2018-05-04 13:58:24 +00:00
|
|
|
/*
|
|
|
|
This file is part of solidity.
|
|
|
|
|
|
|
|
solidity is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
solidity is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with solidity. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
2020-07-17 14:54:12 +00:00
|
|
|
// SPDX-License-Identifier: GPL-3.0
|
2018-05-04 13:58:24 +00:00
|
|
|
|
|
|
|
#include <libsolidity/analysis/ControlFlowAnalyzer.h>
|
2018-12-17 11:30:08 +00:00
|
|
|
|
2018-11-14 16:11:55 +00:00
|
|
|
#include <liblangutil/SourceLocation.h>
|
2020-01-06 10:52:23 +00:00
|
|
|
#include <libsolutil/Algorithms.h>
|
2021-08-24 17:08:18 +00:00
|
|
|
|
|
|
|
#include <range/v3/algorithm/sort.hpp>
|
2018-05-04 13:58:24 +00:00
|
|
|
|
2020-10-28 19:32:46 +00:00
|
|
|
#include <functional>
|
|
|
|
|
2018-05-04 13:58:24 +00:00
|
|
|
using namespace std;
|
2020-10-28 19:32:46 +00:00
|
|
|
using namespace std::placeholders;
|
2019-12-11 16:31:36 +00:00
|
|
|
using namespace solidity::langutil;
|
|
|
|
using namespace solidity::frontend;
|
2018-05-04 13:58:24 +00:00
|
|
|
|
2020-10-28 19:32:46 +00:00
|
|
|
|
|
|
|
bool ControlFlowAnalyzer::run()
|
2018-05-04 13:58:24 +00:00
|
|
|
{
|
2020-10-28 19:32:46 +00:00
|
|
|
for (auto& [pair, flow]: m_cfg.allFunctionFlows())
|
|
|
|
analyze(*pair.function, pair.contract, *flow);
|
|
|
|
|
2021-06-30 12:48:45 +00:00
|
|
|
return !Error::containsErrors(m_errorReporter.errors());
|
2018-05-04 13:58:24 +00:00
|
|
|
}
|
|
|
|
|
2020-10-28 19:32:46 +00:00
|
|
|
void ControlFlowAnalyzer::analyze(FunctionDefinition const& _function, ContractDefinition const* _contract, FunctionFlow const& _flow)
|
2018-05-04 13:58:24 +00:00
|
|
|
{
|
2020-10-28 19:32:46 +00:00
|
|
|
if (!_function.isImplemented())
|
|
|
|
return;
|
|
|
|
|
|
|
|
optional<string> mostDerivedContractName;
|
|
|
|
|
|
|
|
// The name of the most derived contract only required if it differs from
|
|
|
|
// the functions contract
|
|
|
|
if (_contract && _contract != _function.annotation().contract)
|
|
|
|
mostDerivedContractName = _contract->name();
|
|
|
|
|
|
|
|
checkUninitializedAccess(
|
|
|
|
_flow.entry,
|
|
|
|
_flow.exit,
|
|
|
|
_function.body().statements().empty(),
|
|
|
|
mostDerivedContractName
|
|
|
|
);
|
|
|
|
checkUnreachable(_flow.entry, _flow.exit, _flow.revert, _flow.transactionReturn);
|
2018-05-04 13:58:24 +00:00
|
|
|
}
|
|
|
|
|
2020-10-28 19:32:46 +00:00
|
|
|
|
|
|
|
void ControlFlowAnalyzer::checkUninitializedAccess(CFGNode const* _entry, CFGNode const* _exit, bool _emptyBody, optional<string> _contractName)
|
2018-05-04 13:58:24 +00:00
|
|
|
{
|
2018-12-07 17:20:35 +00:00
|
|
|
struct NodeInfo
|
2018-05-04 13:58:24 +00:00
|
|
|
{
|
2018-12-07 17:20:35 +00:00
|
|
|
set<VariableDeclaration const*> unassignedVariablesAtEntry;
|
|
|
|
set<VariableDeclaration const*> unassignedVariablesAtExit;
|
|
|
|
set<VariableOccurrence const*> uninitializedVariableAccesses;
|
|
|
|
/// Propagate the information from another node to this node.
|
|
|
|
/// To be used to propagate information from a node to its exit nodes.
|
|
|
|
/// Returns true, if new variables were added and thus the current node has
|
|
|
|
/// to be traversed again.
|
|
|
|
bool propagateFrom(NodeInfo const& _entryNode)
|
2018-05-04 13:58:24 +00:00
|
|
|
{
|
2018-12-07 17:20:35 +00:00
|
|
|
size_t previousUnassignedVariablesAtEntry = unassignedVariablesAtEntry.size();
|
|
|
|
size_t previousUninitializedVariableAccessess = uninitializedVariableAccesses.size();
|
|
|
|
unassignedVariablesAtEntry += _entryNode.unassignedVariablesAtExit;
|
|
|
|
uninitializedVariableAccesses += _entryNode.uninitializedVariableAccesses;
|
|
|
|
return
|
|
|
|
unassignedVariablesAtEntry.size() > previousUnassignedVariablesAtEntry ||
|
|
|
|
uninitializedVariableAccesses.size() > previousUninitializedVariableAccessess
|
|
|
|
;
|
2018-05-04 13:58:24 +00:00
|
|
|
}
|
2018-12-07 17:20:35 +00:00
|
|
|
};
|
|
|
|
map<CFGNode const*, NodeInfo> nodeInfos;
|
|
|
|
set<CFGNode const*> nodesToTraverse;
|
|
|
|
nodesToTraverse.insert(_entry);
|
|
|
|
|
|
|
|
// Walk all paths starting from the nodes in ``nodesToTraverse`` until ``NodeInfo::propagateFrom``
|
|
|
|
// returns false for all exits, i.e. until all paths have been walked with maximal sets of unassigned
|
|
|
|
// variables and accesses.
|
2018-05-04 13:58:24 +00:00
|
|
|
while (!nodesToTraverse.empty())
|
|
|
|
{
|
2018-12-07 17:20:35 +00:00
|
|
|
CFGNode const* currentNode = *nodesToTraverse.begin();
|
|
|
|
nodesToTraverse.erase(nodesToTraverse.begin());
|
2018-05-04 13:58:24 +00:00
|
|
|
|
2018-12-07 17:20:35 +00:00
|
|
|
auto& nodeInfo = nodeInfos[currentNode];
|
|
|
|
auto unassignedVariables = nodeInfo.unassignedVariablesAtEntry;
|
|
|
|
for (auto const& variableOccurrence: currentNode->variableOccurrences)
|
2018-05-04 13:58:24 +00:00
|
|
|
{
|
2018-12-07 17:20:35 +00:00
|
|
|
switch (variableOccurrence.kind())
|
|
|
|
{
|
|
|
|
case VariableOccurrence::Kind::Assignment:
|
|
|
|
unassignedVariables.erase(&variableOccurrence.declaration());
|
|
|
|
break;
|
|
|
|
case VariableOccurrence::Kind::InlineAssembly:
|
|
|
|
// We consider all variables referenced in inline assembly as accessed.
|
|
|
|
// So far any reference is enough, but we might want to actually analyze
|
|
|
|
// the control flow in the assembly at some point.
|
|
|
|
case VariableOccurrence::Kind::Access:
|
|
|
|
case VariableOccurrence::Kind::Return:
|
|
|
|
if (unassignedVariables.count(&variableOccurrence.declaration()))
|
|
|
|
{
|
2020-10-08 10:47:47 +00:00
|
|
|
// Merely store the unassigned access. We do not generate an error right away, since this
|
|
|
|
// path might still always revert. It is only an error if this is propagated to the exit
|
|
|
|
// node of the function (i.e. there is a path with an uninitialized access).
|
|
|
|
nodeInfo.uninitializedVariableAccesses.insert(&variableOccurrence);
|
2018-12-07 17:20:35 +00:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case VariableOccurrence::Kind::Declaration:
|
|
|
|
unassignedVariables.insert(&variableOccurrence.declaration());
|
|
|
|
break;
|
|
|
|
}
|
2018-05-04 13:58:24 +00:00
|
|
|
}
|
2018-12-07 17:20:35 +00:00
|
|
|
nodeInfo.unassignedVariablesAtExit = std::move(unassignedVariables);
|
2018-05-04 13:58:24 +00:00
|
|
|
|
2018-12-07 17:20:35 +00:00
|
|
|
// Propagate changes to all exits and queue them for traversal, if needed.
|
|
|
|
for (auto const& exit: currentNode->exits)
|
2021-01-20 17:41:42 +00:00
|
|
|
if (
|
2022-03-07 04:25:35 +00:00
|
|
|
auto exists = util::valueOrNullptr(nodeInfos, exit);
|
2021-01-20 17:41:42 +00:00
|
|
|
nodeInfos[exit].propagateFrom(nodeInfo) || !exists
|
|
|
|
)
|
2018-12-07 17:20:35 +00:00
|
|
|
nodesToTraverse.insert(exit);
|
2018-05-04 13:58:24 +00:00
|
|
|
}
|
|
|
|
|
2018-12-07 17:20:35 +00:00
|
|
|
auto const& exitInfo = nodeInfos[_exit];
|
|
|
|
if (!exitInfo.uninitializedVariableAccesses.empty())
|
2018-05-04 13:58:24 +00:00
|
|
|
{
|
2018-12-07 17:20:35 +00:00
|
|
|
vector<VariableOccurrence const*> uninitializedAccessesOrdered(
|
|
|
|
exitInfo.uninitializedVariableAccesses.begin(),
|
|
|
|
exitInfo.uninitializedVariableAccesses.end()
|
2019-02-13 15:56:46 +00:00
|
|
|
);
|
2021-08-24 17:08:18 +00:00
|
|
|
ranges::sort(
|
2018-12-07 17:20:35 +00:00
|
|
|
uninitializedAccessesOrdered,
|
|
|
|
[](VariableOccurrence const* lhs, VariableOccurrence const* rhs) -> bool
|
|
|
|
{
|
|
|
|
return *lhs < *rhs;
|
2018-05-04 13:58:24 +00:00
|
|
|
}
|
|
|
|
);
|
2018-12-07 17:20:35 +00:00
|
|
|
|
|
|
|
for (auto const* variableOccurrence: uninitializedAccessesOrdered)
|
2018-05-04 13:58:24 +00:00
|
|
|
{
|
2021-04-06 14:31:58 +00:00
|
|
|
VariableDeclaration const& varDecl = variableOccurrence->declaration();
|
|
|
|
|
2018-05-04 13:58:24 +00:00
|
|
|
SecondarySourceLocation ssl;
|
2018-12-07 17:20:35 +00:00
|
|
|
if (variableOccurrence->occurrence())
|
2021-04-06 14:31:58 +00:00
|
|
|
ssl.append("The variable was declared here.", varDecl.location());
|
2018-05-04 13:58:24 +00:00
|
|
|
|
2021-04-06 14:31:58 +00:00
|
|
|
bool isStorage = varDecl.type()->dataStoredIn(DataLocation::Storage);
|
|
|
|
bool isCalldata = varDecl.type()->dataStoredIn(DataLocation::CallData);
|
2020-10-08 10:47:47 +00:00
|
|
|
if (isStorage || isCalldata)
|
|
|
|
m_errorReporter.typeError(
|
|
|
|
3464_error,
|
|
|
|
variableOccurrence->occurrence() ?
|
|
|
|
*variableOccurrence->occurrence() :
|
2021-04-06 14:31:58 +00:00
|
|
|
varDecl.location(),
|
2020-10-08 10:47:47 +00:00
|
|
|
ssl,
|
|
|
|
"This variable is of " +
|
|
|
|
string(isStorage ? "storage" : "calldata") +
|
|
|
|
" pointer type and can be " +
|
|
|
|
(variableOccurrence->kind() == VariableOccurrence::Kind::Return ? "returned" : "accessed") +
|
|
|
|
" without prior assignment, which would lead to undefined behaviour."
|
|
|
|
);
|
2021-04-06 14:31:58 +00:00
|
|
|
else if (!_emptyBody && varDecl.name().empty())
|
2020-10-28 19:32:46 +00:00
|
|
|
{
|
|
|
|
if (!m_unassignedReturnVarsAlreadyWarnedFor.emplace(&varDecl).second)
|
|
|
|
continue;
|
|
|
|
|
2020-10-08 10:47:47 +00:00
|
|
|
m_errorReporter.warning(
|
|
|
|
6321_error,
|
2021-04-06 14:31:58 +00:00
|
|
|
varDecl.location(),
|
2020-10-28 19:32:46 +00:00
|
|
|
"Unnamed return variable can remain unassigned" +
|
|
|
|
(
|
|
|
|
_contractName.has_value() ?
|
|
|
|
" when the function is called when \"" + _contractName.value() + "\" is the most derived contract." :
|
|
|
|
"."
|
|
|
|
) +
|
|
|
|
" Add an explicit return with value to all non-reverting code paths or name the variable."
|
2020-10-08 10:47:47 +00:00
|
|
|
);
|
2020-10-28 19:32:46 +00:00
|
|
|
}
|
2018-05-04 13:58:24 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-01-08 18:33:46 +00:00
|
|
|
|
2020-10-28 19:32:46 +00:00
|
|
|
void ControlFlowAnalyzer::checkUnreachable(CFGNode const* _entry, CFGNode const* _exit, CFGNode const* _revert, CFGNode const* _transactionReturn)
|
2019-01-08 18:33:46 +00:00
|
|
|
{
|
|
|
|
// collect all nodes reachable from the entry point
|
2019-12-11 16:31:36 +00:00
|
|
|
std::set<CFGNode const*> reachable = util::BreadthFirstSearch<CFGNode const*>{{_entry}}.run(
|
2019-08-13 14:24:32 +00:00
|
|
|
[](CFGNode const* _node, auto&& _addChild) {
|
|
|
|
for (CFGNode const* exit: _node->exits)
|
|
|
|
_addChild(exit);
|
2019-01-08 18:33:46 +00:00
|
|
|
}
|
|
|
|
).visited;
|
|
|
|
|
2020-03-05 09:47:01 +00:00
|
|
|
// traverse all paths backwards from exit, revert and transaction return
|
2019-01-08 18:33:46 +00:00
|
|
|
// and extract (valid) source locations of unreachable nodes into sorted set
|
|
|
|
std::set<SourceLocation> unreachable;
|
2020-03-05 09:47:01 +00:00
|
|
|
util::BreadthFirstSearch<CFGNode const*>{{_exit, _revert, _transactionReturn}}.run(
|
2019-08-13 14:24:32 +00:00
|
|
|
[&](CFGNode const* _node, auto&& _addChild) {
|
2020-02-03 07:04:21 +00:00
|
|
|
if (!reachable.count(_node) && _node->location.isValid())
|
2019-08-13 14:24:32 +00:00
|
|
|
unreachable.insert(_node->location);
|
|
|
|
for (CFGNode const* entry: _node->entries)
|
|
|
|
_addChild(entry);
|
2019-01-08 18:33:46 +00:00
|
|
|
}
|
|
|
|
);
|
|
|
|
|
|
|
|
for (auto it = unreachable.begin(); it != unreachable.end();)
|
|
|
|
{
|
|
|
|
SourceLocation location = *it++;
|
|
|
|
// Extend the location, as long as the next location overlaps (unreachable is sorted).
|
|
|
|
for (; it != unreachable.end() && it->start <= location.end; ++it)
|
|
|
|
location.end = std::max(location.end, it->end);
|
2020-10-28 19:32:46 +00:00
|
|
|
|
|
|
|
if (m_unreachableLocationsAlreadyWarnedFor.emplace(location).second)
|
|
|
|
m_errorReporter.warning(5740_error, location, "Unreachable code.");
|
2019-01-08 18:33:46 +00:00
|
|
|
}
|
|
|
|
}
|