Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable default analysis flags for CBMC version 6.0+ #8093

Merged
merged 39 commits into from
Dec 13, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
39 commits
Select commit Hold shift + click to select a range
3cea665
Enable standard checks in CBMC
NlightNFotis Dec 5, 2023
457b953
Add --no-standard-checks to regression/cbmc runner scripts
NlightNFotis Dec 5, 2023
4435c12
Add --no-standard-checks to regression/cbmc-incr-smt2 runner scripts
NlightNFotis Dec 5, 2023
8b54e10
Add --no-standard-checks to regression/cbmc-shadow-memory runner scripts
NlightNFotis Dec 5, 2023
1d791d2
Add --no-standard-checks to regression/cbmc-with-incr runner scripts
NlightNFotis Dec 5, 2023
f277a9f
Add --no-standard-checks to regression/cbmc-primitives runner scripts
NlightNFotis Dec 5, 2023
161321f
Add --no-standard-checks to regression/cbmc-library runner scripts
NlightNFotis Dec 5, 2023
aaf2b8d
Add --no-standard-checks to regression/book-examples runner scripts
NlightNFotis Dec 5, 2023
d1cc469
Add --no-standard-checks to regression/cbmc-concurrency runner scripts
NlightNFotis Dec 5, 2023
cf4269d
Add --no-standard-checks to regression/cbmc-cover runner scripts
NlightNFotis Dec 5, 2023
622440c
Add --no-standard-checks to regression/cbmc-cpp runner scripts
NlightNFotis Dec 5, 2023
014a33c
Add --no-standard-checks to regression/cbmc-incr runner scripts
NlightNFotis Dec 5, 2023
2b6446e
Add --no-standard-checks to regression/cbmc-incr-oneloop test runner …
NlightNFotis Dec 5, 2023
f79b5bc
Add --no-standard-checks to regression/cbmc-sequentialization test ru…
NlightNFotis Dec 5, 2023
5f43f53
Fix issue with non-null-terminated string in shadow-memory regression…
NlightNFotis Dec 6, 2023
1f577e7
Add default options to goto-analyzer
NlightNFotis Dec 6, 2023
ce65686
Add --no-standard-checks to regression/goto-analyzer test runner scripts
NlightNFotis Dec 6, 2023
5f17296
Add --no-standard-checks to goto-analyzer-simplify runner scripts
NlightNFotis Dec 6, 2023
56e9783
Add --no-standard-checks to regression/goto-instrument test runner
NlightNFotis Dec 6, 2023
8d70395
Rework handling of `malloc-may-fail`.
NlightNFotis Dec 7, 2023
1d7d4cf
Add missing positive checks back into goto-instrument
NlightNFotis Dec 8, 2023
7e38518
Add --no-standard-checks to regression/goto-cc-cbmc test runner script
NlightNFotis Dec 8, 2023
81c73d0
Add --no-standard-checks to regression/acceleration test runner script
NlightNFotis Dec 8, 2023
bc9ae9b
Add --no-standard-checks to regresion/contracts-dfcc test runner script
NlightNFotis Dec 8, 2023
b90ea03
Add --no-standard-checks to regression/contracts test runner script
NlightNFotis Dec 8, 2023
7d65934
Add --no-standard-checks to regression/goto-synthesiser test runner s…
NlightNFotis Dec 8, 2023
0d19437
Add --no-standard-checks to regression/goto-harness test runner script
NlightNFotis Dec 8, 2023
1f81854
Add --no-standard-checks to ../regression/linking-goto-binaries test …
NlightNFotis Dec 8, 2023
bda5ed3
Add --no-standard-checks to regression/validate-trace-xml-schema pyth…
NlightNFotis Dec 8, 2023
13a6e0b
Add documentation for new options in goto_check_c.h
NlightNFotis Dec 8, 2023
a485f70
Add new flags to CBMC man page
NlightNFotis Dec 12, 2023
9b52a38
Set the default checks status for both defaults on and off
thomasspriggs Dec 12, 2023
1575958
Combine `NEGATIVE` and `POSITIVE` check macros
thomasspriggs Dec 12, 2023
a5a29ad
Use `get_bool_option` to get `unwinding-assertions` option
thomasspriggs Dec 12, 2023
64a7e54
When `--cover` is used switch off unwinding-assertions
thomasspriggs Dec 12, 2023
07ab70e
Add standard checks to goto-analyzer's man page
NlightNFotis Dec 13, 2023
7838ad8
Remove handling of `malloc-may-fail`.
NlightNFotis Dec 13, 2023
3ec5bfd
Don't expect goto-check negative checks for goto-diff manpage.
NlightNFotis Dec 13, 2023
9747f61
Add negative default checks to ignore list of goto-instrument as well
NlightNFotis Dec 13, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
77 changes: 77 additions & 0 deletions doc/man/cbmc.1
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,12 @@ cbmc \- Bounded Model Checker for C/C++ and Java programs

