solidity/libsolidity/formal
Martin Blicha 12bca24774 [SMTChecker] Use path condition when creating CHC targets
Without path condition, verification targets created inside ternary
operator ignore the condition of the operator inside the branches.
This led to false positives.

Further updates:

- Function calls should consider the conditions under which they are
called, otherwise the analysis may report false positives.
The fix proposed here is to add the current path condition to the edge
that propagates error from a function call.

- Increment error index after function call

This is necessary for the analysis of the ternary operator to work
correctly. No information should leak from a function call inside a
ternary operator in the first branch to the second branch, including
whether or not an error would have occured in the first branch.

However, for the execution that continues after the function call,
we still need to ensure that under the current path condition
the error has not occurred in that function call.

It would be better to isolate the analysis of the branches to separate
clauses, but I do not see an easy way for that now. In this way, even
though the function call in first branch is included in the clause of
the second branch, no information leaks.

- Additonal test for ternary operator

This tests the behaviour of SMTChecker on ternary operator with function
calls inside both branches. Specifically, it tests that SMTChecker
successfully detects a violation of a verification target in the second
branch when the same target is present also in the first branch, but
there it cannot be triggered because of the operator's condition.
2023-04-21 18:56:34 +02:00
..
ArraySlicePredicate.cpp Add std:: qualifier to move() calls 2022-08-30 11:12:15 +02:00
ArraySlicePredicate.h Support array slices 2020-10-01 11:52:02 +02:00
BMC.cpp group unsupported warnings 2023-03-15 17:06:06 +01:00
BMC.h group unsupported warnings 2023-03-15 17:06:06 +01:00
CHC.cpp [SMTChecker] Use path condition when creating CHC targets 2023-04-21 18:56:34 +02:00
CHC.h group unsupported warnings 2023-03-15 17:06:06 +01:00
EncodingContext.cpp Add std:: qualifier to move() calls 2022-08-30 11:12:15 +02:00
EncodingContext.h Add std:: qualifier to move() calls 2022-08-30 11:12:15 +02:00
ExpressionFormatter.cpp Add ExpressionFormatter which translates an smtutil::Expression into a Solidity-like expression string 2021-10-26 11:30:30 +02:00
ExpressionFormatter.h Add ExpressionFormatter which translates an smtutil::Expression into a Solidity-like expression string 2021-10-26 11:30:30 +02:00
Invariants.cpp Add std:: qualifier to move() calls 2022-08-30 11:12:15 +02:00
Invariants.h Add Invariants which traverses the proof and collects invariants for the given predicates 2021-10-26 11:30:30 +02:00
ModelChecker.cpp group unsupported warnings 2023-03-15 17:06:06 +01:00
ModelChecker.h group unsupported warnings 2023-03-15 17:06:06 +01:00
ModelCheckerSettings.cpp [SMTChecker] Add a new trusted mode which assumes that code that is 2023-02-06 17:02:33 +01:00
ModelCheckerSettings.h group unsupported warnings 2023-03-15 17:06:06 +01:00
Predicate.cpp [SMTChecker] Add a new trusted mode which assumes that code that is 2023-02-06 17:02:33 +01:00
Predicate.h [SMTChecker] Add a new trusted mode which assumes that code that is 2023-02-06 17:02:33 +01:00
PredicateInstance.cpp [SMTChecker] Add a new trusted mode which assumes that code that is 2023-02-06 17:02:33 +01:00
PredicateInstance.h [SMTChecker] Add a new trusted mode which assumes that code that is 2023-02-06 17:02:33 +01:00
PredicateSort.cpp [SMTChecker] Detect errors caused by reentrancy 2020-12-28 14:32:53 +01:00
PredicateSort.h [SMTChecker] Detect errors caused by reentrancy 2020-12-28 14:32:53 +01:00
SMTEncoder.cpp group unsupported warnings 2023-03-15 17:06:06 +01:00
SMTEncoder.h group unsupported warnings 2023-03-15 17:06:06 +01:00
SSAVariable.cpp Add SPDX license identifier if not present already in source file 2020-07-17 20:24:12 +05:30
SSAVariable.h Add SPDX license identifier if not present already in source file 2020-07-17 20:24:12 +05:30
SymbolicState.cpp [SMTChecker] Add a new trusted mode which assumes that code that is 2023-02-06 17:02:33 +01:00
SymbolicState.h [SMTChecker] Add a new trusted mode which assumes that code that is 2023-02-06 17:02:33 +01:00
SymbolicTypes.cpp [SMTChecker] Add a new trusted mode which assumes that code that is 2023-02-06 17:02:33 +01:00
SymbolicTypes.h [SMTChecker] Add a new trusted mode which assumes that code that is 2023-02-06 17:02:33 +01:00
SymbolicVariables.cpp Add std:: qualifier to move() calls 2022-08-30 11:12:15 +02:00
SymbolicVariables.h Replace TypePointer with Type const* 2021-03-23 11:47:19 +01:00
VariableUsage.cpp [SMTChecker] Correctly resolve current scope contract in VariableUsage. 2021-03-15 13:55:14 +01:00
VariableUsage.h [SMTChecker] Correctly resolve current scope contract in VariableUsage. 2021-03-15 13:55:14 +01:00