Record Case Detail

Notes

This function is in beta test. Please help improve it in the issues here.

Stderr

 pwd: /out/package
ppid: 28688
   1: WRITELN echo 123 > 1.txt
   2: WRITELN echo 222 > 2.txt
   3: WRITELN echo 321 > 4.txt
   4: WRITELN cat < 1.txt 2.txt > 3.txt 4.txt
   5: WRITELN cat 1.txt
   6: WRITELN cat 2.txt
   7: WRITELN cat 3.txt
   8: WRITELN cat 4.txt
   9: WRITELN ls
  10: WRITELN exit

Hints

Your answer may be identical to the JOJ answer in the first several lines.

However, you will still get Wrong Answer because the complete output may be longer and there might be errors in the future lines.

Please double check your code to solve this problem and try again.

Your Answer

mumsh $ =================================================================
==28689==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffca8c0d400 at pc 0x000000516e24 bp 0x7ffca8c0d090 sp 0x7ffca8c0d088
WRITE of size 8 at 0x7ffca8c0d400 thread T0
    #0 0x516e23  (/out/package/mumsh_memory_check+0x516e23)
    #1 0x517d50  (/out/package/mumsh_memory_check+0x517d50)
    #2 0x5169f9  (/out/package/mumsh_memory_check+0x5169f9)
    #3 0x7efed7922b96  (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
    #4 0x41d639  (/out/package/mumsh_memory_check+0x41d639)

Address 0x7ffca8c0d400 is located in stack of thread T0 at offset 544 in frame
    #0 0x51693f  (/out/package/mumsh_memory_check+0x51693f)

  This frame has 1 object(s):
    [32, 544) 'parsedArgs' <== Memory access at offset 544 overflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext
      (longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow (/

JOJ Answer

mumsh $ mumsh $ mumsh $ mumsh $ mumsh $ 123
mumsh $ 222
mumsh $ 222
321
mumsh $ 321
mumsh $ 1.txt
2.txt
3.txt
4.txt
driver
mumsh
mumsh_memory_check
mumsh $ exit