188ad704bSReka Kovacs //=== InnerPointerChecker.cpp -------------------------------------*- C++ -*--//
288ad704bSReka Kovacs //
32946cd70SChandler Carruth // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
42946cd70SChandler Carruth // See https://llvm.org/LICENSE.txt for license information.
52946cd70SChandler Carruth // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
688ad704bSReka Kovacs //
788ad704bSReka Kovacs //===----------------------------------------------------------------------===//
888ad704bSReka Kovacs //
988ad704bSReka Kovacs // This file defines a check that marks a raw pointer to a C++ container's
1088ad704bSReka Kovacs // inner buffer released when the object is destroyed. This information can
1188ad704bSReka Kovacs // be used by MallocChecker to detect use-after-free problems.
1288ad704bSReka Kovacs //
1388ad704bSReka Kovacs //===----------------------------------------------------------------------===//
1488ad704bSReka Kovacs 
1588ad704bSReka Kovacs #include "AllocationState.h"
16d9f66ba3SReka Kovacs #include "InterCheckerAPI.h"
170b9d3a6eSBalazs Benics #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
1888ad704bSReka Kovacs #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
1988ad704bSReka Kovacs #include "clang/StaticAnalyzer/Core/BugReporter/CommonBugCategories.h"
2088ad704bSReka Kovacs #include "clang/StaticAnalyzer/Core/Checker.h"
210b9d3a6eSBalazs Benics #include "clang/StaticAnalyzer/Core/PathSensitive/CallDescription.h"
2288ad704bSReka Kovacs #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
2388ad704bSReka Kovacs #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
2488ad704bSReka Kovacs 
2588ad704bSReka Kovacs using namespace clang;
2688ad704bSReka Kovacs using namespace ento;
2788ad704bSReka Kovacs 
2888ad704bSReka Kovacs // Associate container objects with a set of raw pointer symbols.
298d5f101eSSimon Pilgrim REGISTER_SET_FACTORY_WITH_PROGRAMSTATE(PtrSet, SymbolRef)
3088ad704bSReka Kovacs REGISTER_MAP_WITH_PROGRAMSTATE(RawPtrMap, const MemRegion *, PtrSet)
3188ad704bSReka Kovacs 
3288ad704bSReka Kovacs 
3388ad704bSReka Kovacs namespace {
3488ad704bSReka Kovacs 
3588ad704bSReka Kovacs class InnerPointerChecker
3688ad704bSReka Kovacs     : public Checker<check::DeadSymbols, check::PostCall> {
3788ad704bSReka Kovacs 
38cf7cd664SAli Shuja Siddiqui   CallDescription AppendFn, AssignFn, AddressofFn, AddressofFn_, ClearFn,
39cf7cd664SAli Shuja Siddiqui       CStrFn, DataFn, DataMemberFn, EraseFn, InsertFn, PopBackFn, PushBackFn,
40cf7cd664SAli Shuja Siddiqui       ReplaceFn, ReserveFn, ResizeFn, ShrinkToFitFn, SwapFn;
4188ad704bSReka Kovacs 
4288ad704bSReka Kovacs public:
4388ad704bSReka Kovacs   class InnerPointerBRVisitor : public BugReporterVisitor {
4488ad704bSReka Kovacs     SymbolRef PtrToBuf;
4588ad704bSReka Kovacs 
4688ad704bSReka Kovacs   public:
InnerPointerBRVisitor(SymbolRef Sym)4788ad704bSReka Kovacs     InnerPointerBRVisitor(SymbolRef Sym) : PtrToBuf(Sym) {}
4888ad704bSReka Kovacs 
getTag()4988ad704bSReka Kovacs     static void *getTag() {
5088ad704bSReka Kovacs       static int Tag = 0;
5188ad704bSReka Kovacs       return &Tag;
5288ad704bSReka Kovacs     }
5388ad704bSReka Kovacs 
Profile(llvm::FoldingSetNodeID & ID) const5488ad704bSReka Kovacs     void Profile(llvm::FoldingSetNodeID &ID) const override {
5588ad704bSReka Kovacs       ID.AddPointer(getTag());
5688ad704bSReka Kovacs     }
5788ad704bSReka Kovacs 
58*3f3930a4SKazu Hirata     PathDiagnosticPieceRef VisitNode(const ExplodedNode *N,
59*3f3930a4SKazu Hirata                                      BugReporterContext &BRC,
602f169e7cSArtem Dergachev                                      PathSensitiveBugReport &BR) override;
6188ad704bSReka Kovacs 
6288ad704bSReka Kovacs     // FIXME: Scan the map once in the visitor's constructor and do a direct
6388ad704bSReka Kovacs     // lookup by region.
isSymbolTracked(ProgramStateRef State,SymbolRef Sym)6488ad704bSReka Kovacs     bool isSymbolTracked(ProgramStateRef State, SymbolRef Sym) {
6588ad704bSReka Kovacs       RawPtrMapTy Map = State->get<RawPtrMap>();
6670d592d6SMark de Wever       for (const auto &Entry : Map) {
6788ad704bSReka Kovacs         if (Entry.second.contains(Sym))
6888ad704bSReka Kovacs           return true;
6988ad704bSReka Kovacs       }
7088ad704bSReka Kovacs       return false;
7188ad704bSReka Kovacs     }
7288ad704bSReka Kovacs   };
7388ad704bSReka Kovacs 
InnerPointerChecker()7488ad704bSReka Kovacs   InnerPointerChecker()
752ca72e03SHenry Wong       : AppendFn({"std", "basic_string", "append"}),
762ca72e03SHenry Wong         AssignFn({"std", "basic_string", "assign"}),
77cf7cd664SAli Shuja Siddiqui         AddressofFn({"std", "addressof"}), AddressofFn_({"std", "__addressof"}),
782ca72e03SHenry Wong         ClearFn({"std", "basic_string", "clear"}),
79663ac91eSValeriy Savchenko         CStrFn({"std", "basic_string", "c_str"}), DataFn({"std", "data"}, 1),
80663ac91eSValeriy Savchenko         DataMemberFn({"std", "basic_string", "data"}),
812ca72e03SHenry Wong         EraseFn({"std", "basic_string", "erase"}),
822ca72e03SHenry Wong         InsertFn({"std", "basic_string", "insert"}),
832ca72e03SHenry Wong         PopBackFn({"std", "basic_string", "pop_back"}),
842ca72e03SHenry Wong         PushBackFn({"std", "basic_string", "push_back"}),
852ca72e03SHenry Wong         ReplaceFn({"std", "basic_string", "replace"}),
862ca72e03SHenry Wong         ReserveFn({"std", "basic_string", "reserve"}),
872ca72e03SHenry Wong         ResizeFn({"std", "basic_string", "resize"}),
882ca72e03SHenry Wong         ShrinkToFitFn({"std", "basic_string", "shrink_to_fit"}),
892ca72e03SHenry Wong         SwapFn({"std", "basic_string", "swap"}) {}
9088ad704bSReka Kovacs 
91c74cfc42SReka Kovacs   /// Check whether the called member function potentially invalidates
92c74cfc42SReka Kovacs   /// pointers referring to the container object's inner buffer.
93c74cfc42SReka Kovacs   bool isInvalidatingMemberFunction(const CallEvent &Call) const;
94c74cfc42SReka Kovacs 
95663ac91eSValeriy Savchenko   /// Check whether the called function returns a raw inner pointer.
96663ac91eSValeriy Savchenko   bool isInnerPointerAccessFunction(const CallEvent &Call) const;
97663ac91eSValeriy Savchenko 
98c74cfc42SReka Kovacs   /// Mark pointer symbols associated with the given memory region released
99c74cfc42SReka Kovacs   /// in the program state.
