The app get stuck in launch Interface, When I try to use Address Sanitizer in UE4.27 with the fps demo. Then, I try to modefied the wrap.sh as followed(Address Sanitizer | Android NDK | Android Developers).
#!/system/bin/sh
HERE="$(cd "$(dirname "$0")" && pwd)"
export ASAN_OPTIONS=log_to_syslog=false,allow_user_segv_handler=1
ASAN_LIB=$(ls $HERE/libclang_rt.asan-*-android.so)
if [ -f "$HERE/libc++_shared.so" ]; then
# Workaround for https://github.com/android-ndk/ndk/issues/988.
export LD_PRELOAD="$ASAN_LIB $HERE/libc++_shared.so"
else
export LD_PRELOAD="$ASAN_LIB"
fi
"$@"
But, it result in crash, the log is as followed.
2021-10-25 14:31:39.300 12832-12880/? D/UE4: [2021.10.25-06.31.39:300][ 0]LogConfig: Setting CVar [[r.HairStrands.Simulation:0]]
2021-10-25 14:31:39.300 12832-12880/? D/UE4: [2021.10.25-06.31.39:300][ 0]LogConfig: Setting CVar [[r.HairStrands.Strands:0]]
2021-10-25 14:31:39.300 12832-12880/? D/UE4: [2021.10.25-06.31.39:300][ 0]LogConfig: Setting CVar [[r.HairStrands.Binding:0]]
2021-10-25 14:31:39.308 12827-12827/? I/wrap.sh: =================================================================
2021-10-25 14:31:39.308 12827-12827/? I/wrap.sh: e[1me[31m==12832==ERROR: AddressSanitizer: stack-use-after-scope on address 0x0059b2188240 at pc 0x007a4934c530 bp 0x0059b2187ef0 sp 0x0059b2187698
2021-10-25 14:31:39.308 12827-12827/? I/wrap.sh: e[1me[0me[1me[34mREAD of size 48 at 0x0059b2188240 thread T24 (GameThread)e[1me[0m
2021-10-25 14:31:39.305 12832-12832/? W/GameThread: type=1400 audit(0.0:353): avc: denied { search } for name="thermal" dev="sysfs" ino=39305 scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sysfs_thermal:s0 tclass=dir permissive=0 app=com.YourCompany.ue4_26D
2021-10-25 14:31:39.339 12827-12827/? I/wrap.sh: #0 0x7a4934c52c (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so+0x8452c)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh: #1 0x593783843c (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x1a27743c)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh: #2 0x5937837454 (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x1a276454)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh: #3 0x5932e2e048 (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x1586d048)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh: #4 0x5932e27d18 (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15866d18)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh: #5 0x5932e19e78 (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15858e78)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh: #6 0x5932e181dc (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x158571dc)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh: #7 0x5932e22a20 (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15861a20)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh: #8 0x5932f24130 (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15963130)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh: #9 0x7a48351d4c (/apex/com.android.runtime/lib64/bionic/libc.so+0xafd4c)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh: #10 0x7a482f2288 (/apex/com.android.runtime/lib64/bionic/libc.so+0x50288)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh: e[1me[32mAddress 0x0059b2188240 is located in stack of thread T24 (GameThread) at offset 832 in framee[1me[0m
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh: e[1me[0m #0 0x5937837c3c (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x1a276c3c)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh: This frame has 12 object(s):
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh: [32, 48) 'ref.tmp' (line 171)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh: [64, 68) 'Counter' (line 173)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh: [80, 336) 'Buf' (line 176)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh: [400, 401) 'UE_LOG_noinline_lambda' (line 189)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh: [416, 424) 'ref.tmp14' (line 189)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh: [448, 728) 'ref.tmp15' (line 189)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh: [800, 816) 'SensorLocations' (line 198)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh: [832, 984) 'ref.tmp25' (line 203)e[1me[32m <== Memory access at offset 832 is inside this variablee[1me[0m
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh: [1056, 1057) 'UE_LOG_noinline_lambda36' (line 207)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh: [1072, 1080) 'ref.tmp37' (line 207)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh: [1104, 1384) 'ref.tmp38' (line 207)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh: [1456, 1457) 'UE_LOG_noinline_lambda54' (line 213)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh: HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh: (longjmp and C++ exceptions *are* supported)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh: Thread T24 (GameThread) created by T0 (main) here:
2021-10-25 14:31:39.342 12827-12827/? I/wrap.sh: #0 0x7a493595a0 (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so+0x915a0)
2021-10-25 14:31:39.342 12827-12827/? I/wrap.sh: #1 0x5932f23254 (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15962254)
2021-10-25 14:31:39.342 12827-12827/? I/wrap.sh: #2 0x5932f224c8 (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x159614c8)
2021-10-25 14:31:39.342 12827-12827/? I/wrap.sh: #3 0x7a4ad6ff24 (/system/lib64/libandroid_runtime.so+0xaff24)
2021-10-25 14:31:39.342 12827-12827/? I/wrap.sh: #4 0x71f4b4a0 (/system/framework/arm64/boot-framework.oat+0x20f4a0)
2021-10-25 14:31:39.366 12827-12827/? I/wrap.sh: #5 0x59c309a8d1 (/system/framework/framework.jar+0x6b08d1)
2021-10-25 14:31:39.389 12827-12827/? I/wrap.sh: #6 0xba81585ea4108a90 (<unknown module>)
2021-10-25 14:31:39.389 12827-12827/? I/wrap.sh: SUMMARY: AddressSanitizer: stack-use-after-scope (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so+0x8452c)
2021-10-25 14:31:39.389 12827-12827/? I/wrap.sh: Shadow bytes around the buggy address:
2021-10-25 14:31:39.389 12827-12827/? I/wrap.sh: 0x001b36430ff0: e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m
2021-10-25 14:31:39.389 12827-12827/? I/wrap.sh: 0x001b36431000: e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m
2021-10-25 14:31:39.389 12827-12827/? I/wrap.sh: 0x001b36431010: e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[35mf8e[1me[0m e[1me[31mf2e[1me[0m e[1me[35mf8e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: 0x001b36431020: e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: 0x001b36431030: e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: =>0x001b36431040: e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[0m00e[1me[0m e[1me[0m00e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m[e[1me[35mf8e[1me[0m]e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: 0x001b36431050: e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: 0x001b36431060: e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[35mf8e[1me[0m e[1me[31mf2e[1me[0m e[1me[35mf8e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: 0x001b36431070: e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: 0x001b36431080: e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: 0x001b36431090: e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[35mf8e[1me[0m e[1me[31mf3e[1me[0m e[1me[0m00e[1me[0m e[1me[0m00e[1me[0m e[1me[0m00e[1me[0m e[1me[0m00e[1me[0m e[1me[0m00e[1me[0m e[1me[0m00e[1me[0m e[1me[0m00e[1me[0m e[1me[0m00e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Shadow byte legend (one shadow byte represents 8 application bytes):
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Addressable: e[1me[0m00e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Partially addressable: e[1me[0m01e[1me[0m e[1me[0m02e[1me[0m e[1me[0m03e[1me[0m e[1me[0m04e[1me[0m e[1me[0m05e[1me[0m e[1me[0m06e[1me[0m e[1me[0m07e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Heap left redzone: e[1me[31mfae[1me[0m
--------- beginning of crash
2021-10-25 14:31:39.390 12832-12880/? A/libc: Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 12880 (GameThread), pid 12832 (main)
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Freed heap region: e[1me[35mfde[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Stack left redzone: e[1me[31mf1e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Stack mid redzone: e[1me[31mf2e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Stack right redzone: e[1me[31mf3e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Stack after return: e[1me[35mf5e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Stack use after scope: e[1me[35mf8e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Global redzone: e[1me[31mf9e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Global init order: e[1me[36mf6e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Poisoned by user: e[1me[34mf7e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Container overflow: e[1me[34mfce[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Array cookie: e[1me[31mace[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Intra object redzone: e[1me[33mbbe[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: ASan internal: e[1me[33mfee[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Left alloca redzone: e[1me[34mcae[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Right alloca redzone: e[1me[34mcbe[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Shadow gap: e[1me[0mcce[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: ==12832==ABORTING
2021-10-25 14:31:39.486 12930-12930/? I/crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdTombstone
2021-10-25 14:31:39.486 987-987/? I/tombstoned: received crash request for pid 12880
2021-10-25 14:31:39.487 12930-12930/? I/crash_dump64: performing dump of process 12832 (target tid = 12880)
2021-10-25 14:31:39.494 12930-12930/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2021-10-25 14:31:39.494 12930-12930/? A/DEBUG: Build fingerprint: 'google/blueline/blueline:11/RQ1A.210105.003/7005429:user/release-keys'
2021-10-25 14:31:39.494 12930-12930/? A/DEBUG: Revision: 'MP1.0'
2021-10-25 14:31:39.494 12930-12930/? A/DEBUG: ABI: 'arm64'
2021-10-25 14:31:39.496 12930-12930/? A/DEBUG: Timestamp: 2021-10-25 14:31:39+0800
2021-10-25 14:31:39.496 12930-12930/? A/DEBUG: pid: 12832, tid: 12880, name: GameThread >>> com.YourCompany.ue4_26D <<<
2021-10-25 14:31:39.496 12930-12930/? A/DEBUG: uid: 10233
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG: signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr --------
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG: Abort message: '=================================================================
==12832==ERROR: AddressSanitizer: stack-use-after-scope on address 0x0059b2188240 at pc 0x007a4934c530 bp 0x0059b2187ef0 sp 0x0059b2187698
READ of size 48 at 0x0059b2188240 thread T24 (GameThread)
#0 0x7a4934c52c (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so+0x8452c)
#1 0x593783843c (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x1a27743c)
#2 0x5937837454 (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x1a276454)
#3 0x5932e2e048 (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x1586d048)
#4 0x5932e27d18 (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15866d18)
#5 0x5932e19e78 (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15858e78)
#6 0x5932e181dc (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x158571dc)
#7 0x5932e22a20 (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15861a20)
#8 0x5932f24130 (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15963130)
#9 0x7a48351d4c (/apex/com.android.runtime/lib64/bionic/libc.so+0xafd4c)
#10 0x7a482f2288 (/apex/com.android.runtime/lib64/bionic/libc.so+0x50288)
Address 0x0059b2188240 is located in stack of thread T24 (GameThread) at offset 832 in frame
#0 0x5937837c3c (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x1a276c3c)
This frame has 12 object(s):
[32, 48) 'ref.tmp' (line 171)
[64, 68) 'Counter' (line 173)
[80, 336) 'Buf' (line 176)
[400, 401) 'UE_LOG_noinline_lambda' (line 189)
[416, 424) 'ref.tmp14' (line 189)
[448, 728) 'ref.tmp15' (line 189)
[800, 816) 'SensorLocations' (line 198)
[832, 984) 'ref.tmp25' (line 203) <== Memory access at offset 832 is inside this variable
[1056, 1057) 'UE_LOG_noinline_lambda36' (line 207)
[1072, 1080) 'ref.tmp37' (line 207)
[1104, 1384) 'ref.tmp38' (line 207)
[1456, 1457) 'UE_LOG_noinline_lambda54' (line 213)
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
(longjmp and C++ exceptions *are* supported)
Thread T24 (GameThread) created by T0 (main) here:
#0 0x7a493595a0 (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so+0x915a0)
#1 0x5932f23254 (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15962254)
#2 0x5932f224c8 (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x159614c8)
#3 0x7a4ad6ff24 (/system/lib64/libandroid_runtime.so+0xaff24)
#4 0x71f4b4a0 (/system/framework/arm64/boot-framework.oat+0x20f4a0)
#5 0x59c309a8d1 (/system/framework/framework.jar+0x6b08d1)
#6 0xba81585ea4108a90 (<unknown module>)
SUMMARY: AddressSanitizer: stack-use-after-scope (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so+0x8452c)
Shadow bytes around the buggy address:
0x001b36430ff0: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
0x001b36431000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f2 f2 f2 f2 f2 f2
0x001b36431010: f2 f2 f8 f2 f8 f2 f2 f2 f8 f8 f8 f8 f8 f8 f8 f8
0x001b36431020: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
0x001b36431030: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f2 f2 f2 f2 f2
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG: =>0x001b36431040: f2 f2 f2 f2 00 00 f2 f2[f8]f8 f8 f8 f8 f8 f8 f8
0x001b36431050: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f2 f2 f2 f2 f2
0x001b36431060: f2 f2 f2 f2 f8 f2 f8 f2 f2 f2 f8 f8 f8 f8 f8 f8
0x001b36431070: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
0x001b36431080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f2 f2 f2
0x001b36431090: f2 f2 f2 f2 f2 f2 f8 f3 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
'
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG: x0 0000000000000000 x1 0000000000003250 x2 0000000000000006 x3 00000059b2186920
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG: x4 0000000000000000 x5 0000000000000000 x6 0000000000000000 x7 0000000000000000
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG: x8 00000000000000f0 x9 ba81585ea4108a94 x10 0000000000000000 x11 ffffffc0fffffbdf