.B cbmc [--all-properties] \fIfile.c\fB ...

.B cbmc [--no-standard-checks] \fIfile.c\fB ...

.B cbmc [--no-standard-checks] [--pointer-check] \fIfile.c\fB ...

.B cbmc [--no-bounds-check] \fIfile.c\fB ...

.B goto-cc [-I \fIinclude-path\fB] [-c] \fIfile.c\fB [-o \fIoutfile.o\fB]

.B goto-instrument \fIinfile\fB \fIoutfile\fR
Expand Down Expand Up @@ -41,8 +47,79 @@ The usual flow is to (1) translate source into a GOTO binary using
goto-cc, then (2) perform instrumentation with goto-instrument, and
finally (3) perform the analysis with cbmc.
.SH OPTIONS
.SS "Standard Checks"
From version \fB6.0\fR onwards, \fBcbmc\fR, \fBgoto-analyzer\fR and some other tools
apply some checks to the program by default (called the "standard checks"), with the
aim to provide a better user experience for a non-expert user of the tool. These checks are:
.TP
\fB\-\-pointer\-check\fR
enable pointer checks
.TP
\fB\-\-bounds\-check\fR
enable array bounds checks
.TP
\fB\-\-undefined\-shift\-check\fR
check shift greater than bit\-width
.TP
\fB\-\-div\-by\-zero\-check\fR
enable division by zero checks
.TP
\fB\-\-pointer\-primitive\-check\fR
checks that all pointers in pointer primitives are valid or null
.TP
\fB\-\-signed\-overflow\-check\fR
enable signed arithmetic over\- and underflow checks
.TP
\fB\-\-malloc\-may\-fail\fR
allow malloc calls to return a null pointer
.TP
\fB\-\-malloc\-fail\-null\fR
set malloc failure mode to return null
.TP
\fB\-\-unwinding\-assertions\fR (\fBcbmc\fR\-only)
generate unwinding assertions (cannot be
used with \fB\-\-cover\fR)
.PP
These checks can all be deactivated at once by using the \fB\-\-no\-standard\-checks\fR flag
like in the header example, or individually, by prepending a \fBno\-\fR before the flag, like
so:
.TP
\fB\-\-no\-pointer\-check\fR
disable pointer checks
.TP
\fB\-\-no\-bounds\-check\fR
disable array bounds checks
.TP
\fB\-\-no\-undefined\-shift\-check\fR
do not perform check for shift greater than bit\-width
.TP
\fB\-\-no\-div\-by\-zero\-check\fR
disable division by zero checks
.TP
\fB\-\-no\-pointer\-primitive\-check\fR
do not check that all pointers in pointer primitives are valid or null
.TP
\fB\-\-no\-signed\-overflow\-check\fR
disable signed arithmetic over\- and underflow checks
.TP
\fB\-\-no\-malloc\-may\-fail\fR
do not allow malloc calls to fail by default
.TP
\fB\-\-no\-malloc\-fail\-null\fR
do not set malloc failure mode to return null pointer
.TP
\fB\-\-no\-unwinding\-assertions\fR (\fBcbmc\fR\-only)
do not generate unwinding assertions (cannot be
used with \fB\-\-cover\fR)
.PP
If an already set flag is re-set, like calling \fB\-\-pointer\-check\fR
when default checks are already on, the flag is simply ignored.
.SS "Analysis options:"
.TP
\fB\-\-no\-standard\-checks\fR
disable the standard (default) checks applied to a C/GOTO program
(see above for more information)
.TP
\fB\-\-show\-properties\fR
show the properties, but don't run analysis
.TP
Expand Down
77 changes: 77 additions & 0 deletions doc/man/goto-analyzer.1
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,12 @@ goto-analyzer \- Data-flow analysis for C programs and goto binaries

.B goto\-analyzer [options] file.c|file.gb

.B goto\-analyzer [--no-standard-checks] \fIfile.c\fB ...

