|  | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. | 
|  | // See https://llvm.org/LICENSE.txt for license information. | 
|  | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception | 
|  |  | 
|  | // Triggers the bug described here: | 
|  | // https://github.com/google/oss-fuzz/issues/2369#issuecomment-490240627 | 
|  | // | 
|  | // In a nutshell, MSan's parameter shadow does not get unpoisoned before calls | 
|  | // to LLVMFuzzerTestOneInput.  This test case causes the parameter shadow to be | 
|  | // poisoned by the call to foo(), which will trigger an MSan false positive on | 
|  | // the Size == 0 check if the parameter shadow is still poisoned. | 
|  | #include <cstdint> | 
|  | #include <cstdio> | 
|  | #include <cstdlib> | 
|  | #include <cstring> | 
|  |  | 
|  | volatile int zero = 0; | 
|  | __attribute__((noinline)) int foo(int arg1, int arg2) { return zero; } | 
|  |  | 
|  | extern "C" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { | 
|  | if (Size == 0) | 
|  | return 0; | 
|  |  | 
|  | // Pass uninitialized values to foo().  Since foo doesn't do anything with | 
|  | // them, MSan should not report an error here. | 
|  | int a, b; | 
|  | return foo(a, b); | 
|  | } |