==27351==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x000001e6a9af bp 0x7ffc24954470 sp 0x7ffc24954430 T0)
==27351==The signal is caused by a READ memory access.
==27351==Hint: address points to the zero page.
#0 0x1e6a9ae in model::copy() const ../src/model/model.cpp:77
#1 0x5a6750 in opt::context::set_model(ref<model>&) ../src/opt/opt_context.cpp:378
#2 0x5b2455 in opt::context::model_updated(model*) ../src/opt/opt_context.cpp:1093
#3 0x5a5aba in opt::context::optimize(ref_vector<expr, ast_manager> const&) ../src/opt/opt_context.cpp:307
#4 0x1d3e119 in cmd_context::check_sat(unsigned int, expr* const*) ../src/cmd_context/cmd_context.cpp:1557
#5 0x1cbc49f in smt2::parser::parse_check_sat() ../src/parsers/smt2/smt2parser.cpp:2596
#6 0x1cc08f8 in smt2::parser::parse_cmd() ../src/parsers/smt2/smt2parser.cpp:2938
#7 0x1cc2105 in smt2::parser::operator()() ../src/parsers/smt2/smt2parser.cpp:3130
#8 0x1c9c08c in parse_smt2_commands(cmd_context&, std::istream&, bool, params_ref const&, char const*) ../src/parsers/smt2/smt2parser.cpp:3179
#9 0x46f791 in read_smtlib2_commands(char const*) ../src/shell/smtlib_frontend.cpp:89
#10 0x459a9c in main ../src/shell/main.cpp:352
#11 0x7f4412fea82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
Hi, For the following formula
asan detects a SEGV in z3 Commit: 65b2037