.B goto\-analyzer [--no-standard-checks] [--pointer-check] \fIfile.c\fB ...

.B goto\-analyzer [--no-bounds-check] \fIfile.c\fB ...

.SH DESCRIPTION
.B goto-analyzer
is an abstract interpreter which uses the same
Expand Down Expand Up @@ -494,6 +500,10 @@ list loaded goto functions
show the properties, but don't run analysis
.SS "Program instrumentation options:"
.TP
\fB\-\-no\-standard\-checks\fR
disable the standard (default) checks applied to a C/GOTO program
(see below for more information)
.TP
\fB\-\-property\fR id
enable selected properties only
.TP
Expand Down Expand Up @@ -569,6 +579,73 @@ set malloc failure mode to return null
.TP
\fB\-\-string\-abstraction\fR
track C string lengths and zero\-termination
.SS "Standard Checks"
From version \fB6.0\fR onwards, \fBcbmc\fR, \fBgoto-analyzer\fR and some other tools
apply some checks to the program by default (called the "standard checks"), with the
aim to provide a better user experience for a non-expert user of the tool. These checks are:
.TP
\fB\-\-pointer\-check\fR
enable pointer checks
.TP
\fB\-\-bounds\-check\fR
enable array bounds checks
.TP
\fB\-\-undefined\-shift\-check\fR
check shift greater than bit\-width
.TP
\fB\-\-div\-by\-zero\-check\fR
enable division by zero checks
.TP
\fB\-\-pointer\-primitive\-check\fR
checks that all pointers in pointer primitives are valid or null
.TP
\fB\-\-signed\-overflow\-check\fR
enable signed arithmetic over\- and underflow checks
.TP
\fB\-\-malloc\-may\-fail\fR
allow malloc calls to return a null pointer
.TP
\fB\-\-malloc\-fail\-null\fR
set malloc failure mode to return null
.TP
\fB\-\-unwinding\-assertions\fR (\fBcbmc\fR\-only)
generate unwinding assertions (cannot be
used with \fB\-\-cover\fR)
.PP
These checks can all be deactivated at once by using the \fB\-\-no\-standard\-checks\fR flag
like in the header example, or individually, by prepending a \fBno\-\fR before the flag, like
so:
.TP
\fB\-\-no\-pointer\-check\fR
disable pointer checks
.TP
\fB\-\-no\-bounds\-check\fR
disable array bounds checks
.TP
\fB\-\-no\-undefined\-shift\-check\fR
do not perform check for shift greater than bit\-width
.TP
\fB\-\-no\-div\-by\-zero\-check\fR
disable division by zero checks
.TP
\fB\-\-no\-pointer\-primitive\-check\fR
do not check that all pointers in pointer primitives are valid or null
.TP
\fB\-\-no\-signed\-overflow\-check\fR
disable signed arithmetic over\- and underflow checks
.TP
\fB\-\-no\-malloc\-may\-fail\fR
do not allow malloc calls to fail by default
.TP
\fB\-\-no\-malloc\-fail\-null\fR
do not set malloc failure mode to return null pointer
.TP
\fB\-\-no\-unwinding\-assertions\fR (\fBcbmc\fR\-only)
do not generate unwinding assertions (cannot be
used with \fB\-\-cover\fR)
.PP
If an already set flag is re-set, like calling \fB\-\-pointer\-check\fR
when default checks are already on, the flag is simply ignored.
.SS "Other options:"
.TP
\fB\-\-validate\-goto\-model\fR
Expand Down
2 changes: 1 addition & 1 deletion regression/acceleration/accelerate.sh
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ is_windows=$4
shift 4

cfile=""
cbmcargs=""
cbmcargs="--no-standard-checks"

