Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Fuzzers overview

Fuzzer Fuzzer filename Functions Reached Functions unreached Fuzzer depth Files reached Basic blocks reached Cyclomatic complexity Details
buffer_add_file_fuzzer buffer_add_file_fuzzer.cc 83 639 16 8 801 394 buffer_add_file_fuzzer.cc
evtag_fuzzer evtag_fuzzer.cc 108 630 16 9 1331 600 evtag_fuzzer.cc
bufferevent_fuzzer bufferevent_fuzzer.cc 301 472 12 15 3888 1812 bufferevent_fuzzer.cc
buffer_fuzzer buffer_fuzzer.cc 112 605 16 8 1637 719 buffer_fuzzer.cc
dns_config_fuzzer dns_config_fuzzer.cc 463 503 27 18 6202 2854 dns_config_fuzzer.cc
inspector/light/source_filesdns_message_fuzzer.cc inspector/light/source_filesdns_message_fuzzer.cc 220 737 16 14 2960 1328 source_filesdns_message_fuzzer.cc
inspector/source-codebufferevent_fuzzer.cc inspector/source-codebufferevent_fuzzer.cc 301 472 12 15 3888 1812 source-codebufferevent_fuzzer.cc
inspector/light/source_filesbuffer_add_file_fuzzer.cc inspector/light/source_filesbuffer_add_file_fuzzer.cc 83 639 16 8 801 394 source_filesbuffer_add_file_fuzzer.cc
inspector/light/source_filesbufferevent_fuzzer.cc inspector/light/source_filesbufferevent_fuzzer.cc 301 472 12 15 3888 1812 source_filesbufferevent_fuzzer.cc
inspector/source-codeparse_query_fuzzer.cc inspector/source-codeparse_query_fuzzer.cc 51 977 9 6 707 354 source-codeparse_query_fuzzer.cc
inspector/light/source_filesdns_config_fuzzer.cc inspector/light/source_filesdns_config_fuzzer.cc 463 503 27 18 6202 2854 source_filesdns_config_fuzzer.cc
inspector/light/source_filesutils_fuzzer.cc inspector/light/source_filesutils_fuzzer.cc 47 461 7 5 609 310 source_filesutils_fuzzer.cc
inspector/light/source_filesevtag_fuzzer.cc inspector/light/source_filesevtag_fuzzer.cc 108 630 16 9 1331 600 source_filesevtag_fuzzer.cc
inspector/source-codebuffer_add_file_fuzzer.cc inspector/source-codebuffer_add_file_fuzzer.cc 83 639 16 8 801 394 source-codebuffer_add_file_fuzzer.cc
inspector/source-codeevtag_fuzzer.cc inspector/source-codeevtag_fuzzer.cc 108 630 16 9 1331 600 source-codeevtag_fuzzer.cc
http_message_fuzzer http_message_fuzzer.cc 207 820 15 13 2949 1319 http_message_fuzzer.cc
http_fuzzer http_fuzzer.cc 188 847 16 13 2694 1233 http_fuzzer.cc
inspector/source-codedns_message_fuzzer.cc inspector/source-codedns_message_fuzzer.cc 220 737 16 14 2960 1328 source-codedns_message_fuzzer.cc
inspector/source-codehttp_fuzzer.cc inspector/source-codehttp_fuzzer.cc 188 847 16 13 2694 1233 source-codehttp_fuzzer.cc
utils_fuzzer utils_fuzzer.cc 47 461 7 5 609 310 utils_fuzzer.cc
inspector/source-codebuffer_fuzzer.cc inspector/source-codebuffer_fuzzer.cc 112 605 16 8 1637 719 source-codebuffer_fuzzer.cc
inspector/light/source_filesbuffer_fuzzer.cc inspector/light/source_filesbuffer_fuzzer.cc 112 605 16 8 1637 719 source_filesbuffer_fuzzer.cc
inspector/light/source_filesparse_query_fuzzer.cc inspector/light/source_filesparse_query_fuzzer.cc 51 977 9 6 707 354 source_filesparse_query_fuzzer.cc
parse_query_fuzzer parse_query_fuzzer.cc 51 977 9 6 707 354 parse_query_fuzzer.cc
inspector/source-codedns_config_fuzzer.cc inspector/source-codedns_config_fuzzer.cc 463 503 27 18 6202 2854 source-codedns_config_fuzzer.cc
dns_message_fuzzer dns_message_fuzzer.cc 220 737 16 14 2960 1328 dns_message_fuzzer.cc
inspector/source-codeutils_fuzzer.cc inspector/source-codeutils_fuzzer.cc 47 461 7 5 609 310 source-codeutils_fuzzer.cc
inspector/light/source_fileshttp_fuzzer.cc inspector/light/source_fileshttp_fuzzer.cc 188 847 16 13 2694 1233 source_fileshttp_fuzzer.cc
inspector/source-codehttp_message_fuzzer.cc inspector/source-codehttp_message_fuzzer.cc 207 820 15 13 2949 1319 source-codehttp_message_fuzzer.cc
inspector/light/source_fileshttp_message_fuzzer.cc inspector/light/source_fileshttp_message_fuzzer.cc 207 820 15 13 2949 1319 source_fileshttp_message_fuzzer.cc

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: buffer_add_file_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 61 53.9%
gold [1:9] 0 0.0%
yellow [10:29] 12 10.6%
greenyellow [30:49] 1 0.88%
lawngreen 50+ 39 34.5%
All colors 113 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
35 57 evbuffer_decref_and_unlock_ call site: 00057 event_deferred_cb_cancel_
11 94 evbuffer_add_file_segment call site: 00094 event_deferred_cb_schedule_
4 16 evbuffer_file_segment_new call site: 00016 evbuffer_file_segment_materialize
3 34 evbuffer_file_segment_materialize call site: 00034 event_mm_free_
3 42 evbuffer_add_file_segment call site: 00042 evbuffer_free_trailing_empty_chains
2 48 evbuffer_file_segment_free call site: 00048 event_warn
2 52 evbuffer_file_segment_free call site: 00052 evbuffer_chain_free
1 11 event_mm_calloc_ call site: 00011 __errno_location

Runtime coverage analysis

Covered functions
24
Functions that are reachable but not covered
59
Reachable functions
83
Percentage of reachable functions covered
28.92%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
buffer_add_file_fuzzer.cc 1
libevent/buffer.c 19
libevent/event.c 26
libevent/evutil.c 3
libevent/log.c 6
libevent/minheap-internal.h 4
libevent/evmap.c 2
libevent/bufferevent.c 1

Fuzzer: evtag_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 239 100.%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 0 0.0%
All colors 239 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
238 0 EP call site: 00000 evtag_unmarshal

Runtime coverage analysis

Covered functions
0
Functions that are reachable but not covered
108
Reachable functions
108
Percentage of reachable functions covered
0.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
evtag_fuzzer.cc 1
libevent/buffer.c 31
libevent/event.c 26
libevent/log.c 6
libevent/evutil.c 2
libevent/minheap-internal.h 4
libevent/evmap.c 2
libevent/bufferevent.c 1
libevent/event_tagging.c 24

Fuzzer: bufferevent_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 491 70.9%
gold [1:9] 8 1.15%
yellow [10:29] 9 1.30%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 184 26.5%
All colors 692 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
63 620 LLVMFuzzerTestOneInput call site: 00620 bufferevent_rate_limit_group_new
50 468 bufferevent_socket_new call site: 00468 bufferevent_decrement_write_buckets_
47 419 bufferevent_socket_new call site: 00419 bufferevent_decrement_read_buckets_
26 281 be_pair_wants_to_talk call site: 00281 be_pair_transfer
24 308 event_callback_activate_nolock_ call site: 00308 evbuffer_add_buffer
22 200 event_add_nolock_ call site: 00200 common_timeout_schedule
22 594 LLVMFuzzerTestOneInput call site: 00594 bev_refill_callback_
19 333 event_add call site: 00333 bufferevent_trigger_nolock_
15 135 event_base_priority_init call site: 00135 evthread_make_base_notifiable
14 168 event_assign call site: 00168 event_err
13 546 bufferevent_filter_new call site: 00546 be_filter_process_output
11 151 evutil_make_internal_pipe_ call site: 00151 event_assign

Runtime coverage analysis

Covered functions
136
Functions that are reachable but not covered
188
Reachable functions
301
Percentage of reachable functions covered
37.54%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
bufferevent_fuzzer.cc 1
libevent/event.c 72
libevent/log.c 9
libevent/evutil.c 15
libevent/evutil_time.c 3
libevent/minheap-internal.h 11
libevent/evmap.c 19
libevent/bufferevent_pair.c 8
libevent/bufferevent.c 35
libevent/buffer.c 49
libevent/bufferevent_ratelim.c 26
libevent/bufferevent-internal.h 1
libevent/bufferevent_sock.c 6
libevent/evthread-internal.h 1
libevent/bufferevent_filter.c 11

Fuzzer: buffer_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 104 55.0%
gold [1:9] 1 0.52%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 84 44.4%
All colors 189 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
35 36 evbuffer_decref_and_unlock_ call site: 00036 event_deferred_cb_cancel_
20 13 evbuffer_free_all_chains call site: 00013 evbuffer_chain_free
11 77 evbuffer_add call site: 00077 event_deferred_cb_schedule_
9 98 evbuffer_search_range call site: 00098 evbuffer_ptr_subtract
8 169 LLVMFuzzerTestOneInput call site: 00169 APPEND_CHAIN_MULTICAST
7 155 LLVMFuzzerTestOneInput call site: 00155 evbuffer_free_all_chains
2 74 evbuffer_add call site: 00074 evbuffer_chain_insert
2 95 evbuffer_search_eol call site: 00095 evbuffer_search
2 166 LLVMFuzzerTestOneInput call site: 00166 evbuffer_invoke_callbacks_
1 3 event_mm_calloc_ call site: 00003 __errno_location
1 108 evbuffer_readln call site: 00108 event_warn
1 115 evbuffer_drain call site: 00115 evbuffer_chain_free

Runtime coverage analysis

Covered functions
48
Functions that are reachable but not covered
64
Reachable functions
112
Percentage of reachable functions covered
42.86%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
buffer_fuzzer.cc 1
libevent/buffer.c 57
libevent/event.c 26
libevent/log.c 6
libevent/evutil.c 2
libevent/minheap-internal.h 4
libevent/evmap.c 2
libevent/bufferevent.c 1

Fuzzer: dns_config_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 924 72.6%
gold [1:9] 1 0.07%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 347 27.2%
All colors 1272 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
219 823 evutil_sockaddr_cmp call site: 00823 evdns_getaddrinfo_gotresolve
126 458 search_state_decref call site: 00458 evdns_requests_pump_waiting_queue
124 332 evutil_inet_pton_scope call site: 00332 evdns_base_resolve_ipv4
103 585 event_add call site: 00585 bufferevent_writecb
72 689 evutil_socket_ call site: 00689 client_tcp_read_packet_cb
37 276 evdns_base_new call site: 00276 evutil_getaddrinfo
36 786 evutil_sockaddr_is_loopback_ call site: 00786 nameserver_ready_callback
22 200 event_add_nolock_ call site: 00200 common_timeout_schedule
15 135 event_base_priority_init call site: 00135 evthread_make_base_notifiable
13 168 event_assign call site: 00168 event_err
11 151 evutil_make_internal_pipe_ call site: 00151 event_assign
10 51 event_del_nolock_ call site: 00051 event_queue_remove_timeout

Runtime coverage analysis

Covered functions
139
Functions that are reachable but not covered
334
Reachable functions
463
Percentage of reachable functions covered
27.86%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
dns_config_fuzzer.cc 1
libevent/event.c 71
libevent/log.c 9
libevent/evutil.c 62
libevent/evutil_time.c 3
libevent/minheap-internal.h 11
libevent/evmap.c 19
libevent/evdns.c 106
libevent/evutil_rand.c 3
libevent/./arc4random.c 13
/usr/include/x86_64-linux-gnu/bits/byteswap.h 2
libevent/bufferevent.c 31
libevent/buffer.c 42
libevent/bufferevent_ratelim.c 15
libevent/bufferevent_sock.c 7
libevent/evthread-internal.h 1
libevent/bufferevent-internal.h 1
libevent/strlcpy.c 1

