Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: fuzz-ini-file-parser

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 9 12.0%
gold [1:9] 2 2.66%
yellow [10:29] 4 5.33%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 60 80.0%
All colors 75 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
5 19 avahi_malloc call site: 00019 oom
3 9 avahi_ini_file_load call site: 00009 avahi_log_error
1 14 avahi_log_ap call site: 00014 fprintf

Runtime coverage analysis

Covered functions
16
Functions that are reachable but not covered
20
Reachable functions
36
Percentage of reachable functions covered
44.44%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzz/fuzz-ini-file-parser.c 2
avahi-core/log.c 4
avahi-daemon/ini-file-parser.c 4
./avahi-common/malloc.h 1
avahi-common/malloc.c 6
avahi-common/./malloc.h 1

Fuzzer: fuzz-strlst

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 12 16.6%
gold [1:9] 1 1.38%
yellow [10:29] 5 6.94%
greenyellow [30:49] 4 5.55%
lawngreen 50+ 50 69.4%
All colors 72 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
5 8 avahi_malloc call site: 00008 oom
5 37 avahi_string_list_get_pair call site: 00037 avahi_strndup
1 45 avahi_memdup call site: 00045 avahi_free
1 63 avahi_string_list_copy call site: 00063 avahi_string_list_free

Runtime coverage analysis

Covered functions
19
Functions that are reachable but not covered
12
Reachable functions
31
Percentage of reachable functions covered
61.29%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzz/fuzz-strlst.c 1
avahi-common/strlst.c 12
avahi-common/malloc.c 7
avahi-common/./malloc.h 1
avahi-common/utf8.c 1

Fuzzer: fuzz-domain

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 17 10.3%
gold [1:9] 2 1.21%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 146 88.4%
All colors 165 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
5 2 avahi_malloc call site: 00002 oom
5 110 avahi_free call site: 00110 xrealloc
3 91 avahi_address_parse call site: 00091 avahi_proto_to_af
2 107 avahi_strdup_vprintf call site: 00107 avahi_realloc
1 121 avahi_new_internal call site: 00121 avahi_free
1 150 avahi_alternative_service_name call site: 00150 avahi_free

Runtime coverage analysis

Covered functions
27
Functions that are reachable but not covered
17
Reachable functions
44
Percentage of reachable functions covered
61.36%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzz/fuzz-domain.c 1
avahi-common/malloc.c 10
avahi-common/domain.c 13
avahi-common/utf8.c 1
avahi-common/address.c 2
avahi-common/alternative.c 3
avahi-common/./malloc.h 1

Fuzzer: fuzz-consume-key

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 20 15.2%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 111 84.7%
All colors 131 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
9 120 avahi_dns_packet_free call site: 00120 avahi_hashmap_free
5 5 avahi_malloc call site: 00005 oom
1 31 avahi_new_internal call site: 00031 avahi_log_error
1 34 avahi_log_ap call site: 00034 fprintf
1 62 avahi_is_valid_domain_name call site: 00062 avahi_key_unref
1 89 avahi_strdup_vprintf call site: 00089 avahi_free
1 92 xrealloc call site: 00092 oom
1 94 avahi_realloc call site: 00094 avahi_free

Runtime coverage analysis

Covered functions
38
Functions that are reachable but not covered
14
Reachable functions
52
Percentage of reachable functions covered
73.08%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzz/fuzz-consume-key.c 2
avahi-core/log.c 3
avahi-core/dns.c 6
avahi-common/malloc.c 9
avahi-common/domain.c 7
avahi-core/rr.c 10
avahi-core/../avahi-common/malloc.h 1
avahi-common/utf8.c 1
avahi-core/hashmap.c 2

Fuzzer: fuzz-consume-record

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 23 5.66%
gold [1:9] 0 0.0%
yellow [10:29] 3 0.73%
greenyellow [30:49] 3 0.73%
lawngreen 50+ 377 92.8%
All colors 406 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
5 5 avahi_malloc call site: 00005 oom
3 371 avahi_record_copy call site: 00371 avahi_log_error
2 232 xcalloc call site: 00232 oom
1 36 avahi_new_internal call site: 00036 avahi_log_error
1 39 avahi_log_ap call site: 00039 fprintf
1 65 avahi_record_new call site: 00065 avahi_log_error
1 74 avahi_key_unref call site: 00074 avahi_log_error
1 191 avahi_strdup_vprintf call site: 00191 avahi_free
1 194 xrealloc call site: 00194 oom
1 196 avahi_realloc call site: 00196 avahi_free
1 242 avahi_dns_packet_append_name call site: 00242 avahi_log_error
1 344 avahi_record_lexicographical_compare call site: 00344 avahi_free

Runtime coverage analysis

Covered functions
94
Functions that are reachable but not covered
18
Reachable functions
112
Percentage of reachable functions covered
83.93%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzz/fuzz-consume-record.c 2
avahi-core/log.c 3
avahi-core/dns.c 24
avahi-common/malloc.c 12
avahi-common/domain.c 6
avahi-core/rr.c 24
avahi-core/../avahi-common/malloc.h 2
avahi-common/utf8.c 1
avahi-common/strlst.c 9
avahi-core/addr-util.c 1
avahi-common/./malloc.h 1
avahi-core/hashmap.c 10
avahi-core/domain-util.c 1

Fuzzer: fuzz-packet

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 16 4.08%
gold [1:9] 1 0.25%
yellow [10:29] 0 0.0%
greenyellow [30:49] 1 0.25%
lawngreen 50+ 374 95.4%
All colors 392 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
5 5 avahi_malloc call site: 00005 oom
2 139 xcalloc call site: 00139 oom
1 44 avahi_new_internal call site: 00044 avahi_log_error
1 47 avahi_log_ap call site: 00047 fprintf
1 74 avahi_is_valid_domain_name call site: 00074 avahi_key_unref
1 93 avahi_strdup_vprintf call site: 00093 avahi_free
1 96 xrealloc call site: 00096 oom
1 98 avahi_realloc call site: 00098 avahi_free
1 149 avahi_dns_packet_append_name call site: 00149 avahi_log_error
1 197 avahi_record_new call site: 00197 avahi_log_error
1 202 avahi_record_new_full call site: 00202 avahi_log_error

Runtime coverage analysis

Covered functions
93
Functions that are reachable but not covered
19
Reachable functions
112
Percentage of reachable functions covered
83.04%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
fuzz/fuzz-packet.c 4
avahi-core/log.c 3
avahi-core/dns.c 28
avahi-common/malloc.c 12
avahi-common/domain.c 14
avahi-core/rr.c 12
avahi-core/../avahi-common/malloc.h 2
avahi-common/utf8.c 1
avahi-core/domain-util.c 1
avahi-core/hashmap.c 10
avahi-common/strlst.c 7
avahi-common/./malloc.h 1

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

fuzz/fuzz-ini-file-parser.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['avahi_malloc', 'avahi_ini_file_load', 'avahi_log_ap']

fuzz/fuzz-strlst.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['avahi_malloc', 'avahi_string_list_get_pair', 'avahi_memdup', 'avahi_string_list_copy']

fuzz/fuzz-domain.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['avahi_malloc', 'avahi_free', 'avahi_address_parse', 'avahi_strdup_vprintf', 'avahi_new_internal', 'avahi_alternative_service_name']

fuzz/fuzz-consume-key.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['avahi_dns_packet_free', 'avahi_malloc', 'avahi_new_internal', 'avahi_log_ap', 'avahi_is_valid_domain_name', 'avahi_strdup_vprintf', 'xrealloc', 'avahi_realloc']

fuzz/fuzz-consume-record.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['avahi_malloc', 'avahi_record_copy', 'xcalloc', 'avahi_new_internal', 'avahi_log_ap', 'avahi_record_new', 'avahi_key_unref', 'avahi_strdup_vprintf', 'xrealloc', 'avahi_realloc']

