You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
La commande "1>" provoque un segfault au niveau de l'analyse syntaxique (token_analyzer.c).
Voici la trace fsanitize depuis master :
AddressSanitizer:DEADLYSIGNAL
==82974==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000108496abe bp 0x7ffee77732f0 sp 0x7ffee7773140 T0)
==82974==The signal is caused by a READ memory access.
==82974==Hint: address points to the zero page.
#0 0x108496abd in token_analyser token_analyzer.c:60 #1 0x1084b900c in read_complete_command cmdline.c:98 #2 0x1084b872b in read_cmdline cmdline.c:114 #3 0x10848fd9c in main main.c:50 #4 0x7fff7d4573d4 in start (libdyld.dylib:x86_64+0x163d4)
Fix erreur sur un get_tk(list->next) quand il est nul, j'essayais d'envoyer le token qu'il contenait dans syntax_error().
J'envois directement l'element maintenant et je verifie si il est null ou non.
La commande "1>" provoque un segfault au niveau de l'analyse syntaxique (token_analyzer.c).
Voici la trace fsanitize depuis master :
The text was updated successfully, but these errors were encountered: