Crash on launch when use UE4 Android Address Sanitizer

The app get stuck in launch Interface, When I try to use Address Sanitizer in UE4.27 with the fps demo. Then, I try to modefied the wrap.sh as followed(Address Sanitizer  |  Android NDK  |  Android Developers).

#!/system/bin/sh
HERE="$(cd "$(dirname "$0")" && pwd)"
export ASAN_OPTIONS=log_to_syslog=false,allow_user_segv_handler=1
ASAN_LIB=$(ls $HERE/libclang_rt.asan-*-android.so)
if [ -f "$HERE/libc++_shared.so" ]; then
    # Workaround for https://github.com/android-ndk/ndk/issues/988.
    export LD_PRELOAD="$ASAN_LIB $HERE/libc++_shared.so"
else
    export LD_PRELOAD="$ASAN_LIB"
fi
"$@"

But, it result in crash, the log is as followed.

2021-10-25 14:31:39.300 12832-12880/? D/UE4: [2021.10.25-06.31.39:300][  0]LogConfig: Setting CVar [[r.HairStrands.Simulation:0]]
2021-10-25 14:31:39.300 12832-12880/? D/UE4: [2021.10.25-06.31.39:300][  0]LogConfig: Setting CVar [[r.HairStrands.Strands:0]]
2021-10-25 14:31:39.300 12832-12880/? D/UE4: [2021.10.25-06.31.39:300][  0]LogConfig: Setting CVar [[r.HairStrands.Binding:0]]
2021-10-25 14:31:39.308 12827-12827/? I/wrap.sh: =================================================================
2021-10-25 14:31:39.308 12827-12827/? I/wrap.sh: e[1me[31m==12832==ERROR: AddressSanitizer: stack-use-after-scope on address 0x0059b2188240 at pc 0x007a4934c530 bp 0x0059b2187ef0 sp 0x0059b2187698
2021-10-25 14:31:39.308 12827-12827/? I/wrap.sh: e[1me[0me[1me[34mREAD of size 48 at 0x0059b2188240 thread T24 (GameThread)e[1me[0m
2021-10-25 14:31:39.305 12832-12832/? W/GameThread: type=1400 audit(0.0:353): avc: denied { search } for name="thermal" dev="sysfs" ino=39305 scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sysfs_thermal:s0 tclass=dir permissive=0 app=com.YourCompany.ue4_26D
2021-10-25 14:31:39.339 12827-12827/? I/wrap.sh:     #0 0x7a4934c52c  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so+0x8452c)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh:     #1 0x593783843c  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x1a27743c)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh:     #2 0x5937837454  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x1a276454)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh:     #3 0x5932e2e048  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x1586d048)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh:     #4 0x5932e27d18  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15866d18)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh:     #5 0x5932e19e78  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15858e78)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh:     #6 0x5932e181dc  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x158571dc)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh:     #7 0x5932e22a20  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15861a20)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh:     #8 0x5932f24130  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15963130)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh:     #9 0x7a48351d4c  (/apex/com.android.runtime/lib64/bionic/libc.so+0xafd4c)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh:     #10 0x7a482f2288  (/apex/com.android.runtime/lib64/bionic/libc.so+0x50288)
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh: e[1me[32mAddress 0x0059b2188240 is located in stack of thread T24 (GameThread) at offset 832 in framee[1me[0m
2021-10-25 14:31:39.340 12827-12827/? I/wrap.sh: e[1me[0m    #0 0x5937837c3c  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x1a276c3c)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh:   This frame has 12 object(s):
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh:     [32, 48) 'ref.tmp' (line 171)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh:     [64, 68) 'Counter' (line 173)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh:     [80, 336) 'Buf' (line 176)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh:     [400, 401) 'UE_LOG_noinline_lambda' (line 189)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh:     [416, 424) 'ref.tmp14' (line 189)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh:     [448, 728) 'ref.tmp15' (line 189)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh:     [800, 816) 'SensorLocations' (line 198)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh:     [832, 984) 'ref.tmp25' (line 203)e[1me[32m <== Memory access at offset 832 is inside this variablee[1me[0m
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh:     [1056, 1057) 'UE_LOG_noinline_lambda36' (line 207)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh:     [1072, 1080) 'ref.tmp37' (line 207)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh:     [1104, 1384) 'ref.tmp38' (line 207)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh:     [1456, 1457) 'UE_LOG_noinline_lambda54' (line 213)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh: HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh:       (longjmp and C++ exceptions *are* supported)
2021-10-25 14:31:39.341 12827-12827/? I/wrap.sh: Thread T24 (GameThread) created by T0 (main) here:
2021-10-25 14:31:39.342 12827-12827/? I/wrap.sh:     #0 0x7a493595a0  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so+0x915a0)
2021-10-25 14:31:39.342 12827-12827/? I/wrap.sh:     #1 0x5932f23254  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15962254)
2021-10-25 14:31:39.342 12827-12827/? I/wrap.sh:     #2 0x5932f224c8  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x159614c8)
2021-10-25 14:31:39.342 12827-12827/? I/wrap.sh:     #3 0x7a4ad6ff24  (/system/lib64/libandroid_runtime.so+0xaff24)
2021-10-25 14:31:39.342 12827-12827/? I/wrap.sh:     #4 0x71f4b4a0  (/system/framework/arm64/boot-framework.oat+0x20f4a0)
2021-10-25 14:31:39.366 12827-12827/? I/wrap.sh:     #5 0x59c309a8d1  (/system/framework/framework.jar+0x6b08d1)
2021-10-25 14:31:39.389 12827-12827/? I/wrap.sh:     #6 0xba81585ea4108a90  (<unknown module>)
2021-10-25 14:31:39.389 12827-12827/? I/wrap.sh: SUMMARY: AddressSanitizer: stack-use-after-scope (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so+0x8452c) 
2021-10-25 14:31:39.389 12827-12827/? I/wrap.sh: Shadow bytes around the buggy address:
2021-10-25 14:31:39.389 12827-12827/? I/wrap.sh:   0x001b36430ff0: e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m
2021-10-25 14:31:39.389 12827-12827/? I/wrap.sh:   0x001b36431000: e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m
2021-10-25 14:31:39.389 12827-12827/? I/wrap.sh:   0x001b36431010: e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[35mf8e[1me[0m e[1me[31mf2e[1me[0m e[1me[35mf8e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   0x001b36431020: e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   0x001b36431030: e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: =>0x001b36431040: e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[0m00e[1me[0m e[1me[0m00e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m[e[1me[35mf8e[1me[0m]e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   0x001b36431050: e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   0x001b36431060: e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[35mf8e[1me[0m e[1me[31mf2e[1me[0m e[1me[35mf8e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   0x001b36431070: e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   0x001b36431080: e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[35mf8e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   0x001b36431090: e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[31mf2e[1me[0m e[1me[35mf8e[1me[0m e[1me[31mf3e[1me[0m e[1me[0m00e[1me[0m e[1me[0m00e[1me[0m e[1me[0m00e[1me[0m e[1me[0m00e[1me[0m e[1me[0m00e[1me[0m e[1me[0m00e[1me[0m e[1me[0m00e[1me[0m e[1me[0m00e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: Shadow byte legend (one shadow byte represents 8 application bytes):
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   Addressable:           e[1me[0m00e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   Partially addressable: e[1me[0m01e[1me[0m e[1me[0m02e[1me[0m e[1me[0m03e[1me[0m e[1me[0m04e[1me[0m e[1me[0m05e[1me[0m e[1me[0m06e[1me[0m e[1me[0m07e[1me[0m 
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   Heap left redzone:       e[1me[31mfae[1me[0m
    
    --------- beginning of crash
2021-10-25 14:31:39.390 12832-12880/? A/libc: Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 12880 (GameThread), pid 12832 (main)
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   Freed heap region:       e[1me[35mfde[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   Stack left redzone:      e[1me[31mf1e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   Stack mid redzone:       e[1me[31mf2e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   Stack right redzone:     e[1me[31mf3e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   Stack after return:      e[1me[35mf5e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   Stack use after scope:   e[1me[35mf8e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   Global redzone:          e[1me[31mf9e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   Global init order:       e[1me[36mf6e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   Poisoned by user:        e[1me[34mf7e[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   Container overflow:      e[1me[34mfce[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   Array cookie:            e[1me[31mace[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   Intra object redzone:    e[1me[33mbbe[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   ASan internal:           e[1me[33mfee[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   Left alloca redzone:     e[1me[34mcae[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   Right alloca redzone:    e[1me[34mcbe[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh:   Shadow gap:              e[1me[0mcce[1me[0m
2021-10-25 14:31:39.390 12827-12827/? I/wrap.sh: ==12832==ABORTING
2021-10-25 14:31:39.486 12930-12930/? I/crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdTombstone
2021-10-25 14:31:39.486 987-987/? I/tombstoned: received crash request for pid 12880
2021-10-25 14:31:39.487 12930-12930/? I/crash_dump64: performing dump of process 12832 (target tid = 12880)
2021-10-25 14:31:39.494 12930-12930/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2021-10-25 14:31:39.494 12930-12930/? A/DEBUG: Build fingerprint: 'google/blueline/blueline:11/RQ1A.210105.003/7005429:user/release-keys'
2021-10-25 14:31:39.494 12930-12930/? A/DEBUG: Revision: 'MP1.0'
2021-10-25 14:31:39.494 12930-12930/? A/DEBUG: ABI: 'arm64'
2021-10-25 14:31:39.496 12930-12930/? A/DEBUG: Timestamp: 2021-10-25 14:31:39+0800
2021-10-25 14:31:39.496 12930-12930/? A/DEBUG: pid: 12832, tid: 12880, name: GameThread  >>> com.YourCompany.ue4_26D <<<
2021-10-25 14:31:39.496 12930-12930/? A/DEBUG: uid: 10233
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG: signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr --------
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG: Abort message: '=================================================================
    ==12832==ERROR: AddressSanitizer: stack-use-after-scope on address 0x0059b2188240 at pc 0x007a4934c530 bp 0x0059b2187ef0 sp 0x0059b2187698
    READ of size 48 at 0x0059b2188240 thread T24 (GameThread)
        #0 0x7a4934c52c  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so+0x8452c)
        #1 0x593783843c  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x1a27743c)
        #2 0x5937837454  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x1a276454)
        #3 0x5932e2e048  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x1586d048)
        #4 0x5932e27d18  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15866d18)
        #5 0x5932e19e78  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15858e78)
        #6 0x5932e181dc  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x158571dc)
        #7 0x5932e22a20  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15861a20)
        #8 0x5932f24130  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15963130)
        #9 0x7a48351d4c  (/apex/com.android.runtime/lib64/bionic/libc.so+0xafd4c)
        #10 0x7a482f2288  (/apex/com.android.runtime/lib64/bionic/libc.so+0x50288)
    
    Address 0x0059b2188240 is located in stack of thread T24 (GameThread) at offset 832 in frame
        #0 0x5937837c3c  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x1a276c3c)
    
      This frame has 12 object(s):
        [32, 48) 'ref.tmp' (line 171)
        [64, 68) 'Counter' (line 173)
        [80, 336) 'Buf' (line 176)
        [400, 401) 'UE_LOG_noinline_lambda' (line 189)
        [416, 424) 'ref.tmp14' (line 189)
        [448, 728) 'ref.tmp15' (line 189)
        [800, 816) 'SensorLocations' (line 198)
        [832, 984) 'ref.tmp25' (line 203) <== Memory access at offset 832 is inside this variable
        [1056, 1057) 'UE_LOG_noinline_lambda36' (line 207)
        [1072, 1080) 'ref.tmp37' (line 207)
        [1104, 1384) 'ref.tmp38' (line 207)
        [1456, 1457) 'UE_LOG_noinline_lambda54' (line 213)
    HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
          (longjmp and C++ exceptions *are* supported)
    Thread T24 (GameThread) created by T0 (main) here:
        #0 0x7a493595a0  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so+0x915a0)
        #1 0x5932f23254  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x15962254)
        #2 0x5932f224c8  (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so+0x159614c8)
        #3 0x7a4ad6ff24  (/system/lib64/libandroid_runtime.so+0xaff24)
        #4 0x71f4b4a0  (/system/framework/arm64/boot-framework.oat+0x20f4a0)
        #5 0x59c309a8d1  (/system/framework/framework.jar+0x6b08d1)
        #6 0xba81585ea4108a90  (<unknown module>)
    
    SUMMARY: AddressSanitizer: stack-use-after-scope (/data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so+0x8452c) 
    Shadow bytes around the buggy address:
      0x001b36430ff0: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
      0x001b36431000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f2 f2 f2 f2 f2 f2
      0x001b36431010: f2 f2 f8 f2 f8 f2 f2 f2 f8 f8 f8 f8 f8 f8 f8 f8
      0x001b36431020: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
      0x001b36431030: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f2 f2 f2 f2 f2
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG: =>0x001b36431040: f2 f2 f2 f2 00 00 f2 f2[f8]f8 f8 f8 f8 f8 f8 f8
      0x001b36431050: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f2 f2 f2 f2 f2
      0x001b36431060: f2 f2 f2 f2 f8 f2 f8 f2 f2 f2 f8 f8 f8 f8 f8 f8
      0x001b36431070: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
      0x001b36431080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f2 f2 f2
      0x001b36431090: f2 f2 f2 f2 f2 f2 f8 f3 00 00 00 00 00 00 00 00
    Shadow byte legend (one shadow byte represents 8 application bytes):
      Addressable:           00
      Partially addressable: 01 02 03 04 05 06 07 
      Heap left redzone:       fa
      Freed heap region:       fd
      Stack left redzone:      f1
      Stack mid redzone:       f2
      Stack right redzone:     f3
      Stack after return:      f5
      Stack use after scope:   f8
      Global redzone:          f9
      Global init order:       f6
      Poisoned by user:        f7
      Container overflow:      fc
      Array cookie:            ac
      Intra object redzone:    bb
      ASan internal:           fe
      Left alloca redzone:     ca
      Right alloca redzone:    cb
      Shadow gap:              cc
    '
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG:     x0  0000000000000000  x1  0000000000003250  x2  0000000000000006  x3  00000059b2186920
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG:     x4  0000000000000000  x5  0000000000000000  x6  0000000000000000  x7  0000000000000000
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG:     x8  00000000000000f0  x9  ba81585ea4108a94  x10 0000000000000000  x11 ffffffc0fffffbdf
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG:     x12 0000000000000001  x13 0000000000000032  x14 0000000000000030  x15 0000007a49311d54
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG:     x16 0000007a4835ac80  x17 0000007a4833c870  x18 a8f49a4aea8aa897  x19 0000000000003220
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG:     x20 0000000000003250  x21 00000000ffffffff  x22 0000007a49450040  x23 0000007a494d9e00
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG:     x24 0000007a4934c530  x25 0000000000000000  x26 00000059b2188c80  x27 00000059b2188c90
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG:     x28 00000059b2188cb0  x29 00000059b21869a0
2021-10-25 14:31:39.497 12930-12930/? A/DEBUG:     lr  0000007a482f02a0  sp  00000059b2186900  pc  0000007a482f02cc  pst 0000000000000000
