Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SEGV HISTORY #2

Closed
tcollard opened this issue Mar 23, 2019 · 1 comment
Closed

SEGV HISTORY #2

tcollard opened this issue Mar 23, 2019 · 1 comment
Assignees

Comments

@tcollard
Copy link
Owner

Quand tu lances 42sh et qu'il n'y a eu aucune commande.
Si on appuie sur la fleche du bas il y a un segv.

Voila la trace de fsanitize si ca peut aider:

prompt> AddressSanitizer:DEADLYSIGNAL

==68400==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000100fa23a8 bp 0x7ffeeec71660 sp 0x7ffeeec71640 T0)
==68400==The signal is caused by a WRITE memory access.
==68400==Hint: address points to the zero page.
#0 0x100fa23a7 in fill_input_buffer (debug:x86_64+0x1000143a7)
#1 0x100fa227c in load_entry_in_cmdline (debug:x86_64+0x10001427c)
#2 0x100fa232c in handle_history_next (debug:x86_64+0x10001432c)
#3 0x100fa0c6e in handle_sequence (debug:x86_64+0x100012c6e)
#4 0x100fa026a in process_input (debug:x86_64+0x10001226a)
#5 0x100fa020c in read_input (debug:x86_64+0x10001220c)
#6 0x100f9f69d in read_full_input (debug:x86_64+0x10001169d)
#7 0x100f9f5b6 in read_cmdline (debug:x86_64+0x1000115b6)
#8 0x100f9365e in main (debug:x86_64+0x10000565e)
#9 0x7fff60f37ed8 in start (libdyld.dylib:x86_64+0x16ed8)

tcollard pushed a commit that referenced this issue Mar 23, 2019
@gguichard gguichard self-assigned this Mar 23, 2019
@gguichard
Copy link
Collaborator

Merci, je viens de push un fix temporaire le temps que je termine l'implementation de l'historique

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants