The following nodes represent call sites where fuzz blockers occur.
Amount of callsites blocked | Calltree index | Parent function | Callsite | Largest blocked function |
---|---|---|---|---|
11 | 0 | EP | call site: {node_id} |
[com.example.AttachmentDeserializerFuzzer].myFuzzTest(com.code_intelligence.jazzer.api.FuzzedDataProvider)
[function]
[call site]
00000
[org.apache.cxf.message.MessageImpl].<init>()
[function]
[call site]
00001
[org.apache.cxf.message.ExchangeImpl].<init>()
[function]
[call site]
00002
[java.io.ByteArrayInputStream].<init>(byte[])
[function]
[call site]
00003
[org.apache.cxf.message.MessageImpl].<init>()
[function]
[call site]
00004
[org.apache.cxf.attachment.AttachmentDeserializer].<init>(org.apache.cxf.message.Message)
[function]
[call site]
00005
[org.apache.cxf.attachment.AttachmentDeserializer].initializeAttachments()
[function]
[call site]
00006
[org.apache.cxf.message.MessageImpl].getContent(java.lang.Class)
[function]
[call site]
00007
[javax.xml.parsers.SAXParserFactory].newInstance()
[function]
[call site]
00008
[org.xml.sax.helpers.DefaultHandler].<init>()
[function]
[call site]
00009
[java.io.FilterInputStream].close()
[function]
[call site]
00010
[java.io.BufferedInputStream:java.io.ByteArrayInputStream:java.io.FileInputStream:java.io.FilterInputStream:java.io.InputStream:java.io.InputStream$1:java.io.ObjectInputStream:java.io.ObjectInputStream$BlockDataInputStream:java.io.ObjectInputStream$PeekInputStream:java.util.jar.Manifest$FastInputStream:java.util.zip.InflaterInputStream:java.util.zip.ZipInputStream].close()
[function]
[call site]
00011