# create the temporary directory relative to the current directory, thus
# avoiding file names that start with a "/", which confuses goto-cl (Windows)
Expand Down
8 changes: 4 additions & 4 deletions regression/book-examples/CMakeLists.txt
Original file line number Diff line number Diff line change
Expand Up @@ -13,27 +13,27 @@ else()
endif()

add_test_pl_tests(
"$<TARGET_FILE:cbmc> --validate-goto-model --validate-ssa-equation" -X smt-backend ${gcc_only} ${exclude_win_broken_tests}
"$<TARGET_FILE:cbmc> --no-standard-checks --validate-goto-model --validate-ssa-equation" -X smt-backend ${gcc_only} ${exclude_win_broken_tests}
)

add_test_pl_profile(
"book-examples-paths-lifo"
"$<TARGET_FILE:cbmc> --paths lifo"
"$<TARGET_FILE:cbmc> --no-standard-checks --paths lifo"
"-C;-X;thorough-paths;-X;smt-backend;-X;paths-lifo-expected-failure;${gcc_only_string}-s;paths-lifo;${exclude_win_broken_tests_string}"
"CORE"
)

add_test_pl_profile(
"book-examples-cprover-smt2"
"$<TARGET_FILE:cbmc> --cprover-smt2"
"$<TARGET_FILE:cbmc> --no-standard-checks --cprover-smt2"
"-C;-X;broken-smt-backend;-X;thorough-smt-backend;-X;broken-cprover-smt-backend;-X;thorough-cprover-smt-backend;${gcc_only_string}-s;cprover-smt2;${exclude_win_broken_tests_string}"
"CORE"
)

# If `-X` (exclude flag) is passed, test.pl will exclude the tests matching the label following it.
add_test_pl_profile(
"book-examples-new-smt-backend"
"$<TARGET_FILE:cbmc> --incremental-smt2-solver 'z3 --smt2 -in'"
"$<TARGET_FILE:cbmc> --no-standard-checks --incremental-smt2-solver 'z3 --smt2 -in'"
"${gcc_only_string}-X;no-new-smt;-s;new-smt-backend"
"CORE"
)
Expand Down
10 changes: 5 additions & 5 deletions regression/book-examples/Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -10,27 +10,27 @@ GCC_ONLY =
endif

test:
@../test.pl -e -p -c "../../../src/cbmc/cbmc --validate-goto-model --validate-ssa-equation" -X smt-backend $(GCC_ONLY)
@../test.pl -e -p -c "../../../src/cbmc/cbmc --no-standard-checks --validate-goto-model --validate-ssa-equation" -X smt-backend $(GCC_ONLY)

test-cprover-smt2:
@../test.pl -e -p -c "../../../src/cbmc/cbmc --cprover-smt2" \
@../test.pl -e -p -c "../../../src/cbmc/cbmc --no-standard-checks --cprover-smt2" \
-X broken-smt-backend -X thorough-smt-backend \
-X broken-cprover-smt-backend -X thorough-cprover-smt-backend \
-s cprover-smt2 $(GCC_ONLY)

test-z3:
@../test.pl -e -p -c "../../../src/cbmc/cbmc --z3" \
@../test.pl -e -p -c "../../../src/cbmc/cbmc --no-standard-checks --z3" \
-X broken-smt-backend -X thorough-smt-backend \
-X broken-z3-smt-backend -X thorough-z3-smt-backend \
-s z3 $(GCC_ONLY)

test-paths-lifo:
@../test.pl -e -p -c "../../../src/cbmc/cbmc --paths lifo" \
@../test.pl -e -p -c "../../../src/cbmc/cbmc --no-standard-checks --paths lifo" \
-X thorough-paths -X smt-backend -X paths-lifo-expected-failure \
-s paths-lifo $(GCC_ONLY)

test-new-smt-backend:
@../test.pl -e -p -c "../../../src/cbmc/cbmc --incremental-smt2-solver 'z3 --smt2 -in'" \
@../test.pl -e -p -c "../../../src/cbmc/cbmc --no-standard-checks --incremental-smt2-solver 'z3 --smt2 -in'" \
-X no-new-smt \
-s new-smt-backend $(GCC_ONLY)

