/* This file is part of solidity. solidity is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. solidity is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with solidity. If not, see . */ // SPDX-License-Identifier: GPL-3.0 #include #ifdef HAVE_Z3 #include #endif #include #include #include #include #include #include #include using namespace std; using namespace solidity; using namespace solidity::util; using namespace solidity::langutil; using namespace solidity::smtutil; using namespace solidity::frontend; using namespace solidity::frontend::smt; CHC::CHC( EncodingContext& _context, ErrorReporter& _errorReporter, [[maybe_unused]] map const& _smtlib2Responses, [[maybe_unused]] ReadCallback::Callback const& _smtCallback, SMTSolverChoice _enabledSolvers ): SMTEncoder(_context), m_outerErrorReporter(_errorReporter), m_enabledSolvers(_enabledSolvers) { bool usesZ3 = _enabledSolvers.z3; #ifndef HAVE_Z3 usesZ3 = false; #endif if (!usesZ3) m_interface = make_unique(_smtlib2Responses, _smtCallback); } void CHC::analyze(SourceUnit const& _source) { solAssert(_source.annotation().experimentalFeatures.count(ExperimentalFeature::SMTChecker), ""); resetSourceAnalysis(); set sources; sources.insert(&_source); for (auto const& source: _source.referencedSourceUnits(true)) sources.insert(source); for (auto const* source: sources) defineInterfacesAndSummaries(*source); for (auto const* source: sources) source->accept(*this); checkVerificationTargets(); } vector CHC::unhandledQueries() const { if (auto smtlib2 = dynamic_cast(m_interface.get())) return smtlib2->unhandledQueries(); return {}; } bool CHC::visit(ContractDefinition const& _contract) { resetContractAnalysis(); initContract(_contract); m_stateVariables = SMTEncoder::stateVariablesIncludingInheritedAndPrivate(_contract); clearIndices(&_contract); solAssert(m_currentContract, ""); m_constructorSummaryPredicate = createSymbolicBlock( constructorSort(*m_currentContract), "summary_constructor_" + contractSuffix(_contract), &_contract ); auto stateExprs = currentStateVariables(); setCurrentBlock(*m_interfaces.at(m_currentContract), &stateExprs); SMTEncoder::visit(_contract); return false; } void CHC::endVisit(ContractDefinition const& _contract) { auto implicitConstructorPredicate = createSymbolicBlock( implicitConstructorSort(), "implicit_constructor_" + contractSuffix(_contract), &_contract ); auto implicitConstructor = (*implicitConstructorPredicate)({}); addRule(implicitConstructor, implicitConstructor.name); m_currentBlock = implicitConstructor; m_context.addAssertion(m_error.currentValue() == 0); if (auto constructor = _contract.constructor()) constructor->accept(*this); else inlineConstructorHierarchy(_contract); connectBlocks(m_currentBlock, summary(_contract)); clearIndices(m_currentContract, nullptr); vector symbArgs = currentFunctionVariables(*m_currentContract); setCurrentBlock(*m_constructorSummaryPredicate, &symbArgs); addAssertVerificationTarget(m_currentContract, m_currentBlock, smtutil::Expression(true), m_error.currentValue()); connectBlocks(m_currentBlock, interface(), m_error.currentValue() == 0); SMTEncoder::endVisit(_contract); } bool CHC::visit(FunctionDefinition const& _function) { if (!_function.isImplemented()) { addRule(summary(_function), "summary_function_" + to_string(_function.id())); return false; } // This is the case for base constructor inlining. if (m_currentFunction) { solAssert(m_currentFunction->isConstructor(), ""); solAssert(_function.isConstructor(), ""); solAssert(_function.scope() != m_currentContract, ""); SMTEncoder::visit(_function); return false; } solAssert(!m_currentFunction, "Function inlining should not happen in CHC."); m_currentFunction = &_function; initFunction(_function); auto functionEntryBlock = createBlock(m_currentFunction); auto bodyBlock = createBlock(&m_currentFunction->body()); auto functionPred = predicate(*functionEntryBlock, currentFunctionVariables()); auto bodyPred = predicate(*bodyBlock); if (_function.isConstructor()) connectBlocks(m_currentBlock, functionPred); else addRule(functionPred, functionPred.name); m_context.addAssertion(m_error.currentValue() == 0); for (auto const* var: m_stateVariables) m_context.addAssertion(m_context.variable(*var)->valueAtIndex(0) == currentValue(*var)); for (auto const& var: _function.parameters()) m_context.addAssertion(m_context.variable(*var)->valueAtIndex(0) == currentValue(*var)); connectBlocks(functionPred, bodyPred); setCurrentBlock(*bodyBlock); SMTEncoder::visit(*m_currentFunction); return false; } void CHC::endVisit(FunctionDefinition const& _function) { if (!_function.isImplemented()) return; solAssert(m_currentFunction && m_currentContract, ""); // This is the case for base constructor inlining. if (m_currentFunction != &_function) { solAssert(m_currentFunction && m_currentFunction->isConstructor(), ""); solAssert(_function.isConstructor(), ""); solAssert(_function.scope() != m_currentContract, ""); } else { // We create an extra exit block for constructors that simply // connects to the interface in case an explicit constructor // exists in the hierarchy. // It is not connected directly here, as normal functions are, // because of the case where there are only implicit constructors. // This is done in endVisit(ContractDefinition). if (_function.isConstructor()) { string suffix = m_currentContract->name() + "_" + to_string(m_currentContract->id()); solAssert(m_currentContract, ""); auto constructorExit = createSymbolicBlock( constructorSort(*m_currentContract), "constructor_exit_" + suffix, m_currentContract ); connectBlocks(m_currentBlock, predicate(*constructorExit, currentFunctionVariables(*m_currentContract))); clearIndices(m_currentContract, m_currentFunction); auto stateExprs = currentFunctionVariables(*m_currentContract); setCurrentBlock(*constructorExit, &stateExprs); } else { auto assertionError = m_error.currentValue(); auto sum = summary(_function); connectBlocks(m_currentBlock, sum); auto iface = interface(); auto stateExprs = initialStateVariables(); setCurrentBlock(*m_interfaces.at(m_currentContract), &stateExprs); if (_function.isPublic()) { addAssertVerificationTarget(&_function, m_currentBlock, sum, assertionError); connectBlocks(m_currentBlock, iface, sum && (assertionError == 0)); } } m_currentFunction = nullptr; } SMTEncoder::endVisit(_function); } bool CHC::visit(IfStatement const& _if) { solAssert(m_currentFunction, ""); bool unknownFunctionCallWasSeen = m_unknownFunctionCallSeen; m_unknownFunctionCallSeen = false; solAssert(m_currentFunction, ""); auto const& functionBody = m_currentFunction->body(); auto ifHeaderBlock = createBlock(&_if, "if_header_"); auto trueBlock = createBlock(&_if.trueStatement(), "if_true_"); auto falseBlock = _if.falseStatement() ? createBlock(_if.falseStatement(), "if_false_") : nullptr; auto afterIfBlock = createBlock(&functionBody); connectBlocks(m_currentBlock, predicate(*ifHeaderBlock)); setCurrentBlock(*ifHeaderBlock); _if.condition().accept(*this); auto condition = expr(_if.condition()); connectBlocks(m_currentBlock, predicate(*trueBlock), condition); if (_if.falseStatement()) connectBlocks(m_currentBlock, predicate(*falseBlock), !condition); else connectBlocks(m_currentBlock, predicate(*afterIfBlock), !condition); setCurrentBlock(*trueBlock); _if.trueStatement().accept(*this); connectBlocks(m_currentBlock, predicate(*afterIfBlock)); if (_if.falseStatement()) { setCurrentBlock(*falseBlock); _if.falseStatement()->accept(*this); connectBlocks(m_currentBlock, predicate(*afterIfBlock)); } setCurrentBlock(*afterIfBlock); if (m_unknownFunctionCallSeen) eraseKnowledge(); m_unknownFunctionCallSeen = unknownFunctionCallWasSeen; return false; } bool CHC::visit(WhileStatement const& _while) { bool unknownFunctionCallWasSeen = m_unknownFunctionCallSeen; m_unknownFunctionCallSeen = false; solAssert(m_currentFunction, ""); auto const& functionBody = m_currentFunction->body(); auto namePrefix = string(_while.isDoWhile() ? "do_" : "") + "while"; auto loopHeaderBlock = createBlock(&_while, namePrefix + "_header_"); auto loopBodyBlock = createBlock(&_while.body(), namePrefix + "_body_"); auto afterLoopBlock = createBlock(&functionBody); auto outerBreakDest = m_breakDest; auto outerContinueDest = m_continueDest; m_breakDest = afterLoopBlock; m_continueDest = loopHeaderBlock; if (_while.isDoWhile()) _while.body().accept(*this); connectBlocks(m_currentBlock, predicate(*loopHeaderBlock)); setCurrentBlock(*loopHeaderBlock); _while.condition().accept(*this); auto condition = expr(_while.condition()); connectBlocks(m_currentBlock, predicate(*loopBodyBlock), condition); connectBlocks(m_currentBlock, predicate(*afterLoopBlock), !condition); // Loop body visit. setCurrentBlock(*loopBodyBlock); _while.body().accept(*this); m_breakDest = outerBreakDest; m_continueDest = outerContinueDest; // Back edge. connectBlocks(m_currentBlock, predicate(*loopHeaderBlock)); setCurrentBlock(*afterLoopBlock); if (m_unknownFunctionCallSeen) eraseKnowledge(); m_unknownFunctionCallSeen = unknownFunctionCallWasSeen; return false; } bool CHC::visit(ForStatement const& _for) { bool unknownFunctionCallWasSeen = m_unknownFunctionCallSeen; m_unknownFunctionCallSeen = false; solAssert(m_currentFunction, ""); auto const& functionBody = m_currentFunction->body(); auto loopHeaderBlock = createBlock(&_for, "for_header_"); auto loopBodyBlock = createBlock(&_for.body(), "for_body_"); auto afterLoopBlock = createBlock(&functionBody); auto postLoop = _for.loopExpression(); auto postLoopBlock = postLoop ? createBlock(postLoop, "for_post_") : nullptr; auto outerBreakDest = m_breakDest; auto outerContinueDest = m_continueDest; m_breakDest = afterLoopBlock; m_continueDest = postLoop ? postLoopBlock : loopHeaderBlock; if (auto init = _for.initializationExpression()) init->accept(*this); connectBlocks(m_currentBlock, predicate(*loopHeaderBlock)); setCurrentBlock(*loopHeaderBlock); auto condition = smtutil::Expression(true); if (auto forCondition = _for.condition()) { forCondition->accept(*this); condition = expr(*forCondition); } connectBlocks(m_currentBlock, predicate(*loopBodyBlock), condition); connectBlocks(m_currentBlock, predicate(*afterLoopBlock), !condition); // Loop body visit. setCurrentBlock(*loopBodyBlock); _for.body().accept(*this); if (postLoop) { connectBlocks(m_currentBlock, predicate(*postLoopBlock)); setCurrentBlock(*postLoopBlock); postLoop->accept(*this); } m_breakDest = outerBreakDest; m_continueDest = outerContinueDest; // Back edge. connectBlocks(m_currentBlock, predicate(*loopHeaderBlock)); setCurrentBlock(*afterLoopBlock); if (m_unknownFunctionCallSeen) eraseKnowledge(); m_unknownFunctionCallSeen = unknownFunctionCallWasSeen; return false; } void CHC::endVisit(FunctionCall const& _funCall) { auto functionCallKind = *_funCall.annotation().kind; if (functionCallKind != FunctionCallKind::FunctionCall) { SMTEncoder::endVisit(_funCall); return; } FunctionType const& funType = dynamic_cast(*_funCall.expression().annotation().type); switch (funType.kind()) { case FunctionType::Kind::Assert: visitAssert(_funCall); SMTEncoder::endVisit(_funCall); break; case FunctionType::Kind::Internal: internalFunctionCall(_funCall); break; case FunctionType::Kind::External: case FunctionType::Kind::BareStaticCall: externalFunctionCall(_funCall); SMTEncoder::endVisit(_funCall); break; case FunctionType::Kind::DelegateCall: case FunctionType::Kind::BareCall: case FunctionType::Kind::BareCallCode: case FunctionType::Kind::BareDelegateCall: case FunctionType::Kind::Creation: SMTEncoder::endVisit(_funCall); unknownFunctionCall(_funCall); break; case FunctionType::Kind::KECCAK256: case FunctionType::Kind::ECRecover: case FunctionType::Kind::SHA256: case FunctionType::Kind::RIPEMD160: case FunctionType::Kind::BlockHash: case FunctionType::Kind::AddMod: case FunctionType::Kind::MulMod: [[fallthrough]]; default: SMTEncoder::endVisit(_funCall); break; } createReturnedExpressions(_funCall); } void CHC::endVisit(Break const& _break) { solAssert(m_breakDest, ""); connectBlocks(m_currentBlock, predicate(*m_breakDest)); auto breakGhost = createBlock(&_break, "break_ghost_"); m_currentBlock = predicate(*breakGhost); } void CHC::endVisit(Continue const& _continue) { solAssert(m_continueDest, ""); connectBlocks(m_currentBlock, predicate(*m_continueDest)); auto continueGhost = createBlock(&_continue, "continue_ghost_"); m_currentBlock = predicate(*continueGhost); } void CHC::visitAssert(FunctionCall const& _funCall) { auto const& args = _funCall.arguments(); solAssert(args.size() == 1, ""); solAssert(args.front()->annotation().type->category() == Type::Category::Bool, ""); solAssert(m_currentContract, ""); solAssert(m_currentFunction, ""); if (m_currentFunction->isConstructor()) m_functionAssertions[m_currentContract].insert(&_funCall); else m_functionAssertions[m_currentFunction].insert(&_funCall); auto previousError = m_error.currentValue(); m_error.increaseIndex(); connectBlocks( m_currentBlock, m_currentFunction->isConstructor() ? summary(*m_currentContract) : summary(*m_currentFunction), currentPathConditions() && !m_context.expression(*args.front())->currentValue() && ( m_error.currentValue() == newErrorId(_funCall) ) ); m_context.addAssertion(m_error.currentValue() == previousError); } void CHC::internalFunctionCall(FunctionCall const& _funCall) { solAssert(m_currentContract, ""); auto const* function = functionCallToDefinition(_funCall); if (function) { if (m_currentFunction && !m_currentFunction->isConstructor()) m_callGraph[m_currentFunction].insert(function); else m_callGraph[m_currentContract].insert(function); auto const* contract = function->annotation().contract; // Libraries can have constants as their "state" variables, // so we need to ensure they were constructed correctly. if (contract->isLibrary()) m_context.addAssertion(interface(*contract)); } auto previousError = m_error.currentValue(); m_context.addAssertion(predicate(_funCall)); connectBlocks( m_currentBlock, (m_currentFunction && !m_currentFunction->isConstructor()) ? summary(*m_currentFunction) : summary(*m_currentContract), (m_error.currentValue() > 0) ); m_context.addAssertion(m_error.currentValue() == 0); m_error.increaseIndex(); m_context.addAssertion(m_error.currentValue() == previousError); } void CHC::externalFunctionCall(FunctionCall const& _funCall) { solAssert(m_currentContract, ""); FunctionType const& funType = dynamic_cast(*_funCall.expression().annotation().type); auto kind = funType.kind(); solAssert(kind == FunctionType::Kind::External || kind == FunctionType::Kind::BareStaticCall, ""); auto const* function = functionCallToDefinition(_funCall); if (!function) return; for (auto var: function->returnParameters()) m_context.variable(*var)->increaseIndex(); auto preCallState = currentStateVariables(); bool usesStaticCall = kind == FunctionType::Kind::BareStaticCall || function->stateMutability() == StateMutability::Pure || function->stateMutability() == StateMutability::View; if (!usesStaticCall) for (auto const* var: m_stateVariables) m_context.variable(*var)->increaseIndex(); auto nondet = (*m_nondetInterfaces.at(m_currentContract))(preCallState + currentStateVariables()); m_context.addAssertion(nondet); m_context.addAssertion(m_error.currentValue() == 0); } void CHC::unknownFunctionCall(FunctionCall const&) { /// Function calls are not handled at the moment, /// so always erase knowledge. /// TODO remove when function calls get predicates/blocks. eraseKnowledge(); /// Used to erase outer scope knowledge in loops and ifs. /// TODO remove when function calls get predicates/blocks. m_unknownFunctionCallSeen = true; } void CHC::makeArrayPopVerificationTarget(FunctionCall const& _arrayPop) { FunctionType const& funType = dynamic_cast(*_arrayPop.expression().annotation().type); solAssert(funType.kind() == FunctionType::Kind::ArrayPop, ""); auto memberAccess = dynamic_cast(&_arrayPop.expression()); solAssert(memberAccess, ""); auto symbArray = dynamic_pointer_cast(m_context.expression(memberAccess->expression())); solAssert(symbArray, ""); auto previousError = m_error.currentValue(); m_error.increaseIndex(); addVerificationTarget(&_arrayPop, VerificationTarget::Type::PopEmptyArray, m_error.currentValue()); smtutil::Expression target = (symbArray->length() <= 0) && (m_error.currentValue() == newErrorId(_arrayPop)); m_context.addAssertion((m_error.currentValue() == previousError) || target); } pair CHC::arithmeticOperation( Token _op, smtutil::Expression const& _left, smtutil::Expression const& _right, TypePointer const& _commonType, frontend::Expression const& _expression ) { auto values = SMTEncoder::arithmeticOperation(_op, _left, _right, _commonType, _expression); IntegerType const* intType = nullptr; if (auto const* type = dynamic_cast(_commonType)) intType = type; else intType = TypeProvider::uint256(); // Mod does not need underflow/overflow checks. // Div only needs overflow check for signed types. if (_op == Token::Mod || (_op == Token::Div && !intType->isSigned())) return values; auto previousError = m_error.currentValue(); m_error.increaseIndex(); VerificationTarget::Type targetType; unsigned errorId = newErrorId(_expression); optional target; if (_op == Token::Div) { targetType = VerificationTarget::Type::Overflow; target = values.second > intType->maxValue() && m_error.currentValue() == errorId; } else if (intType->isSigned()) { unsigned secondErrorId = newErrorId(_expression); targetType = VerificationTarget::Type::UnderOverflow; target = (values.second < intType->minValue() && m_error.currentValue() == errorId) || (values.second > intType->maxValue() && m_error.currentValue() == secondErrorId); } else if (_op == Token::Sub) { targetType = VerificationTarget::Type::Underflow; target = values.second < intType->minValue() && m_error.currentValue() == errorId; } else if (_op == Token::Add || _op == Token::Mul) { targetType = VerificationTarget::Type::Overflow; target = values.second > intType->maxValue() && m_error.currentValue() == errorId; } else solAssert(false, ""); addVerificationTarget( &_expression, targetType, m_error.currentValue() ); m_context.addAssertion((m_error.currentValue() == previousError) || *target); return values; } void CHC::resetSourceAnalysis() { m_verificationTargets.clear(); m_safeTargets.clear(); m_unsafeTargets.clear(); m_functionAssertions.clear(); m_errorIds.clear(); m_callGraph.clear(); m_summaries.clear(); m_interfaces.clear(); m_nondetInterfaces.clear(); Predicate::reset(); m_blockCounter = 0; bool usesZ3 = false; #ifdef HAVE_Z3 usesZ3 = m_enabledSolvers.z3; if (usesZ3) { /// z3::fixedpoint does not have a reset mechanism, so we need to create another. m_interface.reset(new Z3CHCInterface()); auto z3Interface = dynamic_cast(m_interface.get()); solAssert(z3Interface, ""); m_context.setSolver(z3Interface->z3Interface()); } #endif if (!usesZ3) { auto smtlib2Interface = dynamic_cast(m_interface.get()); smtlib2Interface->reset(); solAssert(smtlib2Interface, ""); m_context.setSolver(smtlib2Interface->smtlib2Interface()); } m_context.clear(); m_context.setAssertionAccumulation(false); } void CHC::resetContractAnalysis() { m_stateVariables.clear(); m_unknownFunctionCallSeen = false; m_breakDest = nullptr; m_continueDest = nullptr; m_error.resetIndex(); } void CHC::eraseKnowledge() { resetStateVariables(); m_context.resetVariables([&](VariableDeclaration const& _variable) { return _variable.hasReferenceOrMappingType(); }); } void CHC::clearIndices(ContractDefinition const* _contract, FunctionDefinition const* _function) { SMTEncoder::clearIndices(_contract, _function); for (auto const* var: m_stateVariables) /// SSA index 0 is reserved for state variables at the beginning /// of the current transaction. m_context.variable(*var)->increaseIndex(); if (_function) { for (auto const& var: _function->parameters() + _function->returnParameters()) m_context.variable(*var)->increaseIndex(); for (auto const& var: _function->localVariables()) m_context.variable(*var)->increaseIndex(); } } void CHC::setCurrentBlock( Predicate const& _block, vector const* _arguments ) { if (m_context.solverStackHeigh() > 0) m_context.popSolver(); solAssert(m_currentContract, ""); clearIndices(m_currentContract, m_currentFunction); m_context.pushSolver(); if (_arguments) m_currentBlock = predicate(_block, *_arguments); else m_currentBlock = predicate(_block); } set CHC::transactionAssertions(ASTNode const* _txRoot) { set assertions; solidity::util::BreadthFirstSearch{{_txRoot}}.run([&](auto const* function, auto&& _addChild) { assertions.insert(m_functionAssertions[function].begin(), m_functionAssertions[function].end()); for (auto const* called: m_callGraph[function]) _addChild(called); }); return assertions; } SortPointer CHC::sort(FunctionDefinition const& _function) { return functionSort(_function, m_currentContract); } SortPointer CHC::sort(ASTNode const* _node) { if (auto funDef = dynamic_cast(_node)) return sort(*funDef); solAssert(m_currentFunction, ""); return functionBodySort(*m_currentFunction, m_currentContract); } Predicate const* CHC::createSymbolicBlock(SortPointer _sort, string const& _name, ASTNode const* _node) { auto const* block = Predicate::create(_sort, _name, m_context, _node); m_interface->registerRelation(block->functor()); return block; } void CHC::defineInterfacesAndSummaries(SourceUnit const& _source) { for (auto const& node: _source.nodes()) if (auto const* contract = dynamic_cast(node.get())) { string suffix = contract->name() + "_" + to_string(contract->id()); m_interfaces[contract] = createSymbolicBlock(interfaceSort(*contract), "interface_" + suffix); m_nondetInterfaces[contract] = createSymbolicBlock(nondetInterfaceSort(*contract), "nondet_interface_" + suffix); for (auto const* var: stateVariablesIncludingInheritedAndPrivate(*contract)) if (!m_context.knownVariable(*var)) createVariable(*var); /// Base nondeterministic interface that allows /// 0 steps to be taken, used as base for the inductive /// rule for each function. auto const& iface = *m_nondetInterfaces.at(contract); auto state0 = stateVariablesAtIndex(0, *contract); addRule(iface(state0 + state0), "base_nondet"); for (auto const* base: contract->annotation().linearizedBaseContracts) for (auto const* function: base->definedFunctions()) { for (auto var: function->parameters()) createVariable(*var); for (auto var: function->returnParameters()) createVariable(*var); for (auto const* var: function->localVariables()) createVariable(*var); m_summaries[contract].emplace(function, createSummaryBlock(*function, *contract)); if ( !function->isConstructor() && function->isPublic() && !base->isLibrary() && !base->isInterface() ) { auto state1 = stateVariablesAtIndex(1, *contract); auto state2 = stateVariablesAtIndex(2, *contract); auto nondetPre = iface(state0 + state1); auto nondetPost = iface(state0 + state2); vector args{m_error.currentValue()}; args += state1 + applyMap(function->parameters(), [this](auto _var) { return valueAtIndex(*_var, 0); }) + state2 + applyMap(function->parameters(), [this](auto _var) { return valueAtIndex(*_var, 1); }) + applyMap(function->returnParameters(), [this](auto _var) { return valueAtIndex(*_var, 1); }); connectBlocks(nondetPre, nondetPost, (*m_summaries.at(contract).at(function))(args)); } } } } smtutil::Expression CHC::interface() { auto paramExprs = applyMap( m_stateVariables, [this](auto _var) { return m_context.variable(*_var)->currentValue(); } ); return (*m_interfaces.at(m_currentContract))(paramExprs); } smtutil::Expression CHC::interface(ContractDefinition const& _contract) { return (*m_interfaces.at(&_contract))(stateVariablesAtIndex(0, _contract)); } smtutil::Expression CHC::error() { return (*m_errorPredicate)({}); } smtutil::Expression CHC::error(unsigned _idx) { return m_errorPredicate->functor(_idx)({}); } smtutil::Expression CHC::summary(ContractDefinition const& _contract) { if (auto const* constructor = _contract.constructor()) return (*m_constructorSummaryPredicate)( currentFunctionVariables(*constructor) ); return (*m_constructorSummaryPredicate)( vector{m_error.currentValue()} + currentStateVariables() ); } smtutil::Expression CHC::summary(FunctionDefinition const& _function, ContractDefinition const& _contract) { vector args{m_error.currentValue()}; auto contract = _function.annotation().contract; args += contract->isLibrary() ? stateVariablesAtIndex(0, *contract) : initialStateVariables(_contract); args += applyMap(_function.parameters(), [this](auto _var) { return valueAtIndex(*_var, 0); }); args += contract->isLibrary() ? stateVariablesAtIndex(1, *contract) : currentStateVariables(_contract); args += applyMap(_function.parameters(), [this](auto _var) { return currentValue(*_var); }); args += applyMap(_function.returnParameters(), [this](auto _var) { return currentValue(*_var); }); return (*m_summaries.at(&_contract).at(&_function))(args); } smtutil::Expression CHC::summary(FunctionDefinition const& _function) { solAssert(m_currentContract, ""); return summary(_function, *m_currentContract); } Predicate const* CHC::createBlock(ASTNode const* _node, string const& _prefix) { auto block = createSymbolicBlock( sort(_node), "block_" + uniquePrefix() + "_" + _prefix + predicateName(_node), _node ); solAssert(m_currentFunction, ""); return block; } Predicate const* CHC::createSummaryBlock(FunctionDefinition const& _function, ContractDefinition const& _contract) { auto block = createSymbolicBlock( functionSort(_function, &_contract), "summary_" + uniquePrefix() + "_" + predicateName(&_function, &_contract), &_function ); return block; } void CHC::createErrorBlock() { m_errorPredicate = createSymbolicBlock(arity0FunctionSort(), "error_target_" + to_string(m_context.newUniqueId())); m_interface->registerRelation(m_errorPredicate->functor()); } void CHC::connectBlocks(smtutil::Expression const& _from, smtutil::Expression const& _to, smtutil::Expression const& _constraints) { smtutil::Expression edge = smtutil::Expression::implies( _from && m_context.assertions() && _constraints, _to ); addRule(edge, _from.name + "_to_" + _to.name); } vector CHC::initialStateVariables() { return stateVariablesAtIndex(0); } vector CHC::initialStateVariables(ContractDefinition const& _contract) { return stateVariablesAtIndex(0, _contract); } vector CHC::stateVariablesAtIndex(unsigned _index) { solAssert(m_currentContract, ""); return stateVariablesAtIndex(_index, *m_currentContract); } vector CHC::stateVariablesAtIndex(unsigned _index, ContractDefinition const& _contract) { return applyMap( SMTEncoder::stateVariablesIncludingInheritedAndPrivate(_contract), [&](auto _var) { return valueAtIndex(*_var, _index); } ); } vector CHC::currentStateVariables() { solAssert(m_currentContract, ""); return currentStateVariables(*m_currentContract); } vector CHC::currentStateVariables(ContractDefinition const& _contract) { return applyMap(SMTEncoder::stateVariablesIncludingInheritedAndPrivate(_contract), [this](auto _var) { return currentValue(*_var); }); } vector CHC::currentFunctionVariables() { solAssert(m_currentFunction, ""); return currentFunctionVariables(*m_currentFunction); } vector CHC::currentFunctionVariables(FunctionDefinition const& _function) { vector initInputExprs; vector mutableInputExprs; for (auto const& var: _function.parameters()) { initInputExprs.push_back(m_context.variable(*var)->valueAtIndex(0)); mutableInputExprs.push_back(m_context.variable(*var)->currentValue()); } auto returnExprs = applyMap(_function.returnParameters(), [this](auto _var) { return currentValue(*_var); }); return vector{m_error.currentValue()} + initialStateVariables() + initInputExprs + currentStateVariables() + mutableInputExprs + returnExprs; } vector CHC::currentFunctionVariables(ContractDefinition const& _contract) { if (auto const* constructor = _contract.constructor()) return currentFunctionVariables(*constructor); return vector{m_error.currentValue()} + currentStateVariables(); } vector CHC::currentBlockVariables() { if (m_currentFunction) return currentFunctionVariables() + applyMap(m_currentFunction->localVariables(), [this](auto _var) { return currentValue(*_var); }); return currentFunctionVariables(); } string CHC::predicateName(ASTNode const* _node, ContractDefinition const* _contract) { string prefix; if (auto funDef = dynamic_cast(_node)) { prefix += TokenTraits::toString(funDef->kind()); if (!funDef->name().empty()) prefix += "_" + funDef->name() + "_"; } else if (m_currentFunction && !m_currentFunction->name().empty()) prefix += m_currentFunction->name(); auto contract = _contract ? _contract : m_currentContract; solAssert(contract, ""); return prefix + "_" + to_string(_node->id()) + "_" + to_string(contract->id()); } smtutil::Expression CHC::predicate(Predicate const& _block) { return _block(currentBlockVariables()); } smtutil::Expression CHC::predicate( Predicate const& _block, vector const& _arguments ) { return _block(_arguments); } smtutil::Expression CHC::predicate(FunctionCall const& _funCall) { auto const* function = functionCallToDefinition(_funCall); if (!function) return smtutil::Expression(true); m_error.increaseIndex(); vector args{m_error.currentValue()}; auto const* contract = function->annotation().contract; FunctionType const& funType = dynamic_cast(*_funCall.expression().annotation().type); bool otherContract = contract->isLibrary() || funType.kind() == FunctionType::Kind::External || funType.kind() == FunctionType::Kind::BareStaticCall; args += otherContract ? stateVariablesAtIndex(0, *contract) : currentStateVariables(); args += symbolicArguments(_funCall); if (!otherContract) for (auto const& var: m_stateVariables) m_context.variable(*var)->increaseIndex(); args += otherContract ? stateVariablesAtIndex(1, *contract) : currentStateVariables(); for (auto var: function->parameters() + function->returnParameters()) { if (m_context.knownVariable(*var)) m_context.variable(*var)->increaseIndex(); else createVariable(*var); args.push_back(currentValue(*var)); } if (otherContract) return (*m_summaries.at(contract).at(function))(args); solAssert(m_currentContract, ""); return (*m_summaries.at(m_currentContract).at(function))(args); } void CHC::addRule(smtutil::Expression const& _rule, string const& _ruleName) { m_interface->addRule(_rule, _ruleName); } pair CHC::query(smtutil::Expression const& _query, langutil::SourceLocation const& _location) { CheckResult result; CHCSolverInterface::CexGraph cex; tie(result, cex) = m_interface->query(_query); switch (result) { case CheckResult::SATISFIABLE: { #ifdef HAVE_Z3 // Even though the problem is SAT, Spacer's pre processing makes counterexamples incomplete. // We now disable those optimizations and check whether we can still solve the problem. auto* spacer = dynamic_cast(m_interface.get()); solAssert(spacer, ""); spacer->setSpacerOptions(false); CheckResult resultNoOpt; CHCSolverInterface::CexGraph cexNoOpt; tie(resultNoOpt, cexNoOpt) = m_interface->query(_query); if (resultNoOpt == CheckResult::SATISFIABLE) cex = move(cexNoOpt); spacer->setSpacerOptions(true); #endif break; } case CheckResult::UNSATISFIABLE: break; case CheckResult::UNKNOWN: break; case CheckResult::CONFLICTING: m_outerErrorReporter.warning(1988_error, _location, "At least two SMT solvers provided conflicting answers. Results might not be sound."); break; case CheckResult::ERROR: m_outerErrorReporter.warning(1218_error, _location, "Error trying to invoke SMT solver."); break; } return {result, cex}; } void CHC::addVerificationTarget( ASTNode const* _scope, VerificationTarget::Type _type, smtutil::Expression _from, smtutil::Expression _constraints, smtutil::Expression _errorId ) { solAssert(m_currentContract || m_currentFunction, ""); SourceUnit const* source = nullptr; if (m_currentContract) source = sourceUnitContaining(*m_currentContract); else source = sourceUnitContaining(*m_currentFunction); solAssert(source, ""); if (!source->annotation().experimentalFeatures.count(ExperimentalFeature::SMTChecker)) return; m_verificationTargets.emplace(_scope, CHCVerificationTarget{{_type, _from, _constraints}, _errorId}); } void CHC::addVerificationTarget(ASTNode const* _scope, VerificationTarget::Type _type, smtutil::Expression _errorId) { solAssert(m_currentContract, ""); if (!m_currentFunction || m_currentFunction->isConstructor()) addVerificationTarget(_scope, _type, summary(*m_currentContract), smtutil::Expression(true), _errorId); else { auto iface = (*m_interfaces.at(m_currentContract))(initialStateVariables()); auto sum = summary(*m_currentFunction); addVerificationTarget(_scope, _type, iface, sum, _errorId); } } void CHC::addAssertVerificationTarget(ASTNode const* _scope, smtutil::Expression _from, smtutil::Expression _constraints, smtutil::Expression _errorId) { addVerificationTarget(_scope, VerificationTarget::Type::Assert, _from, _constraints, _errorId); } void CHC::checkVerificationTargets() { for (auto const& [scope, target]: m_verificationTargets) { if (target.type == VerificationTarget::Type::Assert) checkAssertTarget(scope, target); else { string satMsg; string satMsgUnderflow; string satMsgOverflow; string unknownMsg; ErrorId errorReporterId; ErrorId underflowErrorId = 3944_error; ErrorId overflowErrorId = 4984_error; if (target.type == VerificationTarget::Type::PopEmptyArray) { solAssert(dynamic_cast(scope), ""); satMsg = "Empty array \"pop\" detected here."; unknownMsg = "Empty array \"pop\" might happen here."; errorReporterId = 2529_error; } else if ( target.type == VerificationTarget::Type::Underflow || target.type == VerificationTarget::Type::Overflow || target.type == VerificationTarget::Type::UnderOverflow ) { auto const* expr = dynamic_cast(scope); solAssert(expr, ""); auto const* intType = dynamic_cast(expr->annotation().type); if (!intType) intType = TypeProvider::uint256(); satMsgUnderflow = "Underflow (resulting value less than " + formatNumberReadable(intType->minValue()) + ") happens here."; satMsgOverflow = "Overflow (resulting value larger than " + formatNumberReadable(intType->maxValue()) + ") happens here."; if (target.type == VerificationTarget::Type::Underflow) { satMsg = satMsgUnderflow; errorReporterId = underflowErrorId; } else if (target.type == VerificationTarget::Type::Overflow) { satMsg = satMsgOverflow; errorReporterId = overflowErrorId; } } else solAssert(false, ""); auto it = m_errorIds.find(scope->id()); solAssert(it != m_errorIds.end(), ""); unsigned errorId = it->second; if (target.type != VerificationTarget::Type::UnderOverflow) checkAndReportTarget(scope, target, errorId, errorReporterId, satMsg, unknownMsg); else { auto specificTarget = target; specificTarget.type = VerificationTarget::Type::Underflow; checkAndReportTarget(scope, specificTarget, errorId, underflowErrorId, satMsgUnderflow, unknownMsg); ++it; solAssert(it != m_errorIds.end(), ""); specificTarget.type = VerificationTarget::Type::Overflow; checkAndReportTarget(scope, specificTarget, it->second, overflowErrorId, satMsgOverflow, unknownMsg); } } } } void CHC::checkAssertTarget(ASTNode const* _scope, CHCVerificationTarget const& _target) { solAssert(_target.type == VerificationTarget::Type::Assert, ""); auto assertions = transactionAssertions(_scope); for (auto const* assertion: assertions) { auto it = m_errorIds.find(assertion->id()); solAssert(it != m_errorIds.end(), ""); unsigned errorId = it->second; checkAndReportTarget(assertion, _target, errorId, 6328_error, "Assertion violation happens here."); } } void CHC::checkAndReportTarget( ASTNode const* _scope, CHCVerificationTarget const& _target, unsigned _errorId, ErrorId _errorReporterId, string _satMsg, string _unknownMsg ) { if (m_unsafeTargets.count(_scope) && m_unsafeTargets.at(_scope).count(_target.type)) return; createErrorBlock(); connectBlocks(_target.value, error(), _target.constraints && (_target.errorId == _errorId)); auto const& [result, model] = query(error(), _scope->location()); if (result == CheckResult::UNSATISFIABLE) m_safeTargets[_scope].insert(_target.type); else if (result == CheckResult::SATISFIABLE) { solAssert(!_satMsg.empty(), ""); m_unsafeTargets[_scope].insert(_target.type); auto cex = generateCounterexample(model, error().name); if (cex) m_outerErrorReporter.warning( _errorReporterId, _scope->location(), _satMsg, SecondarySourceLocation().append("\nCounterexample:\n" + *cex, SourceLocation{}) ); else m_outerErrorReporter.warning( _errorReporterId, _scope->location(), _satMsg ); } else if (!_unknownMsg.empty()) m_outerErrorReporter.warning( _errorReporterId, _scope->location(), _unknownMsg ); } /** The counterexample DAG has the following properties: 1) The root node represents the reachable error predicate. 2) The root node has 1 or 2 children: - One of them is the summary of the function that was called and led to that node. If this is the only child, this function must be the constructor. - If it has 2 children, the function is not the constructor and the other child is the interface node, that is, it represents the state of the contract before the function described above was called. 3) Interface nodes also have property 2. The following algorithm starts collecting function summaries at the root node and repeats for each interface node seen. Each function summary collected represents a transaction, and the final order is reversed. The first function summary seen contains the values for the state, input and output variables at the error point. */ optional CHC::generateCounterexample(CHCSolverInterface::CexGraph const& _graph, string const& _root) { optional rootId; for (auto const& [id, node]: _graph.nodes) if (node.first == _root) { rootId = id; break; } if (!rootId) return {}; vector path; string localState; unsigned node = *rootId; /// The first summary node seen in this loop represents the last transaction. bool lastTxSeen = false; while (_graph.edges.at(node).size() >= 1) { auto const& edges = _graph.edges.at(node); solAssert(edges.size() <= 2, ""); unsigned summaryId = edges.at(0); optional interfaceId; if (edges.size() == 2) { interfaceId = edges.at(1); if (!Predicate::predicate(_graph.nodes.at(summaryId).first)->isSummary()) swap(summaryId, *interfaceId); auto interfacePredicate = Predicate::predicate(_graph.nodes.at(*interfaceId).first); solAssert(interfacePredicate && interfacePredicate->isInterface(), ""); } /// The children are unordered, so we need to check which is the summary and /// which is the interface. Predicate const* summaryPredicate = Predicate::predicate(_graph.nodes.at(summaryId).first); solAssert(summaryPredicate && summaryPredicate->isSummary(), ""); /// At this point property 2 from the function description is verified for this node. auto summaryArgs = _graph.nodes.at(summaryId).second; FunctionDefinition const* calledFun = summaryPredicate->programFunction(); ContractDefinition const* calledContract = summaryPredicate->programContract(); solAssert((calledFun && !calledContract) || (!calledFun && calledContract), ""); auto stateVars = summaryPredicate->stateVariables(); solAssert(stateVars.has_value(), ""); auto stateValues = summaryPredicate->summaryStateValues(summaryArgs); solAssert(stateValues.size() == stateVars->size(), ""); /// This summary node is the end of a tx. /// If it is the first summary node seen in this loop, it is the summary /// of the public/external function that was called when the error was reached, /// but not necessarily the summary of the function that contains the error. if (!lastTxSeen) { lastTxSeen = true; /// Generate counterexample message local to the failed target. localState = formatVariableModel(*stateVars, stateValues, ", ") + "\n"; if (calledFun) { auto inValues = summaryPredicate->summaryPostInputValues(summaryArgs); auto const& inParams = calledFun->parameters(); localState += formatVariableModel(inParams, inValues, "\n") + "\n"; auto outValues = summaryPredicate->summaryPostOutputValues(summaryArgs); auto const& outParams = calledFun->returnParameters(); localState += formatVariableModel(outParams, outValues, "\n") + "\n"; } } else /// We report the state after every tx in the trace except for the last, which is reported /// first in the code above. path.emplace_back("State: " + formatVariableModel(*stateVars, stateValues, ", ")); string txCex = summaryPredicate->formatSummaryCall(summaryArgs); path.emplace_back(txCex); /// Recurse on the next interface node which represents the previous transaction /// or stop. if (interfaceId) { Predicate const* interfacePredicate = Predicate::predicate(_graph.nodes.at(*interfaceId).first); solAssert(interfacePredicate && interfacePredicate->isInterface(), ""); node = *interfaceId; } else break; } return localState + "\nTransaction trace:\n" + boost::algorithm::join(boost::adaptors::reverse(path), "\n"); } string CHC::cex2dot(CHCSolverInterface::CexGraph const& _cex) { string dot = "digraph {\n"; auto pred = [&](CHCSolverInterface::CexNode const& _node) { return "\"" + _node.first + "(" + boost::algorithm::join(_node.second, ", ") + ")\""; }; for (auto const& [u, vs]: _cex.edges) for (auto v: vs) dot += pred(_cex.nodes.at(v)) + " -> " + pred(_cex.nodes.at(u)) + "\n"; dot += "}"; return dot; } string CHC::uniquePrefix() { return to_string(m_blockCounter++); } string CHC::contractSuffix(ContractDefinition const& _contract) { return _contract.name() + "_" + to_string(_contract.id()); } unsigned CHC::newErrorId(frontend::Expression const& _expr) { unsigned errorId = m_context.newUniqueId(); // We need to make sure the error id is not zero, // because error id zero actually means no error in the CHC encoding. if (errorId == 0) errorId = m_context.newUniqueId(); m_errorIds.emplace(_expr.id(), errorId); return errorId; }