Notes
This function is in beta test. Please help improve it in the issues
here.
Hints
Your answer may be identical to the JOJ answer in the first several lines.
However, you will still get Wrong Answer because the complete output may be longer and there might be errors in the future lines.
Please double check your code to solve this problem and try again.
Your Answer
mumsh $ mumsh $ mumsh $ mumsh $ ================================================================= ==15706==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc33708a5f at pc 0x000000518118 bp 0x7ffc33507e10 sp 0x7ffc33507e08 READ of size 1 at 0x7ffc33708a5f thread T0 #0 0x518117 (/out/package/mumsh_memory_check+0x518117) #1 0x5164dc (/out/package/mumsh_memory_check+0x5164dc) #2 0x7f07e8317b96 (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #3 0x41d4b9 (/out/package/mumsh_memory_check+0x41d4b9) Address 0x7ffc33708a5f is located in stack of thread T0 at offset 2097695 in frame #0 0x51588f (/out/package/mumsh_memory_check+0x51588f) This frame has 3 object(s): [32, 1048608) 'commands' [1048864, 2097440) 'commands_f' [2097696, 2098720) 'argv' <== Memory access at offset 2097695 underflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: Ad
JOJ Answer
mumsh $ mumsh $ mumsh $ mumsh $ mumsh $ 123 mumsh $ 222 mumsh $ 222 321 mumsh $ 321 mumsh $ 1.txt 2.txt 3.txt 4.txt driver mumsh mumsh_memory_check mumsh $ exit