Expand Down
4 changes: 2 additions & 2 deletions regression/cbmc-concurrency/CMakeLists.txt
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
if((NOT WIN32) AND (NOT APPLE))
add_test_pl_tests(
"$<TARGET_FILE:cbmc> --validate-goto-model --validate-ssa-equation"
"$<TARGET_FILE:cbmc> --no-standard-checks --validate-goto-model --validate-ssa-equation"
)
else()
add_test_pl_profile(
"cbmc-concurrency"
"$<TARGET_FILE:cbmc> --validate-goto-model --validate-ssa-equation"
"$<TARGET_FILE:cbmc> --no-standard-checks --validate-goto-model --validate-ssa-equation"
"-C;-X;pthread"
"CORE"
)
Expand Down
4 changes: 2 additions & 2 deletions regression/cbmc-concurrency/Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -10,10 +10,10 @@ ifeq ($(filter-out OSX MSVC,$(BUILD_ENV_)),)
endif

test:
@../test.pl -e -p -c "../../../src/cbmc/cbmc --validate-goto-model --validate-ssa-equation" $(no_pthread)
@../test.pl -e -p -c "../../../src/cbmc/cbmc --no-standard-checks --validate-goto-model --validate-ssa-equation" $(no_pthread)

tests.log: ../test.pl
@../test.pl -e -p -c "../../../src/cbmc/cbmc --validate-goto-model --validate-ssa-equation" $(no_pthread)
@../test.pl -e -p -c "../../../src/cbmc/cbmc --no-standard-checks --validate-goto-model --validate-ssa-equation" $(no_pthread)

clean:
find . -name '*.out' -execdir $(RM) '{}' \;
Expand Down
2 changes: 1 addition & 1 deletion regression/cbmc-cover/CMakeLists.txt
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
add_test_pl_tests(
"$<TARGET_FILE:cbmc>"
"$<TARGET_FILE:cbmc> --no-standard-checks"
)
4 changes: 2 additions & 2 deletions regression/cbmc-cover/Makefile
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
default: tests.log

test:
@../test.pl -e -p -c ../../../src/cbmc/cbmc
@../test.pl -e -p -c "../../../src/cbmc/cbmc --no-standard-checks"

tests.log: ../test.pl
@../test.pl -e -p -c ../../../src/cbmc/cbmc
@../test.pl -e -p -c "../../../src/cbmc/cbmc --no-standard-checks"

clean:
find . -name '*.out' -execdir $(RM) '{}' \;
Expand Down
2 changes: 1 addition & 1 deletion regression/cbmc-cpp/CMakeLists.txt
Original file line number Diff line number Diff line change
Expand Up @@ -5,5 +5,5 @@ else()
endif()

add_test_pl_tests(
"$<TARGET_FILE:cbmc> --validate-goto-model --validate-ssa-equation" ${gcc_only}
"$<TARGET_FILE:cbmc> --no-standard-checks --validate-goto-model --validate-ssa-equation" ${gcc_only}
)
4 changes: 2 additions & 2 deletions regression/cbmc-cpp/Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -8,10 +8,10 @@ ifeq ($(BUILD_ENV_),MSVC)
endif

test:
@../test.pl -e -p -c "../../../src/cbmc/cbmc --validate-goto-model --validate-ssa-equation" $(excluded_tests)
@../test.pl -e -p -c "../../../src/cbmc/cbmc --no-standard-checks --validate-goto-model --validate-ssa-equation" $(excluded_tests)

tests.log: ../test.pl
@../test.pl -e -p -c "../../../src/cbmc/cbmc --validate-goto-model --validate-ssa-equation" $(excluded_tests)
@../test.pl -e -p -c "../../../src/cbmc/cbmc --no-standard-checks --validate-goto-model --validate-ssa-equation" $(excluded_tests)

clean:
find . -name '*.out' -execdir $(RM) '{}' \;
Expand Down
2 changes: 1 addition & 1 deletion regression/cbmc-incr-oneloop/CMakeLists.txt
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
add_test_pl_tests(
"perl ../timeout.pl 8 $<TARGET_FILE:cbmc> --slice-formula"
"perl ../timeout.pl 8 $<TARGET_FILE:cbmc> --no-standard-checks --slice-formula"
)
4 changes: 2 additions & 2 deletions regression/cbmc-incr-oneloop/Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -2,10 +2,10 @@ default: tests.log