100c74cfc42SReka Kovacs   void markPtrSymbolsReleased(const CallEvent &Call, ProgramStateRef State,
101c74cfc42SReka Kovacs                               const MemRegion *ObjRegion,
102c74cfc42SReka Kovacs                               CheckerContext &C) const;
103c74cfc42SReka Kovacs 
104c74cfc42SReka Kovacs   /// Standard library functions that take a non-const `basic_string` argument by
105c74cfc42SReka Kovacs   /// reference may invalidate its inner pointers. Check for these cases and
106c74cfc42SReka Kovacs   /// mark the pointers released.
107c74cfc42SReka Kovacs   void checkFunctionArguments(const CallEvent &Call, ProgramStateRef State,
108c74cfc42SReka Kovacs                               CheckerContext &C) const;
109c74cfc42SReka Kovacs 
110c74cfc42SReka Kovacs   /// Record the connection between raw pointers referring to a container
111c74cfc42SReka Kovacs   /// object's inner buffer and the object's memory region in the program state.
112c74cfc42SReka Kovacs   /// Mark potentially invalidated pointers released.
11388ad704bSReka Kovacs   void checkPostCall(const CallEvent &Call, CheckerContext &C) const;
11488ad704bSReka Kovacs 
115c74cfc42SReka Kovacs   /// Clean up the program state map.
11688ad704bSReka Kovacs   void checkDeadSymbols(SymbolReaper &SymReaper, CheckerContext &C) const;
11788ad704bSReka Kovacs };
11888ad704bSReka Kovacs 
11988ad704bSReka Kovacs } // end anonymous namespace
12088ad704bSReka Kovacs 
isInvalidatingMemberFunction(const CallEvent & Call) const121c74cfc42SReka Kovacs bool InnerPointerChecker::isInvalidatingMemberFunction(
122c74cfc42SReka Kovacs         const CallEvent &Call) const {
12388ad704bSReka Kovacs   if (const auto *MemOpCall = dyn_cast<CXXMemberOperatorCall>(&Call)) {
12488ad704bSReka Kovacs     OverloadedOperatorKind Opc = MemOpCall->getOriginExpr()->getOperator();
12588ad704bSReka Kovacs     if (Opc == OO_Equal || Opc == OO_PlusEqual)
12688ad704bSReka Kovacs       return true;
12788ad704bSReka Kovacs     return false;
12888ad704bSReka Kovacs   }
129f18da190SBalazs Benics   return isa<CXXDestructorCall>(Call) ||
130f18da190SBalazs Benics          matchesAny(Call, AppendFn, AssignFn, ClearFn, EraseFn, InsertFn,
131f18da190SBalazs Benics                     PopBackFn, PushBackFn, ReplaceFn, ReserveFn, ResizeFn,
132f18da190SBalazs Benics                     ShrinkToFitFn, SwapFn);
13388ad704bSReka Kovacs }
13488ad704bSReka Kovacs 
isInnerPointerAccessFunction(const CallEvent & Call) const135663ac91eSValeriy Savchenko bool InnerPointerChecker::isInnerPointerAccessFunction(
136663ac91eSValeriy Savchenko     const CallEvent &Call) const {
137f18da190SBalazs Benics   return matchesAny(Call, CStrFn, DataFn, DataMemberFn);
138663ac91eSValeriy Savchenko }
139663ac91eSValeriy Savchenko 
markPtrSymbolsReleased(const CallEvent & Call,ProgramStateRef State,const MemRegion * MR,CheckerContext & C) const140c74cfc42SReka Kovacs void InnerPointerChecker::markPtrSymbolsReleased(const CallEvent &Call,
141c74cfc42SReka Kovacs                                                  ProgramStateRef State,
142c74cfc42SReka Kovacs                                                  const MemRegion *MR,
14388ad704bSReka Kovacs                                                  CheckerContext &C) const {
144c74cfc42SReka Kovacs   if (const PtrSet *PS = State->get<RawPtrMap>(MR)) {
14588ad704bSReka Kovacs     const Expr *Origin = Call.getOriginExpr();
14688ad704bSReka Kovacs     for (const auto Symbol : *PS) {
14788ad704bSReka Kovacs       // NOTE: `Origin` may be null, and will be stored so in the symbol's
14888ad704bSReka Kovacs       // `RefState` in MallocChecker's `RegionState` program state map.
