-
Notifications
You must be signed in to change notification settings - Fork 5
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge remote-tracking branch 'Github/main' into clippy-wrappers
- Loading branch information
Showing
29 changed files
with
1,270 additions
and
4 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
[package] | ||
edition = "2021" | ||
name = "integer-overflow-or-underflow" | ||
version = "0.1.0" | ||
|
||
[lib] | ||
crate-type = ["cdylib"] | ||
|
||
[dependencies] | ||
clippy_utils = { workspace = true } | ||
dylint_linting = { workspace = true } | ||
if_chain = { workspace = true } | ||
utils = { workspace = true } | ||
|
||
[package.metadata.rust-analyzer] | ||
rustc_private = true |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,224 @@ | ||
#![feature(rustc_private)] | ||
|
||
extern crate rustc_hir; | ||
extern crate rustc_span; | ||
|
||
use clippy_utils::diagnostics::span_lint_and_help; | ||
use rustc_hir::{ | ||
intravisit::{walk_expr, FnKind, Visitor}, | ||
BinOpKind, Body, Expr, ExprKind, FnDecl, UnOp, | ||
}; | ||
use rustc_lint::{LateContext, LateLintPass}; | ||
use rustc_span::{def_id::LocalDefId, Span, Symbol}; | ||
use std::collections::HashSet; | ||
use utils::ConstantAnalyzer; | ||
|
||
pub const LINT_MESSAGE: &str = "Potential for integer arithmetic overflow/underflow. Consider checked, wrapping or saturating arithmetic."; | ||
|
||
dylint_linting::declare_late_lint! { | ||
pub INTEGER_OVERFLOW_UNDERFLOW, | ||
Warn, | ||
LINT_MESSAGE, | ||
{ | ||
name: "Integer Overflow/Underflow", | ||
long_message: "An overflow/underflow is typically caught and generates an error. When it is not caught, the operation will result in an inexact result which could lead to serious problems.", | ||
severity: "Critical", | ||
help: "https://coinfabrik.github.io/scout-soroban/docs/vulnerabilities/integer-overflow-or-underflow", | ||
vulnerability_class: "Arithmetic", | ||
} | ||
} | ||
enum Type { | ||
Overflow, | ||
Underflow, | ||
OverflowUnderflow, | ||
} | ||
|
||
impl Type { | ||
fn message(&self) -> &'static str { | ||
match self { | ||
Type::Overflow => "overflow", | ||
Type::Underflow => "underflow", | ||
Type::OverflowUnderflow => "overflow or underflow", | ||
} | ||
} | ||
} | ||
|
||
enum Cause { | ||
Add, | ||
Sub, | ||
Mul, | ||
Pow, | ||
Negate, | ||
Multiple, | ||
} | ||
|
||
impl Cause { | ||
fn message(&self) -> &'static str { | ||
match self { | ||
Cause::Add => "addition operation", | ||
Cause::Sub => "subtraction operation", | ||
Cause::Mul => "multiplication operation", | ||
Cause::Pow => "exponentiation operation", | ||
Cause::Negate => "negation operation", | ||
Cause::Multiple => "operation", | ||
} | ||
} | ||
} | ||
|
||
pub struct Finding { | ||
span: Span, | ||
type_: Type, | ||
cause: Cause, | ||
} | ||
|
||
impl Finding { | ||
fn new(span: Span, type_: Type, cause: Cause) -> Self { | ||
Finding { span, type_, cause } | ||
} | ||
|
||
fn generate_message(&self) -> String { | ||
format!( | ||
"This {} could {}.", | ||
self.cause.message(), | ||
self.type_.message() | ||
) | ||
} | ||
} | ||
pub struct IntegerOverflowUnderflowVisitor<'a, 'tcx> { | ||
cx: &'a LateContext<'tcx>, | ||
findings: Vec<Finding>, | ||
is_complex_operation: bool, | ||
constant_analyzer: ConstantAnalyzer<'a, 'tcx>, | ||
} | ||
|
||
impl<'tcx> IntegerOverflowUnderflowVisitor<'_, 'tcx> { | ||
pub fn check_pow(&mut self, expr: &Expr<'tcx>, base: &Expr<'tcx>, exponent: &Expr<'tcx>) { | ||