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG: x12 0000000000000001 x13 0000000000000032 x14 0000000000000030 x15 0000007a49311d54
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG: x16 0000007a4835ac80 x17 0000007a4833c870 x18 a8f49a4aea8aa897 x19 0000000000003220
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG: x20 0000000000003250 x21 00000000ffffffff x22 0000007a49450040 x23 0000007a494d9e00
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG: x24 0000007a4934c530 x25 0000000000000000 x26 00000059b2188c80 x27 00000059b2188c90
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG: x28 00000059b2188cb0 x29 00000059b21869a0
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG: lr 0000007a482f02a0 sp 00000059b2186900 pc 0000007a482f02cc pst 0000000000000000
2021-10-25 14:31:39.599 1300-1300/? E/adbd: failed to connect to socket 'tcp:6666': Connection refused
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG: backtrace:
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG: #00 pc 000000000004e2cc /apex/com.android.runtime/lib64/bionic/libc.so (abort+164) (BuildId: 95f68a34fdf7b31f42d3f811d5d88f58)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG: #01 pc 000000000004d60c /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so (BuildId: 75277f22c1ad14a806c194000cb338ae311fd71c)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG: #02 pc 000000000004c5d8 /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so (BuildId: 75277f22c1ad14a806c194000cb338ae311fd71c)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG: #03 pc 00000000000a3300 /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so (BuildId: 75277f22c1ad14a806c194000cb338ae311fd71c)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG: #04 pc 00000000000a47dc /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so (BuildId: 75277f22c1ad14a806c194000cb338ae311fd71c)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG: #05 pc 000000000008454c /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so (__interceptor_fopen+392) (BuildId: 75277f22c1ad14a806c194000cb338ae311fd71c)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG: #06 pc 000000001a27743c /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so (BuildId: 41e1eba38b8374fee5c357bcbbc150ded8208aaf)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG: #07 pc 000000001a276454 /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so (FAndroidMisc::PlatformInit()+1176) (BuildId: 41e1eba38b8374fee5c357bcbbc150ded8208aaf)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG: #08 pc 000000001586d048 /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so (FEngineLoop::PreInitPreStartupScreen(char16_t const*)+24328) (BuildId: 41e1eba38b8374fee5c357bcbbc150ded8208aaf)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG: #09 pc 0000000015866d18 /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so (FEngineLoop::PreInit(char16_t const*)+36) (BuildId: 41e1eba38b8374fee5c357bcbbc150ded8208aaf)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG: #10 pc 0000000015858e78 /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so (FEngineLoop::PreInit(int, char16_t**, char16_t const*)+336) (BuildId: 41e1eba38b8374fee5c357bcbbc150ded8208aaf)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG: #11 pc 00000000158571dc /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so (AndroidMain(android_app*)+2840) (BuildId: 41e1eba38b8374fee5c357bcbbc150ded8208aaf)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG: #12 pc 0000000015861a20 /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so (android_main+540) (BuildId: 41e1eba38b8374fee5c357bcbbc150ded8208aaf)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG: #13 pc 0000000015963130 /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so (BuildId: 41e1eba38b8374fee5c357bcbbc150ded8208aaf)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG: #14 pc 00000000000afd4c /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+64) (BuildId: 95f68a34fdf7b31f42d3f811d5d88f58)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG: #15 pc 0000000000050288 /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+64) (BuildId: 95f68a34fdf7b31f42d3f811d5d88f58)
2021-10-25 14:31:40.641 987-987/? E/tombstoned: Tombstone written to: /data/tombstones/tombstone_08
2021-10-25 14:31:38.125 1584-1955/? D/ConnectivityService: NetReassign [no changes]
2021-10-25 14:31:40.646 1584-12934/? I/DropBoxManagerService: add tag=data_app_native_crash isTagEnabled=true flags=0x2
2021-10-25 14:31:40.649 1584-1632/? I/BootReceiver: Copying /data/tombstones/tombstone_08 to DropBox (SYSTEM_TOMBSTONE)
2021-10-25 14:31:40.649 1584-1632/? I/DropBoxManagerService: add tag=SYSTEM_TOMBSTONE isTagEnabled=true flags=0x2
2021-10-25 14:31:40.651 1584-12933/? W/ActivityTaskManager: Force finishing activity com.YourCompany.ue4_26D/com.epicgames.ue4.GameActivity