14988ad704bSReka Kovacs       State = allocation_state::markReleased(State, Symbol, Origin);
15088ad704bSReka Kovacs     }
151c74cfc42SReka Kovacs     State = State->remove<RawPtrMap>(MR);
15288ad704bSReka Kovacs     C.addTransition(State);
15388ad704bSReka Kovacs     return;
15488ad704bSReka Kovacs   }
15588ad704bSReka Kovacs }
156c74cfc42SReka Kovacs 
checkFunctionArguments(const CallEvent & Call,ProgramStateRef State,CheckerContext & C) const157c74cfc42SReka Kovacs void InnerPointerChecker::checkFunctionArguments(const CallEvent &Call,
158c74cfc42SReka Kovacs                                                  ProgramStateRef State,
159c74cfc42SReka Kovacs                                                  CheckerContext &C) const {
160c74cfc42SReka Kovacs   if (const auto *FC = dyn_cast<AnyFunctionCall>(&Call)) {
161c74cfc42SReka Kovacs     const FunctionDecl *FD = FC->getDecl();
162c74cfc42SReka Kovacs     if (!FD || !FD->isInStdNamespace())
163c74cfc42SReka Kovacs       return;
164c74cfc42SReka Kovacs 
165c74cfc42SReka Kovacs     for (unsigned I = 0, E = FD->getNumParams(); I != E; ++I) {
166c74cfc42SReka Kovacs       QualType ParamTy = FD->getParamDecl(I)->getType();
167c74cfc42SReka Kovacs       if (!ParamTy->isReferenceType() ||
168c74cfc42SReka Kovacs           ParamTy->getPointeeType().isConstQualified())
169c74cfc42SReka Kovacs         continue;
170c74cfc42SReka Kovacs 
171c74cfc42SReka Kovacs       // In case of member operator calls, `this` is counted as an
172c74cfc42SReka Kovacs       // argument but not as a parameter.
173c74cfc42SReka Kovacs       bool isaMemberOpCall = isa<CXXMemberOperatorCall>(FC);
174c74cfc42SReka Kovacs       unsigned ArgI = isaMemberOpCall ? I+1 : I;
175c74cfc42SReka Kovacs 
176c74cfc42SReka Kovacs       SVal Arg = FC->getArgSVal(ArgI);
177c74cfc42SReka Kovacs       const auto *ArgRegion =
178c74cfc42SReka Kovacs           dyn_cast_or_null<TypedValueRegion>(Arg.getAsRegion());
179c74cfc42SReka Kovacs       if (!ArgRegion)
180c74cfc42SReka Kovacs         continue;
181c74cfc42SReka Kovacs 
182cf7cd664SAli Shuja Siddiqui       // std::addressof functions accepts a non-const reference as an argument,
183663ac91eSValeriy Savchenko       // but doesn't modify it.
184cf7cd664SAli Shuja Siddiqui       if (matchesAny(Call, AddressofFn, AddressofFn_))
185663ac91eSValeriy Savchenko         continue;
186663ac91eSValeriy Savchenko 
187c74cfc42SReka Kovacs       markPtrSymbolsReleased(Call, State, ArgRegion, C);
188c74cfc42SReka Kovacs     }
189c74cfc42SReka Kovacs   }
190c74cfc42SReka Kovacs }
191c74cfc42SReka Kovacs 
192c74cfc42SReka Kovacs // [string.require]
193c74cfc42SReka Kovacs //
194c74cfc42SReka Kovacs // "References, pointers, and iterators referring to the elements of a
195c74cfc42SReka Kovacs // basic_string sequence may be invalidated by the following uses of that
196c74cfc42SReka Kovacs // basic_string object:
197c74cfc42SReka Kovacs //
198c74cfc42SReka Kovacs // -- As an argument to any standard library function taking a reference
199c74cfc42SReka Kovacs // to non-const basic_string as an argument. For example, as an argument to
200c74cfc42SReka Kovacs // non-member functions swap(), operator>>(), and getline(), or as an argument
201c74cfc42SReka Kovacs // to basic_string::swap().
202c74cfc42SReka Kovacs //
203c74cfc42SReka Kovacs // -- Calling non-const member functions, except operator[], at, front, back,
204c74cfc42SReka Kovacs // begin, rbegin, end, and rend."
205c74cfc42SReka Kovacs 
checkPostCall(const CallEvent & Call,CheckerContext & C) const206c74cfc42SReka Kovacs void InnerPointerChecker::checkPostCall(const CallEvent &Call,
207c74cfc42SReka Kovacs                                         CheckerContext &C) const {
208c74cfc42SReka Kovacs   ProgramStateRef State = C.getState();
209c74cfc42SReka Kovacs 
21073b38668SArtem Dergachev   // TODO: Do we need these to be typed?
211663ac91eSValeriy Savchenko   const TypedValueRegion *ObjRegion = nullptr;
212663ac91eSValeriy Savchenko 
213663ac91eSValeriy Savchenko   if (const auto *ICall = dyn_cast<CXXInstanceCall>(&Call)) {
214663ac91eSValeriy Savchenko     ObjRegion = dyn_cast_or_null<TypedValueRegion>(
215c74cfc42SReka Kovacs         ICall->getCXXThisVal().getAsRegion());
216663ac91eSValeriy Savchenko 
217663ac91eSValeriy Savchenko     // Check [string.require] / second point.
218663ac91eSValeriy Savchenko     if (isInvalidatingMemberFunction(Call)) {
219663ac91eSValeriy Savchenko       markPtrSymbolsReleased(Call, State, ObjRegion, C);
220663ac91eSValeriy Savchenko       return;
221663ac91eSValeriy Savchenko     }
222663ac91eSValeriy Savchenko   }
223663ac91eSValeriy Savchenko 
224663ac91eSValeriy Savchenko   if (isInnerPointerAccessFunction(Call)) {
225663ac91eSValeriy Savchenko 
226663ac91eSValeriy Savchenko     if (isa<SimpleFunctionCall>(Call)) {
227663ac91eSValeriy Savchenko       // NOTE: As of now, we only have one free access function: std::data.
228663ac91eSValeriy Savchenko       //       If we add more functions like this in the list, hardcoded
229663ac91eSValeriy Savchenko       //       argument index should be changed.
230663ac91eSValeriy Savchenko       ObjRegion =
231663ac91eSValeriy Savchenko           dyn_cast_or_null<TypedValueRegion>(Call.getArgSVal(0).getAsRegion());
232663ac91eSValeriy Savchenko     }
233663ac91eSValeriy Savchenko 
23473b38668SArtem Dergachev     if (!ObjRegion)
23573b38668SArtem Dergachev       return;
236c74cfc42SReka Kovacs 
237c74cfc42SReka Kovacs     SVal RawPtr = Call.getReturnValue();
238c74cfc42SReka Kovacs     if (SymbolRef Sym = RawPtr.getAsSymbol(/*IncludeBaseRegions=*/true)) {
239c74cfc42SReka Kovacs       // Start tracking this raw pointer by adding it to the set of symbols
240c74cfc42SReka Kovacs       // associated with this container object in the program state map.
241c74cfc42SReka Kovacs 
242c74cfc42SReka Kovacs       PtrSet::Factory &F = State->getStateManager().get_context<PtrSet>();
243c74cfc42SReka Kovacs       const PtrSet *SetPtr = State->get<RawPtrMap>(ObjRegion);
244c74cfc42SReka Kovacs       PtrSet Set = SetPtr ? *SetPtr : F.getEmptySet();
245c74cfc42SReka Kovacs       assert(C.wasInlined || !Set.contains(Sym));
246c74cfc42SReka Kovacs       Set = F.add(Set, Sym);
247c74cfc42SReka Kovacs 
248c74cfc42SReka Kovacs       State = State->set<RawPtrMap>(ObjRegion, Set);
249c74cfc42SReka Kovacs       C.addTransition(State);
250c74cfc42SReka Kovacs     }
251c74cfc42SReka Kovacs 
252c74cfc42SReka Kovacs     return;
253c74cfc42SReka Kovacs   }
254c74cfc42SReka Kovacs 
255c74cfc42SReka Kovacs   // Check [string.require] / first point.
256c74cfc42SReka Kovacs   checkFunctionArguments(Call, State, C);
25788ad704bSReka Kovacs }
25888ad704bSReka Kovacs 
checkDeadSymbols(SymbolReaper & SymReaper,CheckerContext & C) const25988ad704bSReka Kovacs void InnerPointerChecker::checkDeadSymbols(SymbolReaper &SymReaper,
26088ad704bSReka Kovacs                                            CheckerContext &C) const {
26188ad704bSReka Kovacs   ProgramStateRef State = C.getState();
26288ad704bSReka Kovacs   PtrSet::Factory &F = State->getStateManager().get_context<PtrSet>();
26388ad704bSReka Kovacs   RawPtrMapTy RPM = State->get<RawPtrMap>();
26470d592d6SMark de Wever   for (const auto &Entry : RPM) {
26588ad704bSReka Kovacs     if (!SymReaper.isLiveRegion(Entry.first)) {
26688ad704bSReka Kovacs       // Due to incomplete destructor support, some dead regions might
26788ad704bSReka Kovacs       // remain in the program state map. Clean them up.
26888ad704bSReka Kovacs       State = State->remove<RawPtrMap>(Entry.first);
26988ad704bSReka Kovacs     }
27088ad704bSReka Kovacs     if (const PtrSet *OldSet = State->get<RawPtrMap>(Entry.first)) {
27188ad704bSReka Kovacs       PtrSet CleanedUpSet = *OldSet;
27288ad704bSReka Kovacs       for (const auto Symbol : Entry.second) {
27388ad704bSReka Kovacs         if (!SymReaper.isLive(Symbol))
27488ad704bSReka Kovacs           CleanedUpSet = F.remove(CleanedUpSet, Symbol);
27588ad704bSReka Kovacs       }
27688ad704bSReka Kovacs       State = CleanedUpSet.isEmpty()
27788ad704bSReka Kovacs                   ? State->remove<RawPtrMap>(Entry.first)
27888ad704bSReka Kovacs                   : State->set<RawPtrMap>(Entry.first, CleanedUpSet);
27988ad704bSReka Kovacs     }
28088ad704bSReka Kovacs   }
28188ad704bSReka Kovacs   C.addTransition(State);
28288ad704bSReka Kovacs }
28388ad704bSReka Kovacs 
284bb2749a5SReka Kovacs namespace clang {
285bb2749a5SReka Kovacs namespace ento {
286bb2749a5SReka Kovacs namespace allocation_state {
287bb2749a5SReka Kovacs 
getInnerPointerBRVisitor(SymbolRef Sym)288bb2749a5SReka Kovacs std::unique_ptr<BugReporterVisitor> getInnerPointerBRVisitor(SymbolRef Sym) {
2892b3d49b6SJonas Devlieghere   return std::make_unique<InnerPointerChecker::InnerPointerBRVisitor>(Sym);
