You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
#include <stdlib.h>
void main()
{
char *p = (char *)10;
p -= 1;
p += 1;
p += -1; // spurious pointer overflow report
p -= -1; // spurious pointer overflow report
}
CBMC version: 7e27cb2
Operating system: Ubuntu 16.04
Exact command line resulting in the issue: cbmc --pointer-overflow-check test.c
What behaviour did you expect: verification successful
What happened instead: spurious pointer overflow check failures
At a bare minimum, we should report an overflow when performing pointer
arithmetic that would result in an overflow on the underlying integer
representation.
As future work, we may want to expand on those checks by reporting
overflows when exceeding object bounds, as discussed in diffblue#5426.
Fixes: diffblue#5284
At a bare minimum, we should report an overflow when performing pointer
arithmetic that would result in an overflow on the underlying integer
representation.
As future work, we may want to expand on those checks by reporting
overflows when exceeding object bounds, as discussed in diffblue#5426.
Fixes: diffblue#5284
CBMC version: 7e27cb2
Operating system: Ubuntu 16.04
Exact command line resulting in the issue:
cbmc --pointer-overflow-check test.c
What behaviour did you expect: verification successful
What happened instead: spurious pointer overflow check failures
Regression test PR: #5283
The text was updated successfully, but these errors were encountered: