Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Fuzzers overview

Fuzzer Fuzzer filename Functions Reached Functions unreached Fuzzer depth Files reached Basic blocks reached Cyclomatic complexity Details
xml_parsebuffer_fuzzer_UTF-16BE /src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c 91 299 9 6 1493 691 xml_parsebuffer_fuzzer.c
xml_parse_fuzzer_UTF-16 /src/expat/expat/fuzz/xml_parse_fuzzer.c 92 298 9 6 1521 699 xml_parse_fuzzer.c
xml_parse_fuzzer_US-ASCII /src/expat/expat/fuzz/xml_parse_fuzzer.c 92 298 9 6 1521 699 xml_parse_fuzzer.c
xml_parsebuffer_fuzzer_US-ASCII /src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c 91 299 9 6 1493 691 xml_parsebuffer_fuzzer.c
xml_parse_fuzzer_UTF-16BE /src/expat/expat/fuzz/xml_parse_fuzzer.c 92 298 9 6 1521 699 xml_parse_fuzzer.c
xml_parse_fuzzer_UTF-8 /src/expat/expat/fuzz/xml_parse_fuzzer.c 92 298 9 6 1521 699 xml_parse_fuzzer.c
xml_parsebuffer_fuzzer_UTF-16LE /src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c 91 299 9 6 1493 691 xml_parsebuffer_fuzzer.c
xml_parsebuffer_fuzzer_ISO-8859-1 /src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c 91 299 9 6 1493 691 xml_parsebuffer_fuzzer.c
xml_parse_fuzzer_UTF-16LE /src/expat/expat/fuzz/xml_parse_fuzzer.c 92 298 9 6 1521 699 xml_parse_fuzzer.c
xml_parsebuffer_fuzzer_UTF-8 /src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c 91 299 9 6 1493 691 xml_parsebuffer_fuzzer.c
xml_parse_fuzzer_ISO-8859-1 /src/expat/expat/fuzz/xml_parse_fuzzer.c 92 298 9 6 1521 699 xml_parse_fuzzer.c
xml_parsebuffer_fuzzer_UTF-16 /src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c 91 299 9 6 1493 691 xml_parsebuffer_fuzzer.c
xml_lpm_fuzzer /src/expat/expat/fuzz/xml_lpm_fuzzer.cpp 867 1158 17 48 2716 1670 xml_lpm_fuzzer.cpp

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: xml_parsebuffer_fuzzer_UTF-16BE

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 44 16.3%
gold [1:9] 1 0.37%
yellow [10:29] 1 0.37%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 223 82.8%
All colors 269 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
19 125 XML_ParseBuffer call site: 00125 generate_hash_secret_salt
4 13 getDebugLevel call site: 00013 __errno_location
3 44 dtdCreate call site: 00044 expat_free
2 9 expat_heap_increase_tolerable call site: 00009 expat_heap_stat
2 25 expat_malloc call site: 00025 expat_free
2 33 parserCreate call site: 00033 expat_free
2 156 expat_realloc call site: 00156 expat_heap_stat
1 20 parserCreate call site: 00020 expat_heap_stat
1 31 expat_free call site: 00031 expat_heap_stat
1 58 parserInit call site: 00058 XML_ParserFree
1 119 may_stop_character_handler call site: 00119 __assert_fail
1 150 expat_realloc call site: 00150 expat_free

Runtime coverage analysis

Covered functions
283
Functions that are reachable but not covered
17
Reachable functions
91
Percentage of reachable functions covered
81.32%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c 5
/src/expat/expat/lib/xmlparse.c 62
/src/expat/expat/lib/xmlrole.c 2
/src/expat/expat/lib/xmltok_ns.c 3
/src/expat/expat/lib/xmltok.c 2
/src/expat/expat/lib/siphash.h 6

Fuzzer: xml_parse_fuzzer_UTF-16

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 39 14.4%
gold [1:9] 5 1.85%
yellow [10:29] 2 0.74%
greenyellow [30:49] 1 0.37%
lawngreen 50+ 223 82.5%
All colors 270 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
19 123 XML_Parse call site: 00123 generate_hash_secret_salt
4 13 getDebugLevel call site: 00013 __errno_location
2 9 expat_heap_increase_tolerable call site: 00009 expat_heap_stat
2 154 expat_realloc call site: 00154 expat_heap_stat
1 20 parserCreate call site: 00020 expat_heap_stat
1 25 expat_malloc call site: 00025 expat_heap_stat
1 31 expat_free call site: 00031 expat_heap_stat
1 58 parserInit call site: 00058 XML_ParserFree
1 119 may_stop_character_handler call site: 00119 __assert_fail
1 148 expat_realloc call site: 00148 expat_free
1 191 XML_Parse call site: 00191 startParsing
1 197 ParseOneInput call site: 00197 XML_ParserReset

Runtime coverage analysis

Covered functions
284
Functions that are reachable but not covered
17
Reachable functions
92
Percentage of reachable functions covered
81.52%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/expat/expat/fuzz/xml_parse_fuzzer.c 5
/src/expat/expat/lib/xmlparse.c 63
/src/expat/expat/lib/xmlrole.c 2
/src/expat/expat/lib/xmltok_ns.c 3
/src/expat/expat/lib/xmltok.c 2
/src/expat/expat/lib/siphash.h 6

Fuzzer: xml_parse_fuzzer_US-ASCII

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 45 16.6%
gold [1:9] 1 0.37%
yellow [10:29] 2 0.74%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 222 82.2%
All colors 270 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
19 123 XML_Parse call site: 00123 generate_hash_secret_salt
4 13 getDebugLevel call site: 00013 __errno_location
3 44 dtdCreate call site: 00044 expat_free
2 9 expat_heap_increase_tolerable call site: 00009 expat_heap_stat
2 25 expat_malloc call site: 00025 expat_free
2 33 parserCreate call site: 00033 expat_free
2 154 expat_realloc call site: 00154 expat_heap_stat
1 20 parserCreate call site: 00020 expat_heap_stat
1 31 expat_free call site: 00031 expat_heap_stat
1 58 parserInit call site: 00058 XML_ParserFree
1 119 may_stop_character_handler call site: 00119 __assert_fail
1 148 expat_realloc call site: 00148 expat_free

Runtime coverage analysis

Covered functions
284
Functions that are reachable but not covered
17
Reachable functions
92
Percentage of reachable functions covered
81.52%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/expat/expat/fuzz/xml_parse_fuzzer.c 5
/src/expat/expat/lib/xmlparse.c 63
/src/expat/expat/lib/xmlrole.c 2
/src/expat/expat/lib/xmltok_ns.c 3
/src/expat/expat/lib/xmltok.c 2
/src/expat/expat/lib/siphash.h 6

Fuzzer: xml_parsebuffer_fuzzer_US-ASCII

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 44 16.3%
gold [1:9] 1 0.37%
yellow [10:29] 1 0.37%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 223 82.8%
All colors 269 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
19 125 XML_ParseBuffer call site: 00125 generate_hash_secret_salt
4 13 getDebugLevel call site: 00013 __errno_location
3 44 dtdCreate call site: 00044 expat_free
2 9 expat_heap_increase_tolerable call site: 00009 expat_heap_stat
2 25 expat_malloc call site: 00025 expat_free
2 33 parserCreate call site: 00033 expat_free
2 156 expat_realloc call site: 00156 expat_heap_stat
1 20 parserCreate call site: 00020 expat_heap_stat
1 31 expat_free call site: 00031 expat_heap_stat
1 58 parserInit call site: 00058 XML_ParserFree
1 119 may_stop_character_handler call site: 00119 __assert_fail
1 150 expat_realloc call site: 00150 expat_free

Runtime coverage analysis

Covered functions
283
Functions that are reachable but not covered
17
Reachable functions
91
Percentage of reachable functions covered
81.32%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c 5
/src/expat/expat/lib/xmlparse.c 62
/src/expat/expat/lib/xmlrole.c 2
/src/expat/expat/lib/xmltok_ns.c 3
/src/expat/expat/lib/xmltok.c 2
/src/expat/expat/lib/siphash.h 6

Fuzzer: xml_parse_fuzzer_UTF-16BE

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 39 14.4%
gold [1:9] 7 2.59%
yellow [10:29] 0 0.0%
greenyellow [30:49] 1 0.37%
lawngreen 50+ 223 82.5%
All colors 270 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
19 123 XML_Parse call site: 00123 generate_hash_secret_salt
4 13 getDebugLevel call site: 00013 __errno_location
2 9 expat_heap_increase_tolerable call site: 00009 expat_heap_stat
2 154 expat_realloc call site: 00154 expat_heap_stat
1 20 parserCreate call site: 00020 expat_heap_stat
1 25 expat_malloc call site: 00025 expat_heap_stat
1 31 expat_free call site: 00031 expat_heap_stat
1 58 parserInit call site: 00058 XML_ParserFree
1 119 may_stop_character_handler call site: 00119 __assert_fail
1 148 expat_realloc call site: 00148 expat_free
1 191 XML_Parse call site: 00191 startParsing
1 197 ParseOneInput call site: 00197 XML_ParserReset

Runtime coverage analysis

Covered functions
284
Functions that are reachable but not covered
17
Reachable functions
92
Percentage of reachable functions covered
81.52%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/expat/expat/fuzz/xml_parse_fuzzer.c 5
/src/expat/expat/lib/xmlparse.c 63
/src/expat/expat/lib/xmlrole.c 2
/src/expat/expat/lib/xmltok_ns.c 3
/src/expat/expat/lib/xmltok.c 2
/src/expat/expat/lib/siphash.h 6

Fuzzer: xml_parse_fuzzer_UTF-8

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 45 16.6%
gold [1:9] 1 0.37%
yellow [10:29] 1 0.37%
greenyellow [30:49] 1 0.37%
lawngreen 50+ 222 82.2%
All colors 270 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
19 123 XML_Parse call site: 00123 generate_hash_secret_salt
4 13 getDebugLevel call site: 00013 __errno_location
3 44 dtdCreate call site: 00044 expat_free
2 9 expat_heap_increase_tolerable call site: 00009 expat_heap_stat
2 25 expat_malloc call site: 00025 expat_free
2 33 parserCreate call site: 00033 expat_free
2 154 expat_realloc call site: 00154 expat_heap_stat
1 20 parserCreate call site: 00020 expat_heap_stat
1 31 expat_free call site: 00031 expat_heap_stat
1 58 parserInit call site: 00058 XML_ParserFree
1 119 may_stop_character_handler call site: 00119 __assert_fail
1 148 expat_realloc call site: 00148 expat_free

Runtime coverage analysis

Covered functions
284
Functions that are reachable but not covered
17
Reachable functions
92
Percentage of reachable functions covered
81.52%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/expat/expat/fuzz/xml_parse_fuzzer.c 5
/src/expat/expat/lib/xmlparse.c 63
/src/expat/expat/lib/xmlrole.c 2
/src/expat/expat/lib/xmltok_ns.c 3
/src/expat/expat/lib/xmltok.c 2
/src/expat/expat/lib/siphash.h 6

Fuzzer: xml_parsebuffer_fuzzer_UTF-16LE

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 44 16.3%
gold [1:9] 1 0.37%
yellow [10:29] 1 0.37%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 223 82.8%
All colors 269 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
19 125 XML_ParseBuffer call site: 00125 generate_hash_secret_salt
4 13 getDebugLevel call site: 00013 __errno_location
3 44 dtdCreate call site: 00044 expat_free
2 9 expat_heap_increase_tolerable call site: 00009 expat_heap_stat
2 25 expat_malloc call site: 00025 expat_free
2 33 parserCreate call site: 00033 expat_free
2 156 expat_realloc call site: 00156 expat_heap_stat
1 20 parserCreate call site: 00020 expat_heap_stat
1 31 expat_free call site: 00031 expat_heap_stat
1 58 parserInit call site: 00058 XML_ParserFree
1 119 may_stop_character_handler call site: 00119 __assert_fail
1 150 expat_realloc call site: 00150 expat_free

Runtime coverage analysis

Covered functions
283
Functions that are reachable but not covered
17
Reachable functions
91
Percentage of reachable functions covered
81.32%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c 5
/src/expat/expat/lib/xmlparse.c 62
/src/expat/expat/lib/xmlrole.c 2
/src/expat/expat/lib/xmltok_ns.c 3
/src/expat/expat/lib/xmltok.c 2
/src/expat/expat/lib/siphash.h 6

Fuzzer: xml_parsebuffer_fuzzer_ISO-8859-1

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 38 14.1%
gold [1:9] 5 1.85%
yellow [10:29] 2 0.74%
greenyellow [30:49] 1 0.37%
lawngreen 50+ 223 82.8%
All colors 269 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
19 125 XML_ParseBuffer call site: 00125 generate_hash_secret_salt
4 13 getDebugLevel call site: 00013 __errno_location
2 9 expat_heap_increase_tolerable call site: 00009 expat_heap_stat
2 156 expat_realloc call site: 00156 expat_heap_stat
1 20 parserCreate call site: 00020 expat_heap_stat
1 25 expat_malloc call site: 00025 expat_heap_stat
1 31 expat_free call site: 00031 expat_heap_stat
1 58 parserInit call site: 00058 XML_ParserFree
1 119 may_stop_character_handler call site: 00119 __assert_fail
1 150 expat_realloc call site: 00150 expat_free
1 196 ParseOneInput call site: 00196 XML_ParserReset
1 219 LLVMFuzzerTestOneInput call site: 00219 XML_ParserCreate_MM

Runtime coverage analysis

Covered functions
283
Functions that are reachable but not covered
17
Reachable functions
91
Percentage of reachable functions covered
81.32%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c 5
/src/expat/expat/lib/xmlparse.c 62
/src/expat/expat/lib/xmlrole.c 2
/src/expat/expat/lib/xmltok_ns.c 3
/src/expat/expat/lib/xmltok.c 2
/src/expat/expat/lib/siphash.h 6

Fuzzer: xml_parse_fuzzer_UTF-16LE

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 44 16.2%
gold [1:9] 1 0.37%
yellow [10:29] 3 1.11%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 222 82.2%
All colors 270 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
19 123 XML_Parse call site: 00123 generate_hash_secret_salt
4 13 getDebugLevel call site: 00013 __errno_location
3 44 dtdCreate call site: 00044 expat_free
2 9 expat_heap_increase_tolerable call site: 00009 expat_heap_stat
2 33 parserCreate call site: 00033 expat_free
2 154 expat_realloc call site: 00154 expat_heap_stat
1 20 parserCreate call site: 00020 expat_heap_stat
1 25 expat_malloc call site: 00025 expat_heap_stat
1 31 expat_free call site: 00031 expat_heap_stat
1 58 parserInit call site: 00058 XML_ParserFree
1 119 may_stop_character_handler call site: 00119 __assert_fail
1 148 expat_realloc call site: 00148 expat_free

Runtime coverage analysis

Covered functions
284
Functions that are reachable but not covered
17
Reachable functions
92
Percentage of reachable functions covered
81.52%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/expat/expat/fuzz/xml_parse_fuzzer.c 5
/src/expat/expat/lib/xmlparse.c 63
/src/expat/expat/lib/xmlrole.c 2
/src/expat/expat/lib/xmltok_ns.c 3
/src/expat/expat/lib/xmltok.c 2
/src/expat/expat/lib/siphash.h 6

Fuzzer: xml_parsebuffer_fuzzer_UTF-8

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 44 16.3%
gold [1:9] 2 0.74%
yellow [10:29] 1 0.37%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 222 82.5%
All colors 269 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
19 125 XML_ParseBuffer call site: 00125 generate_hash_secret_salt
4 13 getDebugLevel call site: 00013 __errno_location
3 44 dtdCreate call site: 00044 expat_free
2 9 expat_heap_increase_tolerable call site: 00009 expat_heap_stat
2 25 expat_malloc call site: 00025 expat_free
2 33 parserCreate call site: 00033 expat_free
2 156 expat_realloc call site: 00156 expat_heap_stat
1 20 parserCreate call site: 00020 expat_heap_stat
1 31 expat_free call site: 00031 expat_heap_stat
1 58 parserInit call site: 00058 XML_ParserFree
1 119 may_stop_character_handler call site: 00119 __assert_fail
1 150 expat_realloc call site: 00150 expat_free

Runtime coverage analysis

Covered functions
283
Functions that are reachable but not covered
17
Reachable functions
91
Percentage of reachable functions covered
81.32%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c 5
/src/expat/expat/lib/xmlparse.c 62
/src/expat/expat/lib/xmlrole.c 2
/src/expat/expat/lib/xmltok_ns.c 3
/src/expat/expat/lib/xmltok.c 2
/src/expat/expat/lib/siphash.h 6

