The following nodes represent call sites where fuzz blockers occur.
Amount of callsites blocked | Calltree index | Parent function | Callsite | Largest blocked function |
---|---|---|---|---|
7 | 4 | [DiffUtilsFuzzer].fuzzerTestOneInput(com.code_intelligence.jazzer.api.FuzzedDataProvider) | call site: 00004 | [me.xdrop.diffutils.DiffUtils].getEditOps(String,String) |
[DiffUtilsFuzzer].fuzzerTestOneInput(com.code_intelligence.jazzer.api.FuzzedDataProvider)
[function]
[call site]
00000
[com.code_intelligence.jazzer.api.FuzzedDataProvider].remainingBytes()
[function]
[call site]
00001
[com.code_intelligence.jazzer.api.FuzzedDataProvider].consumeString(int)
[function]
[call site]
00002
[com.code_intelligence.jazzer.api.FuzzedDataProvider].consumeRemainingAsString()
[function]
[call site]
00003
[me.xdrop.diffutils.DiffUtils].getMatchingBlocks(String,String)
[function]
[call site]
00004
[String].length()
[function]
[call site]
00005
[String].length()
[function]
[call site]
00006
[me.xdrop.diffutils.DiffUtils].getEditOps(String,String)
[function]
[call site]
00007
[String].length()
[function]
[call site]
00008
[String].length()
[function]
[call site]
00009
[me.xdrop.diffutils.DiffUtils].getEditOps(me.xdrop.diffutils.DiffUtils,String,me.xdrop.diffutils.DiffUtils,String)
[function]
[call site]
00010
[me.xdrop.diffutils.DiffUtils].getMatchingBlocks(me.xdrop.diffutils.DiffUtils,me.xdrop.diffutils.DiffUtils,EditOp[])
[function]
[call site]
00011