceptor_lgammal _ZN14__interception12real_lgammalE __interceptor_lgamma_r _ZN14__interception13real_lgamma_rE __interceptor_lgammaf_r _ZN14__interception14real_lgammaf_rE __interceptor_times _ZN14__interception10real_timesE __interceptor_listxattr _ZN14__interception14real_listxattrE __interceptor_llistxattr _ZN14__interception15real_llistxattrE __interceptor_flistxattr _ZN14__interception15real_flistxattrE __interceptor_getxattr _ZN14__interception13real_getxattrE __interceptor_lgetxattr _ZN14__interception14real_lgetxattrE __interceptor_fgetxattr _ZN14__interception14real_fgetxattrE __interceptor_getresuid _ZN14__interception14real_getresuidE __interceptor_getresgid _ZN14__interception14real_getresgidE __interceptor_ftime _ZN14__interception10real_ftimeE __interceptor_fopen _ZN14__interception10real_fopenE __interceptor_fdopen _ZN14__interception11real_fdopenE __interceptor_freopen _ZN14__interception12real_freopenE __interceptor_fflush _ZN14__interception11real_fflushE _ZN11__sanitizer11AddrHashMapI25CommonInterceptorMetadataLj31051EE7acquireEPNS2_6HandleE _ZN11__sanitizer11AddrHashMapI25CommonInterceptorMetadataLj31051EE7releaseEPNS2_6HandleE __interceptor_fclose _ZN14__interception11real_fcloseE __interceptor_mlock __interceptor_munlock __interceptor_mlockall __interceptor_munlockall __interceptor_sem_init _ZN14__interception13real_sem_initE __interceptor_sem_destroy _ZN14__interception16real_sem_destroyE __interceptor_sem_wait _ZN14__interception13real_sem_waitE __interceptor_sem_trywait _ZN14__interception16real_sem_trywaitE __interceptor_sem_timedwait _ZN14__interception18real_sem_timedwaitE __interceptor_sem_post _ZN14__interception13real_sem_postE __interceptor_sem_getvalue _ZN14__interception17real_sem_getvalueE __interceptor_sem_open _ZN14__interception13real_sem_openE __interceptor_sem_unlink _ZN14__interception15real_sem_unlinkE __interceptor_pthread_setcancelstate _ZN14__interception27real_pthread_setcancelstateE __interceptor_pthread_setcanceltype _ZN14__interception26real_pthread_setcanceltypeE __interceptor_mincore _ZN14__interception12real_mincoreE __interceptor_process_vm_readv _ZN14__interception21real_process_vm_readvE __interceptor_process_vm_writev _ZN14__interception22real_process_vm_writevE __interceptor_ctermid _ZN14__interception12real_ctermidE __interceptor_recv _ZN14__interception9real_recvE __interceptor_recvfrom _ZN14__interception13real_recvfromE __interceptor_send _ZN14__interception9real_sendE __interceptor_sendto _ZN14__interception11real_sendtoE __interceptor_eventfd_read _ZN14__interception17real_eventfd_readE __interceptor_eventfd_write _ZN14__interception18real_eventfd_writeE __interceptor_stat _ZN14__interception9real_statE __interceptor_getutent _ZN14__interception13real_getutentE __interceptor_getutid _ZN14__interception12real_getutidE __interceptor_getutline _ZN14__interception14real_getutlineE __interceptor_wcslen _ZN14__interception11real_wcslenE __interceptor_wcsnlen _ZN14__interception12real_wcsnlenE __interceptor_wcscat _ZN14__interception11real_wcscatE __interceptor_wcsncat _ZN14__interception12real_wcsncatE __interceptor_wcsdup _ZN14__interception11real_wcsdupE __interceptor_strxfrm _ZN14__interception12real_strxfrmE __interceptor_strxfrm_l _ZN14__interception14real_strxfrm_lE __interceptor___strxfrm_l _ZN14__interception16real___strxfrm_lE __interceptor_wcsxfrm _ZN14__interception12real_wcsxfrmE __interceptor_wcsxfrm_l _ZN14__interception14real_wcsxfrm_lE __interceptor___wcsxfrm_l _ZN14__interception16real___wcsxfrm_lE __interceptor_getgrouplist _ZN14__interception17real_getgrouplistE __interceptor_readlink _ZN14__interception13real_readlinkE __interceptor_readlinkat _ZN14__interception15real_readlinkatE __interceptor_strlcpy _ZN14__interception12real_strlcpyE __interceptor_strlcat _ZN14__interception12real_strlcatE __interceptor_mmap _ZN14__interception9real_mmapE __interceptor_mprotect _ZN14__interception13real_mprotectE __interceptor_getprotoent _ZN14__interception16real_getprotoentE __interceptor_getprotobyname _ZN14__interception19real_getprotobynameE __interceptor_getprotobynumber _ZN14__interception21real_getprotobynumberE __interceptor_getnetent _ZN14__interception14real_getnetentE __interceptor_getnetbyname _ZN14__interception17real_getnetbynameE __interceptor_getnetbyaddr _ZN14__interception17real_getnetbyaddrE __interceptor_setvbuf _ZN14__interception12real_setvbufE __interceptor_setbuf _ZN14__interception11real_setbufE __interceptor_setbuffer _ZN14__interception14real_setbufferE __interceptor_setlinebuf _ZN14__interception15real_setlinebufE __interceptor_regcomp _ZN14__interception12real_regcompE __interceptor_regexec _ZN14__interception12real_regexecE __interceptor_regerror _ZN14__interception13real_regerrorE __interceptor_regfree _ZN14__interception12real_regfreeE __interceptor_popen _ZN14__interception10real_popenE __interceptor_pclose _ZN14__interception11real_pcloseE __interceptor_sigaltstack _ZN14__interception16real_sigaltstackE __interceptor_uname _ZN14__interception10real_unameE __interceptor_bsd_signal _ZN14__interception15real_bsd_signalE __interceptor_signal _ZN14__interception11real_signalE __interceptor_sigaction _ZN14__interception14real_sigactionE __sanitizer_syscall_pre_impl_recvmsg __sanitizer_syscall_post_impl_recvmsg __sanitizer_syscall_pre_impl_recvmmsg __sanitizer_syscall_post_impl_recvmmsg __sanitizer_syscall_pre_impl_read __sanitizer_syscall_post_impl_read __sanitizer_syscall_pre_impl_time __sanitizer_syscall_post_impl_time __sanitizer_syscall_pre_impl_stime __sanitizer_syscall_post_impl_stime __sanitizer_syscall_pre_impl_gettimeofday __sanitizer_syscall_post_impl_gettimeofday __sanitizer_syscall_pre_impl_settimeofday __sanitizer_syscall_post_impl_settimeofday __sanitizer_syscall_pre_impl_times __sanitizer_syscall_post_impl_times __sanitizer_syscall_pre_impl_gettid __sanitizer_syscall_post_impl_gettid __sanitizer_syscall_pre_impl_nanosleep __sanitizer_syscall_post_impl_nanosleep __sanitizer_syscall_pre_impl_alarm __sanitizer_syscall_post_impl_alarm __sanitizer_syscall_pre_impl_getpid __sanitizer_syscall_post_impl_getpid __sanitizer_syscall_pre_impl_getppid __sanitizer_syscall_post_impl_getppid __sanitizer_syscall_pre_impl_getuid __sanitizer_syscall_post_impl_getuid __sanitizer_syscall_pre_impl_geteuid __sanitizer_syscall_post_impl_geteuid __sanitizer_syscall_pre_impl_getgid __sanitizer_syscall_post_impl_getgid __sanitizer_syscall_pre_impl_getegid __sanitizer_syscall_post_impl_getegid __sanitizer_syscall_pre_impl_getresuid __sanitizer_syscall_post_impl_getresuid __sanitizer_syscall_pre_impl_getresgid __sanitizer_syscall_post_impl_getresgid __sanitizer_syscall_pre_impl_getpgid __sanitizer_syscall_post_impl_getpgid __sanitizer_syscall_pre_impl_getpgrp __sanitizer_syscall_post_impl_getpgrp __sanitizer_syscall_pre_impl_getsid __sanitizer_syscall_post_impl_getsid __sanitizer_syscall_pre_impl_getgroups __sanitizer_syscall_post_impl_getgroups __sanitizer_syscall_pre_impl_setregid __sanitizer_syscall_post_impl_setregid __sanitizer_syscall_pre_impl_setgid __sanitizer_syscall_post_impl_setgid __sanitizer_syscall_pre_impl_setreuid __sanitizer_syscall_post_impl_setreuid __sanitizer_syscall_pre_impl_setuid __sanitizer_syscall_post_impl_setuid __sanitizer_syscall_pre_impl_setresuid __sanitizer_syscall_post_impl_setresuid __sanitizer_syscall_pre_impl_setresgid __sanitizer_syscall_post_impl_setresgid __sanitizer_syscall_pre_impl_setfsuid __sanitizer_syscall_post_impl_setfsuid __sanitizer_syscall_pre_impl_setfsgid __sanitizer_syscall_post_impl_setfsgid __sanitizer_syscall_pre_impl_setpgid __sanitizer_syscall_post_impl_setpgid __sanitizer_syscall_pre_impl_setsid __sanitizer_syscall_post_impl_setsid __sanitizer_syscall_pre_impl_setgroups __sanitizer_syscall_post_impl_setgroups __sanitizer_syscall_pre_impl_acct __sanitizer_syscall_post_impl_acct __sanitizer_syscall_pre_impl_capget __sanitizer_syscall_post_impl_capget __sanitizer_syscall_pre_impl_capset __sanitizer_syscall_post_impl_capset __sanitizer_syscall_pre_impl_personality __sanitizer_syscall_post_impl_personality __sanitizer_syscall_pre_impl_sigpending __sanitizer_syscall_post_impl_sigpending __sanitizer_syscall_pre_impl_sigprocmask __sanitizer_syscall_post_impl_sigprocmask __sanitizer_syscall_pre_impl_getitimer __sanitizer_syscall_post_impl_getitimer __sanitizer_syscall_pre_impl_setitimer __sanitizer_syscall_post_impl_setitimer __sanitizer_syscall_pre_impl_timer_create __sanitizer_syscall_post_impl_timer_create __sanitizer_syscall_pre_impl_timer_gettime __sanitizer_syscall_post_impl_timer_gettime __sanitizer_syscall_pre_impl_timer_getoverrun __sanitizer_syscall_post_impl_timer_getoverrun __sanitizer_syscall_pre_impl_timer_settime __sanitizer_syscall_post_impl_timer_settime __sanitizer_syscall_pre_impl_timer_delete __sanitizer_syscall_post_impl_timer_delete __sanitizer_syscall_pre_impl_clock_settime __sanitizer_syscall_post_impl_clock_settime __sanitizer_syscall_pre_impl_clock_gettime __sanitizer_syscall_post_impl_clock_gettime __sanitizer_syscall_pre_impl_clock_getres __sanitizer_syscall_post_impl_clock_getres __sanitizer_syscall_pre_impl_clock_nanosleep __sanitizer_syscall_post_impl_clock_nanosleep __sanitizer_syscall_pre_impl_nice __sanitizer_syscall_post_impl_nice __sanitizer_syscall_pre_impl_sched_setscheduler __sanitizer_syscall_post_impl_sched_setscheduler __sanitizer_syscall_pre_impl_sched_setparam __sanitizer_syscall_post_impl_sched_setparam __sanitizer_syscall_pre_impl_sched_getscheduler __sanitizer_syscall_post_impl_sched_getscheduler __sanitizer_syscall_pre_impl_sched_getparam __sanitizer_syscall_post_impl_sched_getparam __sanitizer_syscall_pre_impl_sched_setaffinity __sanitizer_syscall_post_impl_sched_setaffinity __sanitizer_syscall_pre_impl_sched_getaffinity __sanitizer_syscall_post_impl_sched_getaffinity __sanitizer_syscall_pre_impl_sched_yield __sanitizer_syscall_post_impl_sched_yield __sanitizer_syscall_pre_impl_sched_get_priority_max __sanitizer_syscall_post_impl_sched_get_priority_max __sanitizer_syscall_pre_impl_sched_get_priority_min __sanitizer_syscall_post_impl_sched_get_priority_min __sanitizer_syscall_pre_impl_sched_rr_get_interval __sanitizer_syscall_post_impl_sched_rr_get_interval __sanitizer_syscall_pre_impl_setpriority __sanitizer_syscall_post_impl_setpriority __sanitizer_syscall_pre_impl_getpriority __sanitizer_syscall_post_impl_getpriority __sanitizer_syscall_pre_impl_shutdown __sanitizer_syscall_post_impl_shutdown __sanitizer_syscall_pre_impl_reboot __sanitizer_syscall_post_impl_reboot __sanitizer_syscall_pre_impl_restart_syscall __sanitizer_syscall_post_impl_restart_syscall __sanitizer_syscall_pre_impl_kexec_load __sanitizer_syscall_post_impl_kexec_load __sanitizer_syscall_pre_impl_exit __sanitizer_syscall_post_impl_exit __sanitizer_syscall_pre_impl_exit_group __sanitizer_syscall_post_impl_exit_group __sanitizer_syscall_pre_impl_wait4 __sanitizer_syscall_post_impl_wait4 __sanitizer_syscall_pre_impl_waitid __sanitizer_syscall_post_impl_waitid __sanitizer_syscall_pre_impl_waitpid __sanitizer_syscall_post_impl_waitpid __sanitizer_syscall_pre_impl_set_tid_address __sanitizer_syscall_post_impl_set_tid_address __sanitizer_syscall_pre_impl_init_module __sanitizer_syscall_post_impl_init_module __sanitizer_syscall_pre_impl_delete_module __sanitizer_syscall_post_impl_delete_module __sanitizer_syscall_pre_impl_rt_sigprocmask __sanitizer_syscall_post_impl_rt_sigprocmask __sanitizer_syscall_pre_impl_rt_sigpending __sanitizer_syscall_post_impl_rt_sigpending __sanitizer_syscall_pre_impl_rt_sigtimedwait __sanitizer_syscall_post_impl_rt_sigtimedwait __sanitizer_syscall_pre_impl_rt_tgsigqueueinfo __sanitizer_syscall_post_impl_rt_tgsigqueueinfo __sanitizer_syscall_pre_impl_kill __sanitizer_syscall_post_impl_kill __sanitizer_syscall_pre_impl_tgkill __sanitizer_syscall_post_impl_tgkill __sanitizer_syscall_pre_impl_tkill __sanitizer_syscall_post_impl_tkill __sanitizer_syscall_pre_impl_rt_sigqueueinfo __sanitizer_syscall_post_impl_rt_sigqueueinfo __sanitizer_syscall_pre_impl_sgetmask __sanitizer_syscall_post_impl_sgetmask __sanitizer_syscall_pre_impl_ssetmask __sanitizer_syscall_post_impl_ssetmask __sanitizer_syscall_pre_impl_signal __sanitizer_syscall_post_impl_signal __sanitizer_syscall_pre_impl_pause __sanitizer_syscall_post_impl_pause __sanitizer_syscall_pre_impl_sync __sanitizer_syscall_post_impl_sync __sanitizer_syscall_pre_impl_fsync __sanitizer_syscall_post_impl_fsync __sanitizer_syscall_pre_impl_fdatasync __sanitizer_syscall_post_impl_fdatasync __sanitizer_syscall_pre_impl_bdflush __sanitizer_syscall_post_impl_bdflush __sanitizer_syscall_pre_impl_mount __sanitizer_syscall_post_impl_mount __sanitizer_syscall_pre_impl_umount __sanitizer_syscall_post_impl_umount __sanitizer_syscall_pre_impl_oldumount __sanitizer_syscall_post_impl_oldumount __sanitizer_syscall_pre_impl_truncate __sanitizer_syscall_post_impl_truncate __sanitizer_syscall_pre_impl_ftruncate __sanitizer_syscall_post_impl_ftruncate __sanitizer_syscall_pre_impl_stat __sanitizer_syscall_post_impl_stat __sanitizer_syscall_pre_impl_lstat __sanitizer_syscall_post_impl_lstat __sanitizer_syscall_pre_impl_fstat __sanitizer_syscall_post_impl_fstat __sanitizer_syscall_pre_impl_newstat __sanitizer_syscall_post_impl_newstat __sanitizer_syscall_pre_impl_newlstat __sanitizer_syscall_post_impl_newlstat __sanitizer_syscall_pre_impl_newfstat __sanitizer_syscall_post_impl_newfstat __sanitizer_syscall_pre_impl_stat64 __sanitizer_syscall_post_impl_stat64 __sanitizer_syscall_pre_impl_fstat64 __sanitizer_syscall_post_impl_fstat64 __sanitizer_syscall_pre_impl_lstat64 __sanitizer_syscall_post_impl_lstat64 __sanitizer_syscall_pre_impl_setxattr __sanitizer_syscall_post_impl_setxattr __sanitizer_syscall_pre_impl_lsetxattr __sanitizer_syscall_post_impl_lsetxattr __sanitizer_syscall_pre_impl_fsetxattr __sanitizer_syscall_post_impl_fsetxattr __sanitizer_syscall_pre_impl_getxattr __sanitizer_syscall_post_impl_getxattr __sanitizer_syscall_pre_impl_lgetxattr __sanitizer_syscall_post_impl_lgetxattr __sanitizer_syscall_pre_impl_fgetxattr __sanitizer_syscall_post_impl_fgetxattr __sanitizer_syscall_pre_impl_listxattr __sanitizer_syscall_post_impl_listxattr __sanitizer_syscall_pre_impl_llistxattr __sanitizer_syscall_post_impl_llistxattr __sanitizer_syscall_pre_impl_flistxattr __sanitizer_syscall_post_impl_flistxattr __sanitizer_syscall_pre_impl_removexattr __sanitizer_syscall_post_impl_removexattr __sanitizer_syscall_pre_impl_lremovexattr __sanitizer_syscall_post_impl_lremovexattr __sanitizer_syscall_pre_impl_fremovexattr __sanitizer_syscall_post_impl_fremovexattr __sanitizer_syscall_pre_impl_brk __sanitizer_syscall_post_impl_brk __sanitizer_syscall_pre_impl_mprotect __sanitizer_syscall_post_impl_mprotect __sanitizer_syscall_pre_impl_mremap __sanitizer_syscall_post_impl_mremap __sanitizer_syscall_pre_impl_remap_file_pages __sanitizer_syscall_post_impl_remap_file_pages __sanitizer_syscall_pre_impl_msync __sanitizer_syscall_post_impl_msync __sanitizer_syscall_pre_impl_munmap __sanitizer_syscall_post_impl_munmap __sanitizer_syscall_pre_impl_mlock __sanitizer_syscall_post_impl_mlock __sanitizer_syscall_pre_impl_munlock __sanitizer_syscall_post_impl_munlock __sanitizer_syscall_pre_impl_mlockall __sanitizer_syscall_post_impl_mlockall __sanitizer_syscall_pre_impl_munlockall __sanitizer_syscall_post_impl_munlockall __sanitizer_syscall_pre_impl_madvise __sanitizer_syscall_post_impl_madvise __sanitizer_syscall_pre_impl_mincore __sanitizer_syscall_post_impl_mincore __sanitizer_syscall_pre_impl_pivot_root __sanitizer_syscall_post_impl_pivot_root __sanitizer_syscall_pre_impl_chroot __sanitizer_syscall_post_impl_chroot __sanitizer_syscall_pre_impl_mknod __sanitizer_syscall_post_impl_mknod __sanitizer_syscall_pre_impl_link __sanitizer_syscall_post_impl_link __sanitizer_syscall_pre_impl_symlink __sanitizer_syscall_post_impl_symlink __sanitizer_syscall_pre_impl_unlink __sanitizer_syscall_post_impl_unlink __sanitizer_syscall_pre_impl_rename __sanitizer_syscall_post_impl_rename __sanitizer_syscall_pre_impl_chmod __sanitizer_syscall_post_impl_chmod __sanitizer_syscall_pre_impl_fchmod __sanitizer_syscall_post_impl_fchmod __sanitizer_syscall_pre_impl_fcntl __sanitizer_syscall_post_impl_fcntl __sanitizer_syscall_pre_impl_fcntl64 __sanitizer_syscall_post_impl_fcntl64 __sanitizer_syscall_pre_impl_pipe __sanitizer_syscall_post_impl_pipe __sanitizer_syscall_pre_impl_pipe2 __sanitizer_syscall_post_impl_pipe2 __sanitizer_syscall_pre_impl_dup __sanitizer_syscall_post_impl_dup __sanitizer_syscall_pre_impl_dup2 __sanitizer_syscall_post_impl_dup2 __sanitizer_syscall_pre_impl_dup3 __sanitizer_syscall_post_impl_dup3 __sanitizer_syscall_pre_impl_ioperm __sanitizer_syscall_post_impl_ioperm __sanitizer_syscall_pre_impl_ioctl __sanitizer_syscall_post_impl_ioctl __sanitizer_syscall_pre_impl_flock __sanitizer_syscall_post_impl_flock __sanitizer_syscall_pre_impl_io_setup __sanitizer_syscall_post_impl_io_setup __sanitizer_syscall_pre_impl_io_destroy __sanitizer_syscall_post_impl_io_destroy __sanitizer_syscall_pre_impl_io_getevents __sanitizer_syscall_post_impl_io_getevents __sanitizer_syscall_pre_impl_io_submit __sanitizer_syscall_post_impl_io_submit __sanitizer_syscall_pre_impl_io_cancel __sanitizer_syscall_post_impl_io_cancel __sanitizer_syscall_pre_impl_sendfile __sanitizer_syscall_post_impl_sendfile __sanitizer_syscall_pre_impl_sendfile64 __sanitizer_syscall_post_impl_sendfile64 __sanitizer_syscall_pre_impl_readlink __sanitizer_syscall_post_impl_readlink __sanitizer_syscall_pre_impl_creat __sanitizer_syscall_post_impl_creat __sanitizer_syscall_pre_impl_open __sanitizer_syscall_post_impl_open __sanitizer_syscall_pre_impl_close __sanitizer_syscall_post_impl_close __sanitizer_syscall_pre_impl_access __sanitizer_syscall_post_impl_access __sanitizer_syscall_pre_impl_vhangup __sanitizer_syscall_post_impl_vhangup __sanitizer_syscall_pre_impl_chown __sanitizer_syscall_post_impl_chown __sanitizer_syscall_pre_impl_lchown __sanitizer_syscall_post_impl_lchown __sanitizer_syscall_pre_impl_fchown __sanitizer_syscall_post_impl_fchown __sanitizer_syscall_pre_impl_utime __sanitizer_syscall_post_impl_utime __sanitizer_syscall_pre_impl_utimes __sanitizer_syscall_post_impl_utimes __sanitizer_syscall_pre_impl_lseek __sanitizer_syscall_post_impl_lseek __sanitizer_syscall_pre_impl_llseek __sanitizer_syscall_post_impl_llseek __sanitizer_syscall_pre_impl_readv __sanitizer_syscall_post_impl_readv __sanitizer_syscall_pre_impl_write __sanitizer_syscall_post_impl_write __sanitizer_syscall_pre_impl_writev __sanitizer_syscall_post_impl_writev __sanitizer_syscall_pre_impl_pread64 __sanitizer_syscall_post_impl_pread64 __sanitizer_syscall_pre_impl_pwrite64 __sanitizer_syscall_post_impl_pwrite64 __sanitizer_syscall_pre_impl_preadv __sanitizer_syscall_post_impl_preadv __sanitizer_syscall_pre_impl_pwritev __sanitizer_syscall_post_impl_pwritev __sanitizer_syscall_pre_impl_getcwd __sanitizer_syscall_post_impl_getcwd __sanitizer_syscall_pre_impl_mkdir __sanitizer_syscall_post_impl_mkdir __sanitizer_syscall_pre_impl_chdir __sanitizer_syscall_post_impl_chdir __sanitizer_syscall_pre_impl_fchdir __sanitizer_syscall_post_impl_fchdir __sanitizer_syscall_pre_impl_rmdir __sanitizer_syscall_post_impl_rmdir __sanitizer_syscall_pre_impl_lookup_dcookie __sanitizer_syscall_post_impl_lookup_dcookie __sanitizer_syscall_pre_impl_quotactl __sanitizer_syscall_post_impl_quotactl __sanitizer_syscall_pre_impl_getdents __sanitizer_syscall_post_impl_getdents __sanitizer_syscall_pre_impl_getdents64 __sanitizer_syscall_post_impl_getdents64 __sanitizer_syscall_pre_impl_setsockopt __sanitizer_syscall_post_impl_setsockopt __sanitizer_syscall_pre_impl_getsockopt __sanitizer_syscall_post_impl_getsockopt __sanitizer_syscall_pre_impl_bind __sanitizer_syscall_post_impl_bind __sanitizer_syscall_pre_impl_connect __sanitizer_syscall_post_impl_connect __sanitizer_syscall_pre_impl_accept __sanitizer_syscall_post_impl_accept __sanitizer_syscall_pre_impl_accept4 __sanitizer_syscall_post_impl_accept4 __sanitizer_syscall_pre_impl_getsockname __sanitizer_syscall_post_impl_getsockname __sanitizer_syscall_pre_impl_getpeername __sanitizer_syscall_post_impl_getpeername __sanitizer_syscall_pre_impl_send __sanitizer_syscall_post_impl_send __sanitizer_syscall_pre_impl_sendto __sanitizer_syscall_post_impl_sendto __sanitizer_syscall_pre_impl_sendmsg __sanitizer_syscall_post_impl_sendmsg __sanitizer_syscall_pre_impl_sendmmsg __sanitizer_syscall_post_impl_sendmmsg __sanitizer_syscall_pre_impl_recv __sanitizer_syscall_post_impl_recv __sanitizer_syscall_pre_impl_recvfrom __sanitizer_syscall_post_impl_recvfrom __sanitizer_syscall_pre_impl_socket __sanitizer_syscall_post_impl_socket __sanitizer_syscall_pre_impl_socketpair __sanitizer_syscall_post_impl_socketpair __sanitizer_syscall_pre_impl_socketcall __sanitizer_syscall_post_impl_socketcall __sanitizer_syscall_pre_impl_listen __sanitizer_syscall_post_impl_listen __sanitizer_syscall_pre_impl_poll __sanitizer_syscall_post_impl_poll __sanitizer_syscall_pre_impl_select __sanitizer_syscall_post_impl_select __sanitizer_syscall_pre_impl_old_select __sanitizer_syscall_post_impl_old_select __sanitizer_syscall_pre_impl_epoll_create __sanitizer_syscall_post_impl_epoll_create __sanitizer_syscall_pre_impl_epoll_create1 __sanitizer_syscall_post_impl_epoll_create1 __sanitizer_syscall_pre_impl_epoll_ctl __sanitizer_syscall_post_impl_epoll_ctl __sanitizer_syscall_pre_impl_epoll_wait __sanitizer_syscall_post_impl_epoll_wait __sanitizer_syscall_pre_impl_epoll_pwait __sanitizer_syscall_post_impl_epoll_pwait __sanitizer_syscall_pre_impl_epoll_pwait2 __sanitizer_syscall_post_impl_epoll_pwait2 __sanitizer_syscall_pre_impl_gethostname __sanitizer_syscall_post_impl_gethostname __sanitizer_syscall_pre_impl_sethostname __sanitizer_syscall_post_impl_sethostname __sanitizer_syscall_pre_impl_setdomainname __sanitizer_syscall_post_impl_setdomainname __sanitizer_syscall_pre_impl_newuname __sanitizer_syscall_post_impl_newuname __sanitizer_syscall_pre_impl_uname __sanitizer_syscall_post_impl_uname __sanitizer_syscall_pre_impl_olduname __sanitizer_syscall_post_impl_olduname __sanitizer_syscall_pre_impl_getrlimit __sanitizer_syscall_post_impl_getrlimit __sanitizer_syscall_pre_impl_old_getrlimit __sanitizer_syscall_post_impl_old_getrlimit __sanitizer_syscall_pre_impl_setrlimit __sanitizer_syscall_post_impl_setrlimit __sanitizer_syscall_pre_impl_getrusage __sanitizer_syscall_post_impl_getrusage __sanitizer_syscall_pre_impl_umask __sanitizer_syscall_post_impl_umask __sanitizer_syscall_pre_impl_msgget __sanitizer_syscall_post_impl_msgget __sanitizer_syscall_pre_impl_msgsnd __sanitizer_syscall_post_impl_msgsnd __sanitizer_syscall_pre_impl_msgrcv __sanitizer_syscall_post_impl_msgrcv __sanitizer_syscall_pre_impl_semget __sanitizer_syscall_post_impl_semget __sanitizer_syscall_pre_impl_semop __sanitizer_syscall_post_impl_semop __sanitizer_syscall_pre_impl_semctl __sanitizer_syscall_post_impl_semctl __sanitizer_syscall_pre_impl_semtimedop __sanitizer_syscall_post_impl_semtimedop __sanitizer_syscall_pre_impl_shmat __sanitizer_syscall_post_impl_shmat __sanitizer_syscall_pre_impl_shmget __sanitizer_syscall_post_impl_shmget __sanitizer_syscall_pre_impl_shmdt __sanitizer_syscall_post_impl_shmdt __sanitizer_syscall_pre_impl_ipc __sanitizer_syscall_post_impl_ipc __sanitizer_syscall_pre_impl_pciconfig_iobase __sanitizer_syscall_post_impl_pciconfig_iobase __sanitizer_syscall_pre_impl_pciconfig_read __sanitizer_syscall_post_impl_pciconfig_read __sanitizer_syscall_pre_impl_pciconfig_write __sanitizer_syscall_post_impl_pciconfig_write __sanitizer_syscall_pre_impl_swapon __sanitizer_syscall_post_impl_swapon __sanitizer_syscall_pre_impl_swapoff __sanitizer_syscall_post_impl_swapoff __sanitizer_syscall_pre_impl_sysctl __sanitizer_syscall_post_impl_sysctl __sanitizer_syscall_pre_impl_sysinfo __sanitizer_syscall_post_impl_sysinfo __sanitizer_syscall_pre_impl_sysfs __sanitizer_syscall_post_impl_sysfs __sanitizer_syscall_pre_impl_syslog __sanitizer_syscall_post_impl_syslog __sanitizer_syscall_pre_impl_uselib __sanitizer_syscall_post_impl_uselib __sanitizer_syscall_pre_impl_ni_syscall __sanitizer_syscall_post_impl_ni_syscall __sanitizer_syscall_pre_impl_ptrace __sanitizer_syscall_post_impl_ptrace __sanitizer_syscall_pre_impl_add_key __sanitizer_syscall_post_impl_add_key __sanitizer_syscall_pre_impl_request_key __sanitizer_syscall_post_impl_request_key __sanitizer_syscall_pre_impl_keyctl __sanitizer_syscall_post_impl_keyctl __sanitizer_syscall_pre_impl_ioprio_set __sanitizer_syscall_post_impl_ioprio_set __sanitizer_syscall_pre_impl_ioprio_get __sanitizer_syscall_post_impl_ioprio_get __sanitizer_syscall_pre_impl_set_mempolicy __sanitizer_syscall_post_impl_set_mempolicy __sanitizer_syscall_pre_impl_migrate_pages __sanitizer_syscall_post_impl_migrate_pages __sanitizer_syscall_pre_impl_move_pages __sanitizer_syscall_post_impl_move_pages __sanitizer_syscall_pre_impl_mbind __sanitizer_syscall_post_impl_mbind __sanitizer_syscall_pre_impl_get_mempolicy __sanitizer_syscall_post_impl_get_mempolicy __sanitizer_syscall_pre_impl_inotify_init __sanitizer_syscall_post_impl_inotify_init __sanitizer_syscall_pre_impl_inotify_init1 __sanitizer_syscall_post_impl_inotify_init1 __sanitizer_syscall_pre_impl_inotify_add_watch __sanitizer_syscall_post_impl_inotify_add_watch __sanitizer_syscall_pre_impl_inotify_rm_watch __sanitizer_syscall_post_impl_inotify_rm_watch __sanitizer_syscall_pre_impl_spu_run __sanitizer_syscall_post_impl_spu_run __sanitizer_syscall_pre_impl_spu_create __sanitizer_syscall_post_impl_spu_create __sanitizer_syscall_pre_impl_mknodat __sanitizer_syscall_post_impl_mknodat __sanitizer_syscall_pre_impl_mkdirat __sanitizer_syscall_post_impl_mkdirat __sanitizer_syscall_pre_impl_unlinkat __sanitizer_syscall_post_impl_unlinkat __sanitizer_syscall_pre_impl_symlinkat __sanitizer_syscall_post_impl_symlinkat __sanitizer_syscall_pre_impl_linkat __sanitizer_syscall_post_impl_linkat __sanitizer_syscall_pre_impl_renameat __sanitizer_syscall_post_impl_renameat __sanitizer_syscall_pre_impl_futimesat __sanitizer_syscall_post_impl_futimesat __sanitizer_syscall_pre_impl_faccessat __sanitizer_syscall_post_impl_faccessat __sanitizer_syscall_pre_impl_fchmodat __sanitizer_syscall_post_impl_fchmodat __sanitizer_syscall_pre_impl_fchownat __sanitizer_syscall_post_impl_fchownat __sanitizer_syscall_pre_impl_openat __sanitizer_syscall_post_impl_openat __sanitizer_syscall_pre_impl_newfstatat __sanitizer_syscall_post_impl_newfstatat __sanitizer_syscall_pre_impl_fstatat64 __sanitizer_syscall_post_impl_fstatat64 __sanitizer_syscall_pre_impl_readlinkat __sanitizer_syscall_post_impl_readlinkat __sanitizer_syscall_pre_impl_utimensat __sanitizer_syscall_post_impl_utimensat __sanitizer_syscall_pre_impl_unshare __sanitizer_syscall_post_impl_unshare __sanitizer_syscall_pre_impl_splice __sanitizer_syscall_post_impl_splice __sanitizer_syscall_pre_impl_vmsplice __sanitizer_syscall_post_impl_vmsplice __sanitizer_syscall_pre_impl_tee __sanitizer_syscall_post_impl_tee __sanitizer_syscall_pre_impl_get_robust_list __sanitizer_syscall_post_impl_get_robust_list __sanitizer_syscall_pre_impl_set_robust_list __sanitizer_syscall_post_impl_set_robust_list __sanitizer_syscall_pre_impl_getcpu __sanitizer_syscall_post_impl_getcpu __sanitizer_syscall_pre_impl_signalfd __sanitizer_syscall_post_impl_signalfd __sanitizer_syscall_pre_impl_signalfd4 __sanitizer_syscall_post_impl_signalfd4 __sanitizer_syscall_pre_impl_timerfd_create __sanitizer_syscall_post_impl_timerfd_create __sanitizer_syscall_pre_impl_timerfd_settime __sanitizer_syscall_post_impl_timerfd_settime __sanitizer_syscall_pre_impl_timerfd_gettime __sanitizer_syscall_post_impl_timerfd_gettime __sanitizer_syscall_pre_impl_eventfd __sanitizer_syscall_post_impl_eventfd __sanitizer_syscall_pre_impl_eventfd2 __sanitizer_syscall_post_impl_eventfd2 __sanitizer_syscall_pre_impl_old_readdir __sanitizer_syscall_post_impl_old_readdir __sanitizer_syscall_pre_impl_pselect6 __sanitizer_syscall_post_impl_pselect6 __sanitizer_syscall_pre_impl_ppoll __sanitizer_syscall_post_impl_ppoll __sanitizer_syscall_pre_impl_syncfs __sanitizer_syscall_post_impl_syncfs __sanitizer_syscall_pre_impl_perf_event_open __sanitizer_syscall_post_impl_perf_event_open __sanitizer_syscall_pre_impl_mmap_pgoff __sanitizer_syscall_post_impl_mmap_pgoff __sanitizer_syscall_pre_impl_old_mmap __sanitizer_syscall_post_impl_old_mmap __sanitizer_syscall_pre_impl_name_to_handle_at __sanitizer_syscall_post_impl_name_to_handle_at __sanitizer_syscall_pre_impl_open_by_handle_at __sanitizer_syscall_post_impl_open_by_handle_at __sanitizer_syscall_pre_impl_setns __sanitizer_syscall_post_impl_setns __sanitizer_syscall_pre_impl_process_vm_readv __sanitizer_syscall_post_impl_process_vm_readv __sanitizer_syscall_pre_impl_process_vm_writev __sanitizer_syscall_post_impl_process_vm_writev __sanitizer_syscall_pre_impl_fork __sanitizer_syscall_post_impl_fork __sanitizer_syscall_pre_impl_vfork __sanitizer_syscall_post_impl_vfork __sanitizer_syscall_pre_impl_sigaction __sanitizer_syscall_post_impl_sigaction __sanitizer_syscall_pre_impl_rt_sigaction __sanitizer_syscall_post_impl_rt_sigaction __sanitizer_syscall_pre_impl_getrandom __sanitizer_syscall_post_impl_getrandom __sanitizer_syscall_pre_impl_sigaltstack __sanitizer_syscall_post_impl_sigaltstack __interceptor_pthread_create _ZN6__asan27EnsureMainThreadIDIsCorrectEv _ZN6__asan10AsanThread6CreateEPFPvS1_ES1_jPN11__sanitizer10StackTraceEb _ZN14__interception19real_pthread_createE _ZN6__asan10AsanThread7DestroyEv _ZN6__asan16SetCurrentThreadEPNS_10AsanThreadE _ZN6__asan10AsanThread11ThreadStartEy __interceptor_pthread_join _ZN14__interception17real_pthread_joinE __interceptor_longjmp __asan_handle_no_return _ZN14__interception12real_longjmpE __interceptor__longjmp _ZN14__interception13real__longjmpE __interceptor_siglongjmp _ZN14__interception15real_siglongjmpE __interceptor___cxa_throw _ZN14__interception16real___cxa_throwE __interceptor___cxa_rethrow_primary_exception _ZN14__interception36real___cxa_rethrow_primary_exceptionE __interceptor__Unwind_RaiseException _ZN14__interception27real__Unwind_RaiseExceptionE __interceptor_strcat _ZN14__interception11real_strcatE __interceptor_strncat _ZN14__interception12real_strncatE __interceptor_strcpy _ZN14__interception11real_strcpyE __interceptor_strdup __interceptor_strncpy _ZN14__interception12real_strncpyE __interceptor_strtol _ZN14__interception11real_strtolE __interceptor_atoi _ZN14__interception9real_atoiE __interceptor_atol _ZN14__interception9real_atolE __interceptor_strtoll _ZN14__interception12real_strtollE __interceptor_atoll _ZN14__interception10real_atollE __interceptor___cxa_atexit _ZN14__interception17real___cxa_atexitE _ZN6__asan26InitializeAsanInterceptorsEv bsd_signal signal strcat strcpy strncat strncpy strdup _ZN14__interception11real_strdupE index _ZN14__interception10real_indexE atoi atol strtol atoll strtoll longjmp _longjmp siglongjmp __cxa_throw __cxa_rethrow_primary_exception _Unwind_RaiseException pthread_create pthread_join __interceptor_vfork vfork _ZN14__interception10real_vforkE _ZN6__asan30InitializePlatformInterceptorsEv mmap mprotect strlen strnlen strndup strcmp strncmp strcasecmp strncasecmp strstr strcasestr strchr strchrnul strrchr strspn strcspn strtok strpbrk strxfrm strxfrm_l __strxfrm_l memset memmove _ZN14__interception12real_memmoveE memcpy memchr memcmp bcmp memrchr memmem read fread pread readv write fwrite pwrite writev fgets fputs puts prctl localtime localtime_r gmtime gmtime_r ctime ctime_r asctime asctime_r mktime strptime scanf _ZN14__interception10real_scanfE sscanf _ZN14__interception11real_sscanfE fscanf _ZN14__interception11real_fscanfE vscanf vsscanf vfscanf printf _ZN14__interception11real_printfE sprintf _ZN14__interception12real_sprintfE _ZN14__interception13real_snprintfE asprintf _ZN14__interception13real_asprintfE fprintf _ZN14__interception12real_fprintfE vprintf vsprintf vsnprintf vasprintf vfprintf frexp frexpf frexpl getpwnam getpwuid getgrnam getgrgid clock_getres clock_settime clock_getcpuclockid pthread_getcpuclockid getitimer setitimer time posix_spawn posix_spawnp wait waitid waitpid wait3 __wait4 inet_ntop inet_pton pthread_getschedparam getaddrinfo getnameinfo getsockname gethostent gethostbyaddr gethostbyname gethostbyname2 gethostbyname_r getsockopt accept modf modff modfl recvmsg sendmsg recvmmsg sendmmsg getpeername _ZN11__sanitizer4SortI10ioctl_desc18ioctl_desc_compareEEvPT_jT0_ ioctl inet_aton sysinfo opendir readdir readdir_r setlocale getcwd strtoimax strtoumax mbstowcs mbsrtowcs wcstombs wcsrtombs realpath strerror strerror_r getgroups poll sigwait sigpending sigprocmask pthread_sigmask _exit pthread_mutex_lock pthread_mutex_unlock getmntent initgroups ether_ntoa ether_aton pthread_attr_getdetachstate pthread_attr_getguardsize pthread_attr_getscope pthread_attr_getstacksize pthread_attr_getschedparam pthread_attr_getschedpolicy pthread_mutexattr_getpshared pthread_mutexattr_gettype pthread_rwlockattr_getpshared pthread_condattr_getpshared tmpnam ptsname ptsname_r ttyname ttyname_r tempnam sincos sincosf sincosl remquo remquof remquol lgamma lgammaf lgammal lgamma_r lgammaf_r times listxattr llistxattr flistxattr getxattr lgetxattr fgetxattr getresuid getresgid ftime fopen fdopen freopen fflush fclose mlock _ZN14__interception10real_mlockE munlock _ZN14__interception12real_munlockE mlockall _ZN14__interception13real_mlockallE munlockall _ZN14__interception15real_munlockallE sem_init sem_destroy sem_wait sem_trywait sem_timedwait sem_post sem_getvalue sem_open sem_unlink pthread_setcancelstate pthread_setcanceltype mincore process_vm_readv process_vm_writev ctermid recv recvfrom send sendto stat eventfd_read eventfd_write getutent getutid getutline wcslen wcsnlen wcscat wcsncat wcsdup wcsxfrm wcsxfrm_l __wcsxfrm_l getgrouplist readlink readlinkat strlcpy strlcat getprotoent getprotobyname getprotobynumber getnetent getnetbyname getnetbyaddr setvbuf setbuf setbuffer setlinebuf regcomp regexec regerror regfree popen pclose uname __interceptor_index __asan_memcpy __asan_memset __asan_memmove _ZN6__asan35InitializePlatformExceptionHandlersEv _ZN6__asan31AsanDoesNotSupportStaticLinkageEv _ZN6__asan22FindDynamicShadowStartEv _ZN6__asan25AsanCheckDynamicRTPrereqsEv _ZN6__asan23AsanCheckIncompatibleRTEv _ZN6__asan13AsanDlSymNextEPKc __asan_rt_version _ZN11__sanitizer14DlSymAllocatorI10DlsymAllocE4FreeEPv _ZN11__sanitizer14DlSymAllocatorI10DlsymAllocE8AllocateEj __interceptor_calloc _ZN11__sanitizer14DlSymAllocatorI10DlsymAllocE9CallocateEjj __interceptor_realloc _ZN11__sanitizer14DlSymAllocatorI10DlsymAllocE7ReallocEPvj __interceptor_reallocarray __interceptor_memalign __interceptor___libc_memalign __interceptor_aligned_alloc __interceptor_malloc_usable_size __interceptor_mallinfo __interceptor_mallopt __interceptor_posix_memalign __interceptor_valloc __interceptor_pvalloc __interceptor_malloc_stats __asan_print_accumulated_stats _ZN6__asan19ReplaceSystemMallocEv free malloc calloc realloc reallocarray memalign __libc_memalign aligned_alloc malloc_usable_size mallinfo mallopt posix_memalign valloc pvalloc malloc_stats _ZN6__asan11HeapProfile5PrintEjj _ZN6__asan11HeapProfile12ProcessChunkERKNS_13AsanChunkViewE _ZN11__sanitizer4SortIN6__asan14AllocationSiteEZNS1_11HeapProfile5PrintEjjEUlRKS2_S5_E_EEvPT_jT0_ _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__asan14AllocationSiteEE7ReallocEj _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__asan14AllocationSiteEE9push_backERKS2_ _ZN6__asan38AsanPoisonOrUnpoisonIntraObjectRedzoneEjjb __asan_poison_memory_region __asan_unpoison_memory_region __asan_address_is_poisoned __sanitizer_unaligned_load16 __asan_report_error __sanitizer_unaligned_load32 __sanitizer_unaligned_load64 __sanitizer_unaligned_store16 __sanitizer_unaligned_store32 __sanitizer_unaligned_store64 __asan_poison_cxx_array_cookie __asan_load_cxx_array_cookie __asan_set_shadow_00 __asan_set_shadow_f1 __asan_set_shadow_f2 __asan_set_shadow_f3 __asan_set_shadow_f5 __asan_set_shadow_f8 __asan_poison_stack_memory __asan_unpoison_stack_memory __sanitizer_annotate_contiguous_container _ZN6__asan44ReportBadParamsToAnnotateContiguousContainerEjjjjPN11__sanitizer18BufferedStackTraceE __sanitizer_contiguous_container_find_bad_address __sanitizer_verify_contiguous_container __asan_poison_intra_object_redzone __asan_unpoison_intra_object_redzone _ZN6__asan18AsanOnDeadlySignalEiPvS0_ _ZN6__asan18ReportDeadlySignalERKN11__sanitizer13SignalContextE _ZN6__asan22PlatformUnpoisonStacksEv _ZN6__asan13UnpoisonStackEjjPKc _ZN6__asan11AsanTSDInitEPFvPvE pthread_key_create _ZN6__asan10AsanTSDGetEv pthread_getspecific _ZN6__asan10AsanTSDSetEPv pthread_setspecific _ZN6__asan15PlatformTSDDtorEPv _ZN6__asan10AsanThread7TSDDtorEPv _ZN6__asan26AppendToErrorMessageBufferEPKc _ZN6__asan9Decorator10ShadowByteEh _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__asan13StackVarDescrEE9push_backERKS2_ _ZN11__sanitizer24InternalMmapVectorNoCtorIN6__asan13StackVarDescrEE7ReallocEj _ZN6__asan19ScopedInErrorReportC2Eb _ZN6__asan17ErrorDeadlySignalC2EjRKN11__sanitizer13SignalContextE _ZN6__asan19ScopedInErrorReport14current_error_E _ZN6__asan19ScopedInErrorReportD2Ev __asan_on_error _ZN6__asan16ErrorDescription5PrintEv __asan_test_only_reported_buggy_pointer __asan_set_error_report_callback __asan_describe_address __asan_report_present __asan_get_report_pc __asan_get_report_bp __asan_get_report_sp __asan_get_report_address __asan_get_report_access_type __asan_get_report_access_size __asan_get_report_description __sanitizer_ptr_sub _ZN6__asan10AsanThread27GetStackVariableShadowStartEj __sanitizer_ptr_cmp __asan_report_load1 __asan_report_exp_load1 __asan_report_load1_noabort __asan_report_load2 __asan_report_exp_load2 __asan_report_load2_noabort __asan_report_load4 __asan_report_exp_load4 __asan_report_load4_noabort __asan_report_load8 __asan_report_exp_load8 __asan_report_load8_noabort __asan_report_load16 __asan_report_exp_load16 __asan_report_load16_noabort __asan_report_store1 __asan_report_exp_store1 __asan_report_store1_noabort __asan_report_store2 __asan_report_exp_store2 __asan_report_store2_noabort __asan_report_store4 __asan_report_exp_store4 __asan_report_store4_noabort __asan_report_store8 __asan_report_exp_store8 __asan_report_store8_noabort __asan_report_store16 __asan_report_exp_store16 __asan_report_store16_noabort __asan_report_load_n __asan_report_exp_load_n __asan_report_load_n_noabort __asan_report_store_n __asan_report_exp_store_n __asan_report_store_n_noabort __asan_load1 __asan_exp_load1 __asan_load1_noabort __asan_load2 __asan_exp_load2 __asan_load2_noabort __asan_load4 __asan_exp_load4 __asan_load4_noabort __asan_load8 __asan_exp_load8 __asan_load8_noabort __asan_load16 __asan_exp_load16 __asan_load16_noabort __asan_store1 __asan_exp_store1 __asan_store1_noabort __asan_store2 __asan_exp_store2 __asan_store2_noabort __asan_store4 __asan_exp_store4 __asan_store4_noabort __asan_store8 __asan_exp_store8 __asan_store8_noabort __asan_store16 __asan_exp_store16 __asan_store16_noabort __asan_loadN __asan_exp_loadN __asan_loadN_noabort __asan_storeN __asan_exp_storeN __asan_storeN_noabort _ZN6__asan23PrintAddressSpaceLayoutEv _ZN6__asan22InitializeShadowMemoryEv _ZN6__asan16CreateMainThreadEv _ZN6__asan22InitializeSuppressionsEv _ZN6__asan10AsanThread9stack_topEv __asan_extra_spill_area __asan_handle_vfork _ZN6__asan10AsanThread12stack_bottomEv __asan_set_death_callback __asan_init __asan_version_mismatch_check_v9 _ZN6__asan18AsanMappingProfileE __sanitizer_print_stack_trace _ZN6__asan9AsanStats5PrintEv _ZN6__asan22FlushToDeadThreadStatsEPNS_9AsanStatsE __sanitizer_get_current_allocated_bytes __sanitizer_get_heap_size __sanitizer_get_free_bytes __sanitizer_get_unmapped_bytes __asan_default_suppressions _ZN6__asan17AsanThreadContext9OnCreatedEPv _ZN6__asan17AsanThreadContext10OnFinishedEv _ZTVN6__asan17AsanThreadContextE _ZN6__asan10AsanThread4InitEPKNS0_11InitOptionsE _ZN6__asan10AsanThread20SetThreadStackAndTlsEPKNS0_11InitOptionsE __sanitizer_start_switch_fiber __sanitizer_finish_switch_fiber _Znwj _Znaj _ZnwjRKSt9nothrow_t _ZnajRKSt9nothrow_t _ZnwjSt11align_val_t _ZnajSt11align_val_t _ZnwjSt11align_val_tRKSt9nothrow_t _ZnajSt11align_val_tRKSt9nothrow_t _ZdlPv _ZdaPv _ZdlPvRKSt9nothrow_t _ZdaPvRKSt9nothrow_t _ZdlPvj _ZdaPvj _ZdlPvSt11align_val_t _ZdaPvSt11align_val_t _ZdlPvSt11align_val_tRKSt9nothrow_t _ZdaPvSt11align_val_tRKSt9nothrow_t _ZdlPvjSt11align_val_t _ZdaPvjSt11align_val_t __ubsan_handle_dynamic_type_cache_miss _ZN7__ubsan16checkDynamicTypeEPvS0_j _ZN7__ubsan28getDynamicTypeInfoFromObjectEPv __ubsan_handle_dynamic_type_cache_miss_abort _ZN7__ubsan28getDynamicTypeInfoFromVtableEPv __ubsan_handle_function_type_mismatch_v1 _ZN7__ubsan21checkTypeInfoEqualityEPKvS1_ __ubsan_handle_function_type_mismatch_v1_abort __ubsan_vptr_type_cache _ZTIN10__cxxabiv117__class_type_infoE _ZTISt9type_info __dynamic_cast _ZTIN10__cxxabiv120__si_class_type_infoE _ZTIN10__cxxabiv121__vmi_class_type_infoE __unw_init_local _ZTVN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EEE _ZN9libunwind17LocalAddressSpace17sThisAddressSpaceE _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE24setInfoBasedOnIPRegisterEb __unw_get_reg __unw_step __unw_get_proc_info __unw_resume _ZN9libunwind13DwarfFDECacheINS_17LocalAddressSpaceEE5_lockE _ZN9libunwind13DwarfFDECacheINS_17LocalAddressSpaceEE7_bufferE _ZN9libunwind13DwarfFDECacheINS_17LocalAddressSpaceEE11_bufferUsedE _ZN9libunwind10CFI_ParserINS_17LocalAddressSpaceEE9decodeFDEERS1_jPNS2_8FDE_InfoEPNS2_8CIE_InfoEb _ZN9libunwind13DwarfFDECacheINS_17LocalAddressSpaceEE10_bufferEndE _ZN9libunwind13DwarfFDECacheINS_17LocalAddressSpaceEE14_initialBufferE _ZN9libunwind10CFI_ParserINS_17LocalAddressSpaceEE8parseCIEERS1_jPNS2_8CIE_InfoE _ZN9libunwind17LocalAddressSpace11getEncodedPERjjhj _ZN9libunwind17LocalAddressSpace10getULEB128ERjj _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EED0Ev _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE8validRegEi _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE6getRegEi _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE6setRegEij _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE13validFloatRegEi _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE11getFloatRegEi _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE11setFloatRegEid _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE4stepEv _ZN9libunwind17DwarfInstructionsINS_17LocalAddressSpaceENS_13Registers_x86EE13stepWithDwarfERS1_jjRS2_Rb _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE7getInfoEP15unw_proc_info_t _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE6jumptoEv _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE13isSignalFrameEv _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE15getFunctionNameEPcjPj _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE23getInfoFromDwarfSectionEjRKNS_18UnwindInfoSectionsEj _ZN9libunwind10CFI_ParserINS_17LocalAddressSpaceEE20parseFDEInstructionsERS1_RKNS2_8FDE_InfoERKNS2_8CIE_InfoEjiPNS2_10PrologInfoE _ZN9libunwind12UnwindCursorINS_17LocalAddressSpaceENS_13Registers_x86EE15getRegisterNameEi _ZN9libunwind20AbstractUnwindCursorD2Ev _ZN9libunwind17DwarfInstructionsINS_17LocalAddressSpaceENS_13Registers_x86EE18evaluateExpressionEjRS1_RKS2_j _ZN9libunwind17DwarfInstructionsINS_17LocalAddressSpaceENS_13Registers_x86EE16getSavedRegisterERS1_RKS2_jRKNS_10CFI_ParserIS1_E16RegisterLocationE _ZN9libunwind10CFI_ParserINS_17LocalAddressSpaceEE7findFDEERS1_jjjjPNS2_8FDE_InfoEPNS2_8CIE_InfoE _ZN9libunwind14EHHeaderParserINS_17LocalAddressSpaceEE7findFDEERS1_jjjPNS_10CFI_ParserIS1_E8FDE_InfoEPNS5_8CIE_InfoE _ZN9libunwind14EHHeaderParserINS_17LocalAddressSpaceEE17getTableEntrySizeEh unw_init_local unw_get_reg unw_step unw_get_proc_info unw_resume __unw_getcontext __sF pthread_rwlock_wrlock pthread_rwlock_unlock __libunwind_Registers_x86_jumpto pthread_rwlock_rdlock unw_getcontext