Fuzzer: xml_parse_fuzzer_ISO-8859-1

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 40 14.8%
gold [1:9] 6 2.22%
yellow [10:29] 0 0.0%
greenyellow [30:49] 1 0.37%
lawngreen 50+ 223 82.5%
All colors 270 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
19 123 XML_Parse call site: 00123 generate_hash_secret_salt
4 13 getDebugLevel call site: 00013 __errno_location
2 9 expat_heap_increase_tolerable call site: 00009 expat_heap_stat
2 154 expat_realloc call site: 00154 expat_heap_stat
1 20 parserCreate call site: 00020 expat_heap_stat
1 25 expat_malloc call site: 00025 expat_heap_stat
1 31 expat_free call site: 00031 expat_heap_stat
1 58 parserInit call site: 00058 XML_ParserFree
1 119 may_stop_character_handler call site: 00119 __assert_fail
1 148 expat_realloc call site: 00148 expat_free
1 186 addBinding call site: 00186 expat_free
1 191 XML_Parse call site: 00191 startParsing

Runtime coverage analysis

Covered functions
284
Functions that are reachable but not covered
17
Reachable functions
92
Percentage of reachable functions covered
81.52%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/expat/expat/fuzz/xml_parse_fuzzer.c 5
/src/expat/expat/lib/xmlparse.c 63
/src/expat/expat/lib/xmlrole.c 2
/src/expat/expat/lib/xmltok_ns.c 3
/src/expat/expat/lib/xmltok.c 2
/src/expat/expat/lib/siphash.h 6

Fuzzer: xml_parsebuffer_fuzzer_UTF-16

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 44 16.3%
gold [1:9] 0 0.0%
yellow [10:29] 2 0.74%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 223 82.8%
All colors 269 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
19 125 XML_ParseBuffer call site: 00125 generate_hash_secret_salt
4 13 getDebugLevel call site: 00013 __errno_location
3 44 dtdCreate call site: 00044 expat_free
2 9 expat_heap_increase_tolerable call site: 00009 expat_heap_stat
2 25 expat_malloc call site: 00025 expat_free
2 33 parserCreate call site: 00033 expat_free
2 156 expat_realloc call site: 00156 expat_heap_stat
1 20 parserCreate call site: 00020 expat_heap_stat
1 31 expat_free call site: 00031 expat_heap_stat
1 58 parserInit call site: 00058 XML_ParserFree
1 119 may_stop_character_handler call site: 00119 __assert_fail
1 150 expat_realloc call site: 00150 expat_free

Runtime coverage analysis

Covered functions
283
Functions that are reachable but not covered
17
Reachable functions
91
Percentage of reachable functions covered
81.32%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c 5
/src/expat/expat/lib/xmlparse.c 62
/src/expat/expat/lib/xmlrole.c 2
/src/expat/expat/lib/xmltok_ns.c 3
/src/expat/expat/lib/xmltok.c 2
/src/expat/expat/lib/siphash.h 6

Fuzzer: xml_lpm_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 598 60.0%
gold [1:9] 35 3.51%
yellow [10:29] 6 0.60%
greenyellow [30:49] 2 0.20%
lawngreen 50+ 355 35.6%
All colors 996 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
117 316 protobuf_mutator::ConstFieldInstance::reflection() const call site: 00316 __assert_fail
68 203 protobuf_mutator::(anonymous namespace)::UnpackIfAny(google::protobuf::Message const&) call site: 00203 _ZNSt4pairIKPKN6google8protobuf7MessageESt10unique_ptrIS2_St14default_deleteIS2_EEEC2IS4_S9_TnNSt9enable_ifIXaaclsr5_PCCPE22_MoveConstructiblePairIT_T0_EEclsr5_PCCPE30_ImplicitlyMoveConvertiblePairISD_SE_EEEbE4typeELb1EEEOSD_OSE_
51 451 protobuf_mutator::FieldInstance::Store(protobuf_mutator::ConstFieldInstance::Enum const&) const call site: 00451 __assert_fail
47 43 xml_lpm_fuzzer::Testcase::Testcase() call site: 00043 _ZNSt5tupleIJPN6google8protobuf7MessageESt14default_deleteIS2_EEEC2IS3_S5_TnNSt9enable_ifIXsr6__and_ISt37__is_implicitly_default_constructibleIT_ES9_IT0_EEE5valueEbE4typeELb1EEEv
36 126 protobuf_mutator::Mutator::~Mutator() call site: 00126 __cxa_guard_release
31 846 lookup call site: 00846 setContext
30 575 TestOneProtoInput(xml_lpm_fuzzer::Testcase const&) call site: 00575
24 178 protobuf_mutator::(anonymous namespace)::UnpackIfAny(google::protobuf::Message const&) call site: 00178 _ZNSt5tupleIJPN6google8protobuf7MessageESt14default_deleteIS2_EEEC2IS3_S5_TnNSt9enable_ifIXsr6__and_ISt37__is_implicitly_default_constructibleIT_ES9_IT0_EEE5valueEbE4typeELb1EEEv
19 894 XML_Parse call site: 00894 generate_hash_secret_salt
18 515 protobuf_mutator::(anonymous namespace)::CastToAny(google::protobuf::Message*) call site: 00515
10 32 xml_lpm_fuzzer::Testcase::Testcase() call site: 00032 __clang_call_terminate
10 115 protobuf_mutator::Mutator::Mutator() call site: 00115 __cxa_atexit

