// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // Triggers the bug described here: // https://github.com/google/oss-fuzz/issues/2369#issuecomment-490240627 // // In a nutshell, MSan's parameter shadow does not get unpoisoned before calls // to LLVMFuzzerTestOneInput. This test case causes the parameter shadow to be // poisoned by the call to foo(), which will trigger an MSan false positive on // the Size == 0 check if the parameter shadow is still poisoned. #include #include #include #include volatile int zero = 0; __attribute__((noinline)) int foo(int arg1, int arg2) { return zero; } extern "C" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { if (Size == 0) return 0; // Pass uninitialized values to foo(). Since foo doesn't do anything with // them, MSan should not report an error here. int a, b; return foo(a, b); }