# Note the `perl -e` serves the purpose of providing timeout
test:
@../test.pl -c "perl -e 'alarm shift @ARGV; exec @ARGV' 15 ../../../src/cbmc/cbmc --slice-formula"
@../test.pl -c "perl -e 'alarm shift @ARGV; exec @ARGV' 15 ../../../src/cbmc/cbmc --no-standard-checks --slice-formula"

tests.log: ../test.pl
@../test.pl -c "perl -e 'alarm shift @ARGV; exec @ARGV' 15 ../../../src/cbmc/cbmc --slice-formula"
@../test.pl -c "perl -e 'alarm shift @ARGV; exec @ARGV' 15 ../../../src/cbmc/cbmc --no-standard-checks --slice-formula"

clean:
@$(RM) *.log
Expand Down
4 changes: 2 additions & 2 deletions regression/cbmc-incr-smt2/CMakeLists.txt
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
add_test_pl_profile(
"cbmc-incr-smt2-z3"
"$<TARGET_FILE:cbmc> --incremental-smt2-solver 'z3 --smt2 -in' --validate-goto-model --validate-ssa-equation"
"$<TARGET_FILE:cbmc> --no-standard-checks --incremental-smt2-solver 'z3 --smt2 -in' --validate-goto-model --validate-ssa-equation"
"-C;-s;new-smt-z3"
"CORE"
)

add_test_pl_profile(
"cbmc-incr-smt2-cvc5"
"$<TARGET_FILE:cbmc> --incremental-smt2-solver 'cvc5 --lang=smtlib2.6 --incremental' --validate-goto-model --validate-ssa-equation"
"$<TARGET_FILE:cbmc> --no-standard-checks --incremental-smt2-solver 'cvc5 --lang=smtlib2.6 --incremental' --validate-goto-model --validate-ssa-equation"
"-C;-s;new-smt-cvc5"
"CORE"
)
4 changes: 2 additions & 2 deletions regression/cbmc-incr-smt2/Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -6,10 +6,10 @@ include ../../src/common
test: test.z3 test.cvc5

test.z3:
@../test.pl -e -p -c "../../../src/cbmc/cbmc --incremental-smt2-solver 'z3 --smt2 -in' --validate-goto-model --validate-ssa-equation"
@../test.pl -e -p -c "../../../src/cbmc/cbmc --no-standard-checks --incremental-smt2-solver 'z3 --smt2 -in' --validate-goto-model --validate-ssa-equation"

test.cvc5:
@../test.pl -e -p -c "../../../src/cbmc/cbmc --incremental-smt2-solver 'cvc5 --lang=smtlib2.6 --incremental' --validate-goto-model --validate-ssa-equation"
@../test.pl -e -p -c "../../../src/cbmc/cbmc --no-standard-checks --incremental-smt2-solver 'cvc5 --lang=smtlib2.6 --incremental' --validate-goto-model --validate-ssa-equation"

tests.log: ../test.pl test

Expand Down
2 changes: 1 addition & 1 deletion regression/cbmc-incr/CMakeLists.txt
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
add_test_pl_tests(
"perl ../timeout.pl 30 $<TARGET_FILE:cbmc> --incremental --magic-numbers"
"perl ../timeout.pl 30 $<TARGET_FILE:cbmc> --no-standard-checks --incremental --magic-numbers"
)
2 changes: 1 addition & 1 deletion regression/cbmc-incr/Makefile
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
default: tests.log

PARAM = --incremental --magic-numbers
PARAM = --incremental --magic-numbers --no-standard-checks
# --refine --slice-formula

test:
Expand Down
Loading