Runtime coverage analysis

Covered functions
371
Functions that are reachable but not covered
616
Reachable functions
867
Percentage of reachable functions covered
28.95%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/expat/expat/fuzz/xml_lpm_fuzzer.cpp 28
/src/expat/build/xml_lpm_fuzzer.pb.cc 4
/usr/include/google/protobuf/message.h 4
/usr/include/google/protobuf/message_lite.h 4
/usr/include/google/protobuf/metadata.h 2
/usr/include/google/protobuf/metadata_lite.h 5
/usr/include/google/protobuf/generated_message_util.h 2
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/atomic 1
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/atomic_base.h 1
/usr/include/google/protobuf/repeated_field.h 18
/usr/include/google/protobuf/unknown_field_set.h 2
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/libfuzzer/libfuzzer_macro.cc 6
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/stl_vector.h 22
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/allocator.h 9
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/ext/new_allocator.h 23
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/unique_ptr.h 12
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/tuple 10
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/alloc_traits.h 12
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/stl_iterator.h 8
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/binary_format.cc 2
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/text_format.cc 2
/usr/include/google/protobuf/text_format.h 1
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/libfuzzer/libfuzzer_mutator.h 2
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/mutator.h 2
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/random.h 7
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/random.tcc 1
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/unordered_map.h 5
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/hashtable.h 17
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/hashtable_policy.h 37
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/ext/aligned_buffer.h 4
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/std_function.h 2
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/ptr_traits.h 3
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/mutator.cc 21
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/port/protobuf.h 2
/usr/include/google/protobuf/any.pb.h 3
/usr/include/google/protobuf/arenastring.h 3
/usr/include/google/protobuf/descriptor.h 22
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/stl_pair.h 1
/usr/include/google/protobuf/stubs/once.h 2
/usr/include/google/protobuf/descriptor.pb.h 1
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/field_instance.h 58
/src/expat/build/xml_lpm_fuzzer.pb.h 12
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/vector.tcc 2
/src/expat/expat/lib/xmlparse.c 76
/src/expat/expat/lib/xmlrole.c 2
/src/expat/expat/lib/xmltok_ns.c 3
/src/expat/expat/lib/xmltok.c 2
/src/expat/expat/lib/siphash.h 4

Analyses and suggestions

Optimal target analysis

Remaining optimal interesting functions

The following table shows a list of functions that are optimal targets. Optimal targets are identified by finding the functions that in combination, yield a high code coverage.

Func name Functions filename Arg count Args Function depth hitcount instr count bb count cyclomatic complexity Reachable functions Incoming references total cyclomatic complexity Unreached complexity
externalParEntInitProcessor /src/expat/expat/lib/xmlparse.c 4 ['N/A', 'N/A', 'N/A', 'N/A'] 11 0 73 8 4 74 0 1372 1102
protobuf_mutator::libfuzzer::(anonymousnamespace)::CrossOverMessages(unsignedint,protobuf_mutator::libfuzzer::(anonymousnamespace)::InputReaderconst&,protobuf_mutator::libfuzzer::(anonymousnamespace)::InputReaderconst&,protobuf_mutator::libfuzzer::(anonymousnamespace)::OutputWriter*,google::protobuf::Message*,google::protobuf::Message*) /src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/libfuzzer/libfuzzer_macro.cc 6 ['int', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A'] 15 0 72 8 2 1185 2 1535 878
xml_lpm_fuzzer::Testcase::MergePartialFromCodedStream(google::protobuf::io::CodedInputStream*) /src/expat/build/xml_lpm_fuzzer.pb.cc 2 ['N/A', 'N/A'] 13 0 369 64 21 233 0 383 251
normal_contentTok /src/expat/expat/lib/xmltok_impl.c 4 ['N/A', 'N/A', 'N/A', 'N/A'] 3 0 567 86 24 10 0 241 241
big2_contentTok /src/expat/expat/lib/xmltok_impl.c 4 ['N/A', 'N/A', 'N/A', 'N/A'] 6 0 624 97 27 11 0 188 188
little2_contentTok /src/expat/expat/lib/xmltok_impl.c 4 ['N/A', 'N/A', 'N/A', 'N/A'] 6 0 621 97 27 11 0 188 170
protobuf_xml_5flpm_5ffuzzer_2eproto::StaticDescriptorInitializer::StaticDescriptorInitializer() /src/expat/build/xml_lpm_fuzzer.pb.cc 1 ['N/A'] 11 0 15 3 2 72 0 122 96
normal_prologTok /src/expat/expat/lib/xmltok_impl.c 4 ['N/A', 'N/A', 'N/A', 'N/A'] 2 0 1330 206 40 7 0 155 91
XmlParseXmlDeclNS /src/expat/expat/lib/xmltok_ns.c 10 ['int', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A'] 3 0 42 3 2 7 0 84 72
big2_prologTok /src/expat/expat/lib/xmltok_impl.c 4 ['N/A', 'N/A', 'N/A', 'N/A'] 3 0 1293 194 33 8 0 130 70

Implementing fuzzers that target the above functions will improve reachability such that it becomes:

Functions statically reachable by fuzzers
63.0%
961 / 1529
Cyclomatic complexity statically reachable by fuzzers
68.0%
4740 / 6932

All functions overview

If you implement fuzzers for these functions, the status of all functions in the project will be:

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

/src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['XML_ParseBuffer', 'getDebugLevel', 'dtdCreate', 'expat_heap_increase_tolerable', 'expat_malloc', 'parserCreate', 'expat_realloc', 'expat_free', 'parserInit']

/src/expat/expat/fuzz/xml_parse_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['XML_Parse', 'getDebugLevel', 'expat_heap_increase_tolerable', 'expat_realloc', 'parserCreate', 'expat_malloc', 'expat_free', 'parserInit', 'may_stop_character_handler']