Fuzzer: inspector/light/source_filesdns_message_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 355 71.4%
gold [1:9] 0 0.0%
yellow [10:29] 12 2.41%
greenyellow [30:49] 1 0.20%
lawngreen 50+ 129 25.9%
All colors 497 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
56 321 bufferevent_decref call site: 00321 server_port_ready_callback
50 391 event_add call site: 00391 evdns_server_request_respond
46 443 LLVMFuzzerTestOneInput call site: 00443 event_base_loop
22 201 event_add_nolock_ call site: 00201 common_timeout_schedule
15 136 event_base_priority_init call site: 00136 evthread_make_base_notifiable
13 169 event_assign call site: 00169 event_err
12 378 event_mm_strdup_ call site: 00378 event_add
11 152 evutil_make_internal_pipe_ call site: 00152 event_assign
11 234 event_config_free call site: 00234 evdns_add_server_port_with_base
10 52 event_del_nolock_ call site: 00052 event_queue_remove_timeout
10 68 event_del_nolock_ call site: 00068 event_errx
8 283 event_callback_activate_nolock_ call site: 00283 bufferevent_write

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
117
Reachable functions
220
Percentage of reachable functions covered
46.82%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/light/source_filesdns_message_fuzzer.cc 2
libevent/event.c 77
libevent/log.c 9
libevent/evutil.c 11
libevent/evutil_time.c 3
libevent/minheap-internal.h 12
libevent/evmap.c 19
libevent/evdns.c 23
/usr/include/x86_64-linux-gnu/bits/byteswap.h 2
libevent/bufferevent.c 11
libevent/buffer.c 19
libevent/bufferevent_ratelim.c 1
libevent/listener.c 2
libevent/signal.c 1

Fuzzer: inspector/source-codebufferevent_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 457 66.0%
gold [1:9] 6 0.86%
yellow [10:29] 16 2.31%
greenyellow [30:49] 1 0.14%
lawngreen 50+ 212 30.6%
All colors 692 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
70 591 event_get_priority call site: 00591 bufferevent_set_rate_limit
47 419 bufferevent_socket_new call site: 00419 bufferevent_decrement_read_buckets_
28 663 evbuffer_remove call site: 00663 bufferevent_free
23 468 bufferevent_socket_new call site: 00468 evbuffer_write_atmost
22 200 event_add_nolock_ call site: 00200 common_timeout_schedule
22 496 evbuffer_drain call site: 00496 bufferevent_decrement_write_buckets_
19 333 event_add call site: 00333 bufferevent_trigger_nolock_
15 135 event_base_priority_init call site: 00135 evthread_make_base_notifiable
13 168 event_assign call site: 00168 event_err
13 546 bufferevent_filter_new call site: 00546 be_filter_process_output
11 151 evutil_make_internal_pipe_ call site: 00151 event_assign
11 534 bufferevent_filter_new call site: 00534 be_filter_read_nolock_

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
156
Reachable functions
301
Percentage of reachable functions covered
48.17%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/source-codebufferevent_fuzzer.cc 1
libevent/event.c 72
libevent/log.c 9
libevent/evutil.c 15
libevent/evutil_time.c 3
libevent/minheap-internal.h 11
libevent/evmap.c 19
libevent/bufferevent_pair.c 8
libevent/bufferevent.c 35
libevent/buffer.c 49
libevent/bufferevent_ratelim.c 26
libevent/bufferevent-internal.h 1
libevent/bufferevent_sock.c 6
libevent/evthread-internal.h 1
libevent/bufferevent_filter.c 11