if self.constant_analyzer.is_constant(base) && self.constant_analyzer.is_constant(exponent) | ||
{ | ||
return; | ||
} | ||
|
||
let base_type = self.cx.typeck_results().expr_ty(base); | ||
if base_type.is_integral() { | ||
self.findings | ||
.push(Finding::new(expr.span, Type::Overflow, Cause::Pow)); | ||
} | ||
} | ||
|
||
pub fn check_negate(&mut self, expr: &Expr<'tcx>, operand: &Expr<'tcx>) { | ||
if self.constant_analyzer.is_constant(operand) { | ||
return; | ||
} | ||
|
||
let operand_type = self.cx.typeck_results().expr_ty(operand); | ||
if operand_type.is_integral() && operand_type.is_signed() { | ||
self.findings | ||
.push(Finding::new(expr.span, Type::Overflow, Cause::Negate)); | ||
} | ||
} | ||
|
||
pub fn check_binary( | ||
&mut self, | ||
expr: &Expr<'tcx>, | ||
op: BinOpKind, | ||
left: &Expr<'tcx>, | ||
right: &Expr<'tcx>, | ||
) { | ||
if self.constant_analyzer.is_constant(left) && self.constant_analyzer.is_constant(right) { | ||
return; | ||
} | ||
|
||
let (left_type, right_type) = ( | ||
self.cx.typeck_results().expr_ty(left).peel_refs(), | ||
self.cx.typeck_results().expr_ty(right).peel_refs(), | ||
); | ||
if !left_type.is_integral() || !right_type.is_integral() { | ||
return; | ||
} | ||
|
||
let (finding_type, cause) = if self.is_complex_operation { | ||
(Type::OverflowUnderflow, Cause::Multiple) | ||
} else { | ||
match op { | ||
BinOpKind::Add => (Type::Overflow, Cause::Add), | ||
BinOpKind::Sub => (Type::Underflow, Cause::Sub), | ||
BinOpKind::Mul => (Type::Overflow, Cause::Mul), | ||
_ => return, | ||
} | ||
}; | ||
|
||
self.findings | ||
.push(Finding::new(expr.span, finding_type, cause)); | ||
} | ||
} | ||
|
||
impl<'a, 'tcx> Visitor<'tcx> for IntegerOverflowUnderflowVisitor<'a, 'tcx> { | ||
fn visit_expr(&mut self, expr: &'tcx Expr<'tcx>) { | ||
match expr.kind { | ||
ExprKind::Binary(op, lhs, rhs) | ExprKind::AssignOp(op, lhs, rhs) => { | ||
self.is_complex_operation = matches!(lhs.kind, ExprKind::Binary(..)) | ||
|| matches!(rhs.kind, ExprKind::Binary(..)); | ||
self.check_binary(expr, op.node, lhs, rhs); | ||
if self.is_complex_operation { | ||
return; | ||
} | ||
} | ||
ExprKind::Unary(UnOp::Neg, arg) => { | ||
self.check_negate(expr, arg); | ||
} | ||
ExprKind::MethodCall(method_name, receiver, args, ..) => { | ||
if method_name.ident.name == Symbol::intern("pow") { | ||
self.check_pow(expr, receiver, &args[0]); | ||
} | ||
} | ||
_ => (), | ||
} | ||
|
||
walk_expr(self, expr); | ||
} | ||
} | ||
|
||
impl<'tcx> LateLintPass<'tcx> for IntegerOverflowUnderflow { | ||
fn check_fn( | ||
&mut self, | ||
cx: &LateContext<'tcx>, | ||
_: FnKind<'tcx>, | ||
_: &'tcx FnDecl<'tcx>, | ||
body: &'tcx Body<'tcx>, | ||
span: Span, | ||
_: LocalDefId, | ||
) { | ||
// If the function comes from a macro expansion, we ignore it | ||
if span.from_expansion() { | ||
return; | ||
} | ||
|
||
// Gather all compile-time variables in the function | ||
let mut constant_analyzer = ConstantAnalyzer { | ||
cx, | ||
constants: HashSet::new(), | ||
}; | ||
constant_analyzer.visit_body(body); | ||
|
||
// Analyze the function for integer overflow/underflow | ||
let mut visitor = IntegerOverflowUnderflowVisitor { | ||
cx, | ||
findings: Vec::new(), | ||
is_complex_operation: false, | ||
constant_analyzer, | ||
}; | ||
visitor.visit_body(body); | ||
|
||
// Report any findings | ||
for finding in visitor.findings { | ||
span_lint_and_help( | ||
cx, | ||
INTEGER_OVERFLOW_UNDERFLOW, | ||
finding.span, | ||
finding.generate_message(), | ||
None, | ||
"Consider using the checked version of this operation/s", | ||
) | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
[workspace] | ||
exclude = [".cargo", "target"] | ||
members = ["integer-overflow-or-underflow-*/*"] | ||
resolver = "2" | ||
|
||
[workspace.dependencies] | ||
soroban-sdk = { version = "=21.3.0" } | ||
|
||
[profile.release] | ||
codegen-units = 1 | ||
debug = 0 | ||
debug-assertions = false | ||
lto = true | ||
opt-level = "z" | ||
overflow-checks = true | ||
panic = "abort" | ||
strip = "symbols" | ||
|
||
[profile.release-with-logs] | ||
debug-assertions = true | ||
inherits = "release" |
16 changes: 16 additions & 0 deletions
16
...teger-overflow-or-underflow/integer-overflow-or-underflow-1/remediated-example/Cargo.toml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
[package] | ||
edition = "2021" | ||
name = "integer-overflow-or-underflow-remediated-1" | ||
version = "0.1.0" | ||
|
||
[lib] | ||
crate-type = ["cdylib"] | ||
|
||
[dependencies] | ||
soroban-sdk = { workspace = true } | ||
|
||
[dev-dependencies] | ||
soroban-sdk = { workspace = true, features = ["testutils"] } | ||
|
||
[features] | ||
testutils = ["soroban-sdk/testutils"] |
56 changes: 56 additions & 0 deletions
56
...teger-overflow-or-underflow/integer-overflow-or-underflow-1/remediated-example/src/lib.rs
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,56 @@ | ||
#![no_std] | ||
use soroban_sdk::{contract, contracterror, contractimpl, symbol_short, Env, Symbol}; | ||
|
||
#[contract] | ||
pub struct IntegerOverflowUnderflow; | ||
|
||
#[contracterror] | ||
#[derive(Copy, Clone, Debug, Eq, PartialEq, PartialOrd, Ord)] | ||
#[repr(u32)] | ||
pub enum Error { | ||
OverflowError = 1, | ||
} | ||
|
||
#[contractimpl] | ||
impl IntegerOverflowUnderflow { | ||
const VALUE: Symbol = symbol_short!("VALUE"); | ||
|
||
pub fn initialize(env: Env, value: u32) { | ||
env.storage().temporary().set(&Self::VALUE, &value); | ||
} | ||
|
||
pub fn add(env: Env, value: u32) -> Result<(), Error> { | ||
let current: u32 = env.storage().temporary().get(&Self::VALUE).unwrap_or(0); | ||
let new_value = match current.checked_add(value) { | ||
Some(value) => value, | ||
None => return Err(Error::OverflowError), | ||
}; | ||
env.storage().temporary().set(&Self::VALUE, &new_value); | ||
Ok(()) | ||
} | ||
|
||
pub fn get(env: Env) -> u32 { | ||
env.storage().temporary().get(&Self::VALUE).unwrap_or(0) | ||
} | ||
} | ||
|
||
#[cfg(test)] | ||
mod test { | ||
use super::*; | ||
use soroban_sdk::Env; | ||
|
||
#[test] | ||
fn test_add_overflow() { | ||
// Given | ||
let env = Env::default(); | ||
let contract_id = env.register_contract(None, IntegerOverflowUnderflow); | ||
let client = IntegerOverflowUnderflowClient::new(&env, &contract_id); | ||
|
||
// When | ||
client.initialize(&u32::MAX); | ||
let result = client.try_add(&1); | ||
|
||
// Then | ||
assert_eq!(result, Err(Ok(Error::OverflowError))); | ||
} | ||
} |
16 changes: 16 additions & 0 deletions
16
...teger-overflow-or-underflow/integer-overflow-or-underflow-1/vulnerable-example/Cargo.toml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
[package] | ||
edition = "2021" | ||
name = "integer-overflow-or-underflow-vulnerable-1" | ||
version = "0.1.0" | ||
|
||
[lib] | ||
crate-type = ["cdylib"] | ||
|
||
[dependencies] | ||
soroban-sdk = { workspace = true } | ||
|
||
[dev-dependencies] | ||
soroban-sdk = { workspace = true, features = ["testutils"] } | ||
|
||
[features] | ||
testutils = ["soroban-sdk/testutils"] |
Oops, something went wrong.