/src/expat/expat/fuzz/xml_parse_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['XML_Parse', 'getDebugLevel', 'dtdCreate', 'expat_heap_increase_tolerable', 'expat_malloc', 'parserCreate', 'expat_realloc', 'expat_free', 'parserInit']

/src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['XML_ParseBuffer', 'getDebugLevel', 'dtdCreate', 'expat_heap_increase_tolerable', 'expat_malloc', 'parserCreate', 'expat_realloc', 'expat_free', 'parserInit']

/src/expat/expat/fuzz/xml_parse_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['XML_Parse', 'getDebugLevel', 'expat_heap_increase_tolerable', 'expat_realloc', 'parserCreate', 'expat_malloc', 'expat_free', 'parserInit', 'may_stop_character_handler']

/src/expat/expat/fuzz/xml_parse_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['XML_Parse', 'getDebugLevel', 'dtdCreate', 'expat_heap_increase_tolerable', 'expat_malloc', 'parserCreate', 'expat_realloc', 'expat_free', 'parserInit']

/src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['XML_ParseBuffer', 'getDebugLevel', 'dtdCreate', 'expat_heap_increase_tolerable', 'expat_malloc', 'parserCreate', 'expat_realloc', 'expat_free', 'parserInit']

/src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['XML_ParseBuffer', 'getDebugLevel', 'expat_heap_increase_tolerable', 'expat_realloc', 'parserCreate', 'expat_malloc', 'expat_free', 'parserInit', 'may_stop_character_handler']

/src/expat/expat/fuzz/xml_parse_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['XML_Parse', 'getDebugLevel', 'dtdCreate', 'expat_heap_increase_tolerable', 'parserCreate', 'expat_realloc', 'expat_malloc', 'expat_free', 'parserInit']

/src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['XML_ParseBuffer', 'getDebugLevel', 'dtdCreate', 'expat_heap_increase_tolerable', 'expat_malloc', 'parserCreate', 'expat_realloc', 'expat_free', 'parserInit']

/src/expat/expat/fuzz/xml_parse_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['XML_Parse', 'getDebugLevel', 'expat_heap_increase_tolerable', 'expat_realloc', 'parserCreate', 'expat_malloc', 'expat_free', 'parserInit', 'may_stop_character_handler']

/src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['XML_ParseBuffer', 'getDebugLevel', 'dtdCreate', 'expat_heap_increase_tolerable', 'expat_malloc', 'parserCreate', 'expat_realloc', 'expat_free', 'parserInit']

