The following nodes represent call sites where fuzz blockers occur.
Amount of callsites blocked | Calltree index | Parent function | Callsite | Largest blocked function |
---|---|---|---|---|
9 | 0 | EP | call site: 00000 | [org.joni.Regex].matcher(byte[],int,int) |
[RegexMatcherFuzzer].fuzzerTestOneInput(com.code_intelligence.jazzer.api.FuzzedDataProvider)
[function]
[call site]
00000
[com.code_intelligence.jazzer.api.FuzzedDataProvider].consumeInt()
[function]
[call site]
00001
[com.code_intelligence.jazzer.api.FuzzedDataProvider].consumeInt()
[function]
[call site]
00002
[com.code_intelligence.jazzer.api.FuzzedDataProvider].remainingBytes()
[function]
[call site]
00003
[com.code_intelligence.jazzer.api.FuzzedDataProvider].consumeString(int)
[function]
[call site]
00004
[org.joni.Regex].<init>(String)
[function]
[call site]
00005
[org.joni.Regex].<init>(org.joni.Regex,int,org.joni.Regex,int,org.joni.Regex)
[function]
[call site]
00006
[com.code_intelligence.jazzer.api.FuzzedDataProvider].consumeRemainingAsBytes()
[function]
[call site]
00007
[org.joni.Regex].matcher(byte[],int,int)
[function]
[call site]
00008
[org.joni.MatcherFactory].create(byte[],int,int)
[function]
[call site]
00009