Record Case Detail

Notes

This function is in beta test. Please help improve it in the issues here.

Stderr

 pwd: /out/package
ppid: 2695
   1: WRITELN echo 123 > 1.txt
   2: WRITELN "echo" "<1.'txt'" < 1.txt > "2.""txt"
   3: WRITELN cat 1.txt
   4: WRITELN cat 2.txt
   5: WRITELN ls
   6: WRITELN exit
exit: 1

Hints

Your answer may be identical to the JOJ answer in the first several lines.

However, the main problem you meet now is Runtime Error. And the exit code of your program is 1, which should be 0.

Please double check your code to solve this problem and try again.

Your Answer

mumsh $ mumsh $ =================================================================
==2696==ERROR: AddressSanitizer: stack-buffer-underflow on address 0x7ffe7da0df3f at pc 0x00000051fe5f bp 0x7ffe7da0d4d0 sp 0x7ffe7da0d4c8
READ of size 1 at 0x7ffe7da0df3f thread T0
    #0 0x51fe5e  (/out/package/mumsh_memory_check+0x51fe5e)
    #1 0x525e9a  (/out/package/mumsh_memory_check+0x525e9a)
    #2 0x7f8948fd1b96  (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
    #3 0x41d2c9  (/out/package/mumsh_memory_check+0x41d2c9)

Address 0x7ffe7da0df3f is located in stack of thread T0 at offset 31 in frame
    #0 0x525bff  (/out/package/mumsh_memory_check+0x525bff)

  This frame has 1 object(s):
    [32, 1056) 'input' <== Memory access at offset 31 underflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext
      (longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-underflow (/out/package/mumsh_memory_check+0x51fe5e) 
Shadow bytes ar

JOJ Answer

mumsh $ mumsh $ mumsh $ 123
mumsh $ <1.'txt'
mumsh $ 1.txt
2.txt
driver
mumsh
mumsh_memory_check
mumsh $ exit