/src/expat/expat/fuzz/xml_lpm_fuzzer.cpp

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['protobuf_mutator::ConstFieldInstance::reflection() const', 'protobuf_mutator::(anonymous namespace)::UnpackIfAny(google::protobuf::Message const&)', 'protobuf_mutator::FieldInstance::Store(protobuf_mutator::ConstFieldInstance::Enum const&) const', 'xml_lpm_fuzzer::Testcase::Testcase()', 'protobuf_mutator::Mutator::~Mutator()', 'lookup', 'TestOneProtoInput(xml_lpm_fuzzer::Testcase const&)', 'protobuf_mutator::(anonymous namespace)::UnpackIfAny(google::protobuf::Message const&)', 'XML_Parse', 'protobuf_mutator::(anonymous namespace)::CastToAny(google::protobuf::Message*)']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/hashtable.h ['xml_lpm_fuzzer'] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/std_function.h ['xml_lpm_fuzzer'] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/ext/type_traits.h [] []
/usr/include/google/protobuf/metadata.h ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/usr/include/google/protobuf/any.pb.h ['xml_lpm_fuzzer'] []
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/mutator.h ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/usr/include/google/protobuf/generated_message_util.h ['xml_lpm_fuzzer'] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/random.tcc ['xml_lpm_fuzzer'] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/stl_algobase.h [] []
/usr/include/google/protobuf/stubs/once.h ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/allocator.h ['xml_lpm_fuzzer'] []
/usr/include/google/protobuf/message_lite.h ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bitset [] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/unique_ptr.h ['xml_lpm_fuzzer'] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/basic_string.tcc [] []
/usr/include/google/protobuf/metadata_lite.h ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/atomic_base.h ['xml_lpm_fuzzer'] []
/src/expat/build/xml_lpm_fuzzer.pb.cc ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/port/protobuf.h ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/ptr_traits.h ['xml_lpm_fuzzer'] []
/src/expat/expat/lib/xmltok_ns.c ['xml_parsebuffer_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-16', 'xml_parse_fuzzer_US-ASCII', 'xml_parsebuffer_fuzzer_US-ASCII', 'xml_parse_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-8', 'xml_parsebuffer_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_ISO-8859-1', 'xml_parse_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_UTF-8', 'xml_parse_fuzzer_ISO-8859-1', 'xml_parsebuffer_fuzzer_UTF-16', 'xml_lpm_fuzzer'] ['xml_parsebuffer_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-16', 'xml_parse_fuzzer_US-ASCII', 'xml_parsebuffer_fuzzer_US-ASCII', 'xml_parse_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-8', 'xml_parsebuffer_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_ISO-8859-1', 'xml_parse_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_UTF-8', 'xml_parse_fuzzer_ISO-8859-1', 'xml_parsebuffer_fuzzer_UTF-16', 'xml_lpm_fuzzer']
/usr/include/google/protobuf/stubs/port.h [] []
/src/expat/expat/fuzz/xml_parse_fuzzer.c ['xml_parse_fuzzer_UTF-16', 'xml_parse_fuzzer_US-ASCII', 'xml_parse_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-8', 'xml_parse_fuzzer_UTF-16LE', 'xml_parse_fuzzer_ISO-8859-1'] ['xml_parse_fuzzer_UTF-16', 'xml_parse_fuzzer_US-ASCII', 'xml_parse_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-8', 'xml_parse_fuzzer_UTF-16LE', 'xml_parse_fuzzer_ISO-8859-1']
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/random.h ['xml_lpm_fuzzer'] []
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/text_format.cc ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/libfuzzer/libfuzzer_mutator.h ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/usr/include/google/protobuf/message.h ['xml_lpm_fuzzer'] []
/usr/include/google/protobuf/descriptor.h ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/src/expat/expat/lib/xmltok_impl.c [] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/stl_pair.h ['xml_lpm_fuzzer'] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/unordered_map.h ['xml_lpm_fuzzer'] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/functional [] []
/usr/include/google/protobuf/text_format.h ['xml_lpm_fuzzer'] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/x86_64-linux-gnu/c++/9/bits/gthr-default.h [] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/uniform_int_dist.h [] []
/usr/include/google/protobuf/descriptor.pb.h ['xml_lpm_fuzzer'] []
/src/expat/expat/lib/siphash.h ['xml_parsebuffer_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-16', 'xml_parse_fuzzer_US-ASCII', 'xml_parsebuffer_fuzzer_US-ASCII', 'xml_parse_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-8', 'xml_parsebuffer_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_ISO-8859-1', 'xml_parse_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_UTF-8', 'xml_parse_fuzzer_ISO-8859-1', 'xml_parsebuffer_fuzzer_UTF-16', 'xml_lpm_fuzzer'] ['xml_parsebuffer_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-16', 'xml_parse_fuzzer_US-ASCII', 'xml_parsebuffer_fuzzer_US-ASCII', 'xml_parse_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-8', 'xml_parsebuffer_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_ISO-8859-1', 'xml_parse_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_UTF-8', 'xml_parse_fuzzer_ISO-8859-1', 'xml_parsebuffer_fuzzer_UTF-16', 'xml_lpm_fuzzer']
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/stl_vector.h ['xml_lpm_fuzzer'] []
/usr/include/google/protobuf/unknown_field_set.h ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/libfuzzer/libfuzzer_mutator.cc [] []
/usr/include/google/protobuf/generated_message_reflection.h [] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/char_traits.h [] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/hashtable_policy.h ['xml_lpm_fuzzer'] []
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/utf8_fix.cc [] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/alloc_traits.h ['xml_lpm_fuzzer'] []
/usr/include/google/protobuf/arena.h [] []
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/field_instance.h ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/stl_uninitialized.h [] []
/usr/include/google/protobuf/wire_format_lite_inl.h [] []
/usr/include/google/protobuf/io/coded_stream.h [] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/tuple ['xml_lpm_fuzzer'] []
/src/expat/expat/lib/xmlrole.c ['xml_parsebuffer_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-16', 'xml_parse_fuzzer_US-ASCII', 'xml_parsebuffer_fuzzer_US-ASCII', 'xml_parse_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-8', 'xml_parsebuffer_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_ISO-8859-1', 'xml_parse_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_UTF-8', 'xml_parse_fuzzer_ISO-8859-1', 'xml_parsebuffer_fuzzer_UTF-16', 'xml_lpm_fuzzer'] ['xml_parsebuffer_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-16', 'xml_parse_fuzzer_US-ASCII', 'xml_parsebuffer_fuzzer_US-ASCII', 'xml_parse_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-8', 'xml_parsebuffer_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_ISO-8859-1', 'xml_parse_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_UTF-8', 'xml_parse_fuzzer_ISO-8859-1', 'xml_parsebuffer_fuzzer_UTF-16', 'xml_lpm_fuzzer']
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/ext/new_allocator.h ['xml_lpm_fuzzer'] []
/src/expat/build/xml_lpm_fuzzer.pb.h ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/binary_format.cc ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/limits [] []
/src/expat/expat/fuzz/xml_parsebuffer_fuzzer.c ['xml_parsebuffer_fuzzer_UTF-16BE', 'xml_parsebuffer_fuzzer_US-ASCII', 'xml_parsebuffer_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_ISO-8859-1', 'xml_parsebuffer_fuzzer_UTF-8', 'xml_parsebuffer_fuzzer_UTF-16'] ['xml_parsebuffer_fuzzer_UTF-16BE', 'xml_parsebuffer_fuzzer_US-ASCII', 'xml_parsebuffer_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_ISO-8859-1', 'xml_parsebuffer_fuzzer_UTF-8', 'xml_parsebuffer_fuzzer_UTF-16']
/usr/include/google/protobuf/wire_format.h [] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/atomic ['xml_lpm_fuzzer'] []
/src/expat/expat/fuzz/xml_lpm_fuzzer.cpp ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/libfuzzer/libfuzzer_macro.cc ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/stl_iterator.h ['xml_lpm_fuzzer'] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/basic_string.h [] []
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/mutator.cc ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/src/expat/expat/lib/xmlparse.c ['xml_parsebuffer_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-16', 'xml_parse_fuzzer_US-ASCII', 'xml_parsebuffer_fuzzer_US-ASCII', 'xml_parse_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-8', 'xml_parsebuffer_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_ISO-8859-1', 'xml_parse_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_UTF-8', 'xml_parse_fuzzer_ISO-8859-1', 'xml_parsebuffer_fuzzer_UTF-16', 'xml_lpm_fuzzer'] ['xml_parsebuffer_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-16', 'xml_parse_fuzzer_US-ASCII', 'xml_parsebuffer_fuzzer_US-ASCII', 'xml_parse_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-8', 'xml_parsebuffer_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_ISO-8859-1', 'xml_parse_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_UTF-8', 'xml_parse_fuzzer_ISO-8859-1', 'xml_parsebuffer_fuzzer_UTF-16', 'xml_lpm_fuzzer']
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/vector.tcc ['xml_lpm_fuzzer'] []
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/weighted_reservoir_sampler.h [] []
/usr/include/google/protobuf/arena_impl.h [] []
/usr/include/google/protobuf/repeated_field.h ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/usr/include/google/protobuf/wire_format_lite.h [] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/mutex [] []
/src/expat/expat/lib/xmltok.c ['xml_parsebuffer_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-16', 'xml_parse_fuzzer_US-ASCII', 'xml_parsebuffer_fuzzer_US-ASCII', 'xml_parse_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-8', 'xml_parsebuffer_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_ISO-8859-1', 'xml_parse_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_UTF-8', 'xml_parse_fuzzer_ISO-8859-1', 'xml_parsebuffer_fuzzer_UTF-16', 'xml_lpm_fuzzer'] ['xml_parsebuffer_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-16', 'xml_parse_fuzzer_US-ASCII', 'xml_parsebuffer_fuzzer_US-ASCII', 'xml_parse_fuzzer_UTF-16BE', 'xml_parse_fuzzer_UTF-8', 'xml_parsebuffer_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_ISO-8859-1', 'xml_parse_fuzzer_UTF-16LE', 'xml_parsebuffer_fuzzer_UTF-8', 'xml_parse_fuzzer_ISO-8859-1', 'xml_parsebuffer_fuzzer_UTF-16', 'xml_lpm_fuzzer']
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/stl_construct.h [] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/ext/aligned_buffer.h ['xml_lpm_fuzzer'] []
/usr/include/google/protobuf/arenastring.h ['xml_lpm_fuzzer'] ['xml_lpm_fuzzer']
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/iostream [] []
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/utility [] []