290bb2749a5SReka Kovacs }
291bb2749a5SReka Kovacs 
getContainerObjRegion(ProgramStateRef State,SymbolRef Sym)292bb2749a5SReka Kovacs const MemRegion *getContainerObjRegion(ProgramStateRef State, SymbolRef Sym) {
293bb2749a5SReka Kovacs   RawPtrMapTy Map = State->get<RawPtrMap>();
29470d592d6SMark de Wever   for (const auto &Entry : Map) {
295bb2749a5SReka Kovacs     if (Entry.second.contains(Sym)) {
296bb2749a5SReka Kovacs       return Entry.first;
297bb2749a5SReka Kovacs     }
298bb2749a5SReka Kovacs   }
299bb2749a5SReka Kovacs   return nullptr;
300bb2749a5SReka Kovacs }
301bb2749a5SReka Kovacs 
302bb2749a5SReka Kovacs } // end namespace allocation_state
303bb2749a5SReka Kovacs } // end namespace ento
304bb2749a5SReka Kovacs } // end namespace clang
305bb2749a5SReka Kovacs 
VisitNode(const ExplodedNode * N,BugReporterContext & BRC,PathSensitiveBugReport &)3066d716ef1SKristof Umann PathDiagnosticPieceRef InnerPointerChecker::InnerPointerBRVisitor::VisitNode(
3072f169e7cSArtem Dergachev     const ExplodedNode *N, BugReporterContext &BRC, PathSensitiveBugReport &) {
30888ad704bSReka Kovacs   if (!isSymbolTracked(N->getState(), PtrToBuf) ||
309c82d457dSGeorge Karpenkov       isSymbolTracked(N->getFirstPred()->getState(), PtrToBuf))
31088ad704bSReka Kovacs     return nullptr;
31188ad704bSReka Kovacs 
3126b85f8e9SArtem Dergachev   const Stmt *S = N->getStmtForDiagnostics();
31388ad704bSReka Kovacs   if (!S)
31488ad704bSReka Kovacs     return nullptr;
31588ad704bSReka Kovacs 
316bb2749a5SReka Kovacs   const MemRegion *ObjRegion =
317bb2749a5SReka Kovacs       allocation_state::getContainerObjRegion(N->getState(), PtrToBuf);
318bb2749a5SReka Kovacs   const auto *TypedRegion = cast<TypedValueRegion>(ObjRegion);
319bb2749a5SReka Kovacs   QualType ObjTy = TypedRegion->getValueType();
320bb2749a5SReka Kovacs 
32188ad704bSReka Kovacs   SmallString<256> Buf;
32288ad704bSReka Kovacs   llvm::raw_svector_ostream OS(Buf);
323cfb81690SNathan James   OS << "Pointer to inner buffer of '" << ObjTy << "' obtained here";
32488ad704bSReka Kovacs   PathDiagnosticLocation Pos(S, BRC.getSourceManager(),
32588ad704bSReka Kovacs                              N->getLocationContext());
3268535b8ecSArtem Dergachev   return std::make_shared<PathDiagnosticEventPiece>(Pos, OS.str(), true);
32788ad704bSReka Kovacs }
32888ad704bSReka Kovacs 
registerInnerPointerChecker(CheckerManager & Mgr)32988ad704bSReka Kovacs void ento::registerInnerPointerChecker(CheckerManager &Mgr) {
330d9f66ba3SReka Kovacs   registerInnerPointerCheckerAux(Mgr);
33188ad704bSReka Kovacs   Mgr.registerChecker<InnerPointerChecker>();
33288ad704bSReka Kovacs }
333058a7a45SKristof Umann 
shouldRegisterInnerPointerChecker(const CheckerManager & mgr)334bda3dd0dSKirstóf Umann bool ento::shouldRegisterInnerPointerChecker(const CheckerManager &mgr) {
335058a7a45SKristof Umann   return true;
336058a7a45SKristof Umann }
337