fuzz/fuzz-packet.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['avahi_malloc', 'xcalloc', 'avahi_new_internal', 'avahi_log_ap', 'avahi_is_valid_domain_name', 'avahi_strdup_vprintf', 'xrealloc', 'avahi_realloc', 'avahi_dns_packet_append_name', 'avahi_record_new']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
/src/avahi/avahi-common/./malloc.h ['fuzz-ini-file-parser', 'fuzz-strlst', 'fuzz-domain', 'fuzz-consume-record', 'fuzz-packet'] []
/src/avahi/avahi-common/alternative.c ['fuzz-domain'] ['fuzz-domain']
/src/avahi/avahi-common/malloc.c ['fuzz-ini-file-parser', 'fuzz-strlst', 'fuzz-domain', 'fuzz-consume-key', 'fuzz-consume-record', 'fuzz-packet'] ['fuzz-ini-file-parser', 'fuzz-strlst', 'fuzz-domain', 'fuzz-consume-key', 'fuzz-consume-record', 'fuzz-packet']
/src/avahi/fuzz/fuzz-domain.c ['fuzz-domain'] ['fuzz-domain']
/src/avahi/avahi-core/addr-util.c ['fuzz-consume-record'] ['fuzz-consume-record']
/src/avahi/fuzz/fuzz-ini-file-parser.c ['fuzz-ini-file-parser'] ['fuzz-ini-file-parser']
/src/avahi/avahi-core/log.c ['fuzz-ini-file-parser', 'fuzz-consume-key', 'fuzz-consume-record', 'fuzz-packet'] ['fuzz-ini-file-parser', 'fuzz-consume-key', 'fuzz-consume-record', 'fuzz-packet']
/src/avahi/avahi-daemon/ini-file-parser.c ['fuzz-ini-file-parser'] ['fuzz-ini-file-parser']
/src/avahi/avahi-core/../avahi-common/malloc.h ['fuzz-consume-key', 'fuzz-consume-record', 'fuzz-packet'] []
/src/avahi/fuzz/fuzz-strlst.c ['fuzz-strlst'] ['fuzz-strlst']
/src/avahi/avahi-common/address.c ['fuzz-domain'] ['fuzz-domain']
/src/avahi/avahi-common/utf8.c ['fuzz-strlst', 'fuzz-domain', 'fuzz-consume-key', 'fuzz-consume-record', 'fuzz-packet'] ['fuzz-strlst', 'fuzz-domain', 'fuzz-consume-key', 'fuzz-consume-record', 'fuzz-packet']
/src/avahi/avahi-core/domain-util.c ['fuzz-consume-record', 'fuzz-packet'] ['fuzz-consume-record', 'fuzz-packet']
/src/avahi/avahi-core/hashmap.c ['fuzz-consume-key', 'fuzz-consume-record', 'fuzz-packet'] ['fuzz-consume-record', 'fuzz-packet']
/src/avahi/fuzz/fuzz-consume-key.c ['fuzz-consume-key'] ['fuzz-consume-key']
/src/avahi/avahi-core/rr.c ['fuzz-consume-key', 'fuzz-consume-record', 'fuzz-packet'] ['fuzz-consume-key', 'fuzz-consume-record', 'fuzz-packet']
/src/avahi/fuzz/fuzz-consume-record.c ['fuzz-consume-record'] ['fuzz-consume-record']
/src/avahi/fuzz/fuzz-packet.c ['fuzz-packet'] ['fuzz-packet']
/src/avahi/avahi-core/util.c [] []
/src/avahi/avahi-common/domain.c ['fuzz-domain', 'fuzz-consume-key', 'fuzz-consume-record', 'fuzz-packet'] ['fuzz-domain', 'fuzz-consume-key', 'fuzz-consume-record', 'fuzz-packet']
/src/avahi/avahi-common/strlst.c ['fuzz-strlst', 'fuzz-consume-record', 'fuzz-packet'] ['fuzz-strlst', 'fuzz-consume-record', 'fuzz-packet']
/src/avahi/avahi-core/dns.c ['fuzz-consume-key', 'fuzz-consume-record', 'fuzz-packet'] ['fuzz-consume-key', 'fuzz-consume-record', 'fuzz-packet']

Directories in report

Directory
/src/avahi/fuzz/
/src/avahi/avahi-core/../avahi-common/
/src/avahi/avahi-common/./
/src/avahi/avahi-common/
/src/avahi/avahi-core/
/src/avahi/avahi-daemon/