2021-10-25 14:31:39.599 1300-1300/? E/adbd: failed to connect to socket 'tcp:6666': Connection refused
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG: backtrace:
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG:       #00 pc 000000000004e2cc  /apex/com.android.runtime/lib64/bionic/libc.so (abort+164) (BuildId: 95f68a34fdf7b31f42d3f811d5d88f58)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG:       #01 pc 000000000004d60c  /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so (BuildId: 75277f22c1ad14a806c194000cb338ae311fd71c)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG:       #02 pc 000000000004c5d8  /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so (BuildId: 75277f22c1ad14a806c194000cb338ae311fd71c)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG:       #03 pc 00000000000a3300  /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so (BuildId: 75277f22c1ad14a806c194000cb338ae311fd71c)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG:       #04 pc 00000000000a47dc  /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so (BuildId: 75277f22c1ad14a806c194000cb338ae311fd71c)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG:       #05 pc 000000000008454c  /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libclang_rt.asan-aarch64-android.so (__interceptor_fopen+392) (BuildId: 75277f22c1ad14a806c194000cb338ae311fd71c)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG:       #06 pc 000000001a27743c  /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so (BuildId: 41e1eba38b8374fee5c357bcbbc150ded8208aaf)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG:       #07 pc 000000001a276454  /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so (FAndroidMisc::PlatformInit()+1176) (BuildId: 41e1eba38b8374fee5c357bcbbc150ded8208aaf)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG:       #08 pc 000000001586d048  /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so (FEngineLoop::PreInitPreStartupScreen(char16_t const*)+24328) (BuildId: 41e1eba38b8374fee5c357bcbbc150ded8208aaf)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG:       #09 pc 0000000015866d18  /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so (FEngineLoop::PreInit(char16_t const*)+36) (BuildId: 41e1eba38b8374fee5c357bcbbc150ded8208aaf)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG:       #10 pc 0000000015858e78  /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so (FEngineLoop::PreInit(int, char16_t**, char16_t const*)+336) (BuildId: 41e1eba38b8374fee5c357bcbbc150ded8208aaf)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG:       #11 pc 00000000158571dc  /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so (AndroidMain(android_app*)+2840) (BuildId: 41e1eba38b8374fee5c357bcbbc150ded8208aaf)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG:       #12 pc 0000000015861a20  /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so (android_main+540) (BuildId: 41e1eba38b8374fee5c357bcbbc150ded8208aaf)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG:       #13 pc 0000000015963130  /data/app/~~QCEtL-PoR0rap-7ovTaxqg==/com.YourCompany.ue4_26D-gU8dZ5izsl5P9OEzCu8aYw==/lib/arm64/libUE4.so (BuildId: 41e1eba38b8374fee5c357bcbbc150ded8208aaf)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG:       #14 pc 00000000000afd4c  /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+64) (BuildId: 95f68a34fdf7b31f42d3f811d5d88f58)
2021-10-25 14:31:39.698 12930-12930/? A/DEBUG:       #15 pc 0000000000050288  /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+64) (BuildId: 95f68a34fdf7b31f42d3f811d5d88f58)
2021-10-25 14:31:40.641 987-987/? E/tombstoned: Tombstone written to: /data/tombstones/tombstone_08
2021-10-25 14:31:38.125 1584-1955/? D/ConnectivityService: NetReassign [no changes]
2021-10-25 14:31:40.646 1584-12934/? I/DropBoxManagerService: add tag=data_app_native_crash isTagEnabled=true flags=0x2
2021-10-25 14:31:40.649 1584-1632/? I/BootReceiver: Copying /data/tombstones/tombstone_08 to DropBox (SYSTEM_TOMBSTONE)
2021-10-25 14:31:40.649 1584-1632/? I/DropBoxManagerService: add tag=SYSTEM_TOMBSTONE isTagEnabled=true flags=0x2
2021-10-25 14:31:40.651 1584-12933/? W/ActivityTaskManager:   Force finishing activity com.YourCompany.ue4_26D/com.epicgames.ue4.GameActivity
1 Like