Fuzzer: inspector/light/source_filesbuffer_add_file_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 50 44.2%
gold [1:9] 0 0.0%
yellow [10:29] 14 12.3%
greenyellow [30:49] 1 0.88%
lawngreen 50+ 48 42.4%
All colors 113 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
10 63 event_del_nolock_ call site: 00063 event_queue_remove_timeout
10 79 event_del_nolock_ call site: 00079 event_errx
6 94 evbuffer_add_file_segment call site: 00094 event_deferred_cb_schedule_
4 57 evbuffer_decref_and_unlock_ call site: 00057 event_deferred_cb_cancel_
4 101 event_callback_activate_nolock_ call site: 00101 evbuffer_run_callbacks
3 34 evbuffer_file_segment_materialize call site: 00034 event_mm_free_
2 18 evutil_fd_filesize call site: 00018 evbuffer_file_segment_materialize
2 48 evbuffer_file_segment_free call site: 00048 event_warn
2 52 evbuffer_file_segment_free call site: 00052 evbuffer_chain_free
2 90 event_debug_note_del_ call site: 00090 event_queue_remove_active
1 11 event_mm_calloc_ call site: 00011 __errno_location
1 16 evbuffer_file_segment_new call site: 00016 evutil_fd_filesize

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
44
Reachable functions
83
Percentage of reachable functions covered
46.99%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/light/source_filesbuffer_add_file_fuzzer.cc 1
libevent/buffer.c 19
libevent/event.c 26
libevent/evutil.c 3
libevent/log.c 6
libevent/minheap-internal.h 4
libevent/evmap.c 2
libevent/bufferevent.c 1

Fuzzer: inspector/light/source_filesbufferevent_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 457 66.0%
gold [1:9] 6 0.86%
yellow [10:29] 16 2.31%
greenyellow [30:49] 1 0.14%
lawngreen 50+ 212 30.6%
All colors 692 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
70 591 event_get_priority call site: 00591 bufferevent_set_rate_limit
47 419 bufferevent_socket_new call site: 00419 bufferevent_decrement_read_buckets_
28 663 evbuffer_remove call site: 00663 bufferevent_free
23 468 bufferevent_socket_new call site: 00468 evbuffer_write_atmost
22 200 event_add_nolock_ call site: 00200 common_timeout_schedule
22 496 evbuffer_drain call site: 00496 bufferevent_decrement_write_buckets_
19 333 event_add call site: 00333 bufferevent_trigger_nolock_
15 135 event_base_priority_init call site: 00135 evthread_make_base_notifiable
13 168 event_assign call site: 00168 event_err
13 546 bufferevent_filter_new call site: 00546 be_filter_process_output
11 151 evutil_make_internal_pipe_ call site: 00151 event_assign
11 534 bufferevent_filter_new call site: 00534 be_filter_read_nolock_

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
156
Reachable functions
301
Percentage of reachable functions covered
48.17%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/light/source_filesbufferevent_fuzzer.cc 1
libevent/event.c 72
libevent/log.c 9
libevent/evutil.c 15
libevent/evutil_time.c 3
libevent/minheap-internal.h 11
libevent/evmap.c 19
libevent/bufferevent_pair.c 8
libevent/bufferevent.c 35
libevent/buffer.c 49
libevent/bufferevent_ratelim.c 26
libevent/bufferevent-internal.h 1
libevent/bufferevent_sock.c 6
libevent/evthread-internal.h 1
libevent/bufferevent_filter.c 11

Fuzzer: inspector/source-codeparse_query_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 24 18.8%
gold [1:9] 1 0.78%
yellow [10:29] 10 7.87%
greenyellow [30:49] 1 0.78%
lawngreen 50+ 91 71.6%
All colors 127 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
3 111 evhttp_add_header_internal call site: 00111 event_warn
2 8 evhttp_uri_parse_with_flags call site: 00008 __errno_location
2 38 parse_authority call site: 00038 event_mm_strdup_
2 71 evhttp_uri_parse_with_flags call site: 00071 event_warn
2 108 evhttp_add_header_internal call site: 00108 event_warn
2 122 evhttp_parse_query_impl call site: 00122 evhttp_parse_query_str_flags
1 0 EP call site: 00000 evhttp_parse_query
1 6 event_mm_calloc_ call site: 00006 __errno_location
1 11 event_mm_strdup_ call site: 00011 __errno_location
1 20 parse_authority call site: 00020 event_warn
1 36 parse_authority call site: 00036 event_warn
1 59 parse_authority call site: 00059 event_warn