Directories in report

Directory
/src/expat/build/
/src/expat/expat/fuzz/
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/ext/
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/
/src/expat/expat/lib/
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/src/libfuzzer/
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/x86_64-linux-gnu/c++/9/bits/
/src/expat/build/libprotobuf-mutator/src/libprotobuf-mutator/port/
/usr/include/google/protobuf/stubs/
/usr/include/google/protobuf/
/usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/
/usr/include/google/protobuf/io/

Metadata section

This sections shows the raw data that is used to produce this report. This is mainly used for further processing and developer debugging.

Fuzzer Calltree file Program data file Coverage file
xml_parsebuffer_fuzzer_UTF-16BE fuzzerLogFile-0-WlZiAzAIGM.data fuzzerLogFile-0-WlZiAzAIGM.data.yaml xml_parsebuffer_fuzzer_UTF-16BE.covreport
xml_parse_fuzzer_UTF-16 fuzzerLogFile-0-RXNNpGMtYL.data fuzzerLogFile-0-RXNNpGMtYL.data.yaml xml_parse_fuzzer_UTF-16.covreport
xml_parse_fuzzer_US-ASCII fuzzerLogFile-0-aPjZLkWKUl.data fuzzerLogFile-0-aPjZLkWKUl.data.yaml xml_parse_fuzzer_US-ASCII.covreport
xml_parsebuffer_fuzzer_US-ASCII fuzzerLogFile-0-egd1zErZic.data fuzzerLogFile-0-egd1zErZic.data.yaml xml_parsebuffer_fuzzer_US-ASCII.covreport
xml_parse_fuzzer_UTF-16BE fuzzerLogFile-0-ysWxvmqfkd.data fuzzerLogFile-0-ysWxvmqfkd.data.yaml xml_parse_fuzzer_UTF-16BE.covreport
xml_parse_fuzzer_UTF-8 fuzzerLogFile-0-Twxq6oZhea.data fuzzerLogFile-0-Twxq6oZhea.data.yaml xml_parse_fuzzer_UTF-8.covreport
xml_parsebuffer_fuzzer_UTF-16LE fuzzerLogFile-0-t82Jy2vDnI.data fuzzerLogFile-0-t82Jy2vDnI.data.yaml xml_parsebuffer_fuzzer_UTF-16LE.covreport
xml_parsebuffer_fuzzer_ISO-8859-1 fuzzerLogFile-0-ykHxHMJOeQ.data fuzzerLogFile-0-ykHxHMJOeQ.data.yaml xml_parsebuffer_fuzzer_ISO-8859-1.covreport
xml_parse_fuzzer_UTF-16LE fuzzerLogFile-0-M9VuLsp42T.data fuzzerLogFile-0-M9VuLsp42T.data.yaml xml_parse_fuzzer_UTF-16LE.covreport
xml_parsebuffer_fuzzer_UTF-8 fuzzerLogFile-0-4RVNUiGOlF.data fuzzerLogFile-0-4RVNUiGOlF.data.yaml xml_parsebuffer_fuzzer_UTF-8.covreport
xml_parse_fuzzer_ISO-8859-1 fuzzerLogFile-0-vFII5Znj68.data fuzzerLogFile-0-vFII5Znj68.data.yaml xml_parse_fuzzer_ISO-8859-1.covreport
xml_parsebuffer_fuzzer_UTF-16 fuzzerLogFile-0-F4M4bUVM6q.data fuzzerLogFile-0-F4M4bUVM6q.data.yaml xml_parsebuffer_fuzzer_UTF-16.covreport
xml_lpm_fuzzer fuzzerLogFile-0-GlVErcrFy4.data fuzzerLogFile-0-GlVErcrFy4.data.yaml xml_lpm_fuzzer.covreport