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
14
Reachable functions
51
Percentage of reachable functions covered
72.55%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/source-codeparse_query_fuzzer.cc 1
libevent/http.c 20
libevent/event.c 4
libevent/evutil.c 9
libevent/log.c 4
/usr/include/x86_64-linux-gnu/bits/byteswap.h 1

Fuzzer: inspector/light/source_filesdns_config_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 812 63.8%
gold [1:9] 12 0.94%
yellow [10:29] 13 1.02%
greenyellow [30:49] 8 0.62%
lawngreen 50+ 427 33.5%
All colors 1272 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
125 823 evutil_sockaddr_cmp call site: 00823 reply_parse
83 959 bufferevent_enable call site: 00959 evdns_getaddrinfo_gotresolve
46 386 evutil_ascii_strcasecmp call site: 00386 evdns_base_resolve_ipv4
40 721 evbuffer_remove call site: 00721 reply_parse
38 346 evutil_getaddrinfo call site: 00346 evutil_getaddrinfo_common_
36 786 evutil_sockaddr_is_loopback_ call site: 00786 nameserver_ready_callback
33 585 event_add call site: 00585 bufferevent_trigger_nolock_
23 620 bufferevent_socket_new call site: 00620 evbuffer_write_atmost
22 200 event_add_nolock_ call site: 00200 common_timeout_schedule
22 648 evbuffer_drain call site: 00648 bufferevent_decrement_write_buckets_
19 541 bufferevent_socket_new call site: 00541 evbuffer_read
17 567 evbuffer_free_all_chains call site: 00567 bufferevent_decrement_read_buckets_

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
257
Reachable functions
463
Percentage of reachable functions covered
44.49%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/light/source_filesdns_config_fuzzer.cc 1
libevent/event.c 71
libevent/log.c 9
libevent/evutil.c 62
libevent/evutil_time.c 3
libevent/minheap-internal.h 11
libevent/evmap.c 19
libevent/evdns.c 106
libevent/evutil_rand.c 3
libevent/./arc4random.c 13
/usr/include/x86_64-linux-gnu/bits/byteswap.h 2
libevent/bufferevent.c 31
libevent/buffer.c 42
libevent/bufferevent_ratelim.c 15
libevent/bufferevent_sock.c 7
libevent/evthread-internal.h 1
libevent/bufferevent-internal.h 1
libevent/strlcpy.c 1

Fuzzer: inspector/light/source_filesutils_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 29 25.8%
gold [1:9] 10 8.92%
yellow [10:29] 1 0.89%
greenyellow [30:49] 7 6.25%
lawngreen 50+ 65 58.0%
All colors 112 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
6 100 evutil_getaddrinfo call site: 00100 apply_socktype_protocol_hack
4 95 evutil_getaddrinfo call site: 00095 apply_numeric_port_hack
2 21 evutil_inet_pton_scope call site: 00021 __errno_location
2 41 evutil_inet_ntop call site: 00041 event_strlcpy_
2 48 evutil_format_sockaddr_port_ call site: 00048 evutil_getaddrinfo
2 74 evutil_new_addrinfo_ call site: 00074 evutil_freeaddrinfo
2 92 evutil_getaddrinfo call site: 00092 test_for_getaddrinfo_hacks
1 7 evutil_parse_sockaddr_port call site: 00007 evutil_inet_pton
1 24 event_mm_strdup_ call site: 00024 __errno_location
1 59 test_for_getaddrinfo_hacks call site: 00059 parse_numeric_servname
1 61 parse_numeric_servname call site: 00061 evutil_getaddrinfo_common_
1 64 evutil_getaddrinfo_common_ call site: 00064 getprotobynumber

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
19
Reachable functions
47
Percentage of reachable functions covered
59.57%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/light/source_filesutils_fuzzer.cc 1
libevent/evutil.c 24
/usr/include/x86_64-linux-gnu/bits/byteswap.h 2
libevent/event.c 4
libevent/strlcpy.c 1

Fuzzer: inspector/light/source_filesevtag_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 171 71.5%
gold [1:9] 1 0.41%
yellow [10:29] 11 4.60%
greenyellow [30:49] 1 0.41%
lawngreen 50+ 55 23.0%
All colors 239 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
67 154 evbuffer_remove call site: 00154 evtag_unmarshal
28 124 evbuffer_free call site: 00124 evtag_unmarshal_string
10 42 event_del_nolock_ call site: 00042 event_queue_remove_timeout
10 58 event_del_nolock_ call site: 00058 event_errx
10 112 LLVMFuzzerTestOneInput call site: 00112 evtag_unmarshal
6 77 evbuffer_add call site: 00077 event_deferred_cb_schedule_
6 232 evbuffer_add_buffer call site: 00232 evtag_unmarshal
4 36 evbuffer_decref_and_unlock_ call site: 00036 event_deferred_cb_cancel_
4 84 event_callback_activate_nolock_ call site: 00084 evbuffer_run_callbacks
4 102 LLVMFuzzerTestOneInput call site: 00102 decode_tag_internal
3 89 LLVMFuzzerTestOneInput call site: 00089 decode_tag_internal
2 31 evbuffer_file_segment_free call site: 00031 evbuffer_chain_free

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
58
Reachable functions
108
Percentage of reachable functions covered
46.3%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/light/source_filesevtag_fuzzer.cc 1
libevent/buffer.c 31
libevent/event.c 26
libevent/log.c 6
libevent/evutil.c 2
libevent/minheap-internal.h 4
libevent/evmap.c 2
libevent/bufferevent.c 1
libevent/event_tagging.c 24

Fuzzer: inspector/source-codebuffer_add_file_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 50 44.2%
gold [1:9] 0 0.0%
yellow [10:29] 14 12.3%
greenyellow [30:49] 1 0.88%
lawngreen 50+ 48 42.4%
All colors 113 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
10 63 event_del_nolock_ call site: 00063 event_queue_remove_timeout
10 79 event_del_nolock_ call site: 00079 event_errx
6 94 evbuffer_add_file_segment call site: 00094 event_deferred_cb_schedule_
4 57 evbuffer_decref_and_unlock_ call site: 00057 event_deferred_cb_cancel_
4 101 event_callback_activate_nolock_ call site: 00101 evbuffer_run_callbacks
3 34 evbuffer_file_segment_materialize call site: 00034 event_mm_free_
2 18 evutil_fd_filesize call site: 00018 evbuffer_file_segment_materialize
2 48 evbuffer_file_segment_free call site: 00048 event_warn
2 52 evbuffer_file_segment_free call site: 00052 evbuffer_chain_free
2 90 event_debug_note_del_ call site: 00090 event_queue_remove_active
1 11 event_mm_calloc_ call site: 00011 __errno_location
1 16 evbuffer_file_segment_new call site: 00016 evutil_fd_filesize

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
44
Reachable functions
83
Percentage of reachable functions covered
46.99%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/source-codebuffer_add_file_fuzzer.cc 1
libevent/buffer.c 19
libevent/event.c 26
libevent/evutil.c 3
libevent/log.c 6
libevent/minheap-internal.h 4
libevent/evmap.c 2
libevent/bufferevent.c 1

Fuzzer: inspector/source-codeevtag_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 171 71.5%
gold [1:9] 1 0.41%
yellow [10:29] 11 4.60%
greenyellow [30:49] 1 0.41%
lawngreen 50+ 55 23.0%
All colors 239 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
67 154 evbuffer_remove call site: 00154 evtag_unmarshal
28 124 evbuffer_free call site: 00124 evtag_unmarshal_string
10 42 event_del_nolock_ call site: 00042 event_queue_remove_timeout
10 58 event_del_nolock_ call site: 00058 event_errx
10 112 LLVMFuzzerTestOneInput call site: 00112 evtag_unmarshal
6 77 evbuffer_add call site: 00077 event_deferred_cb_schedule_
6 232 evbuffer_add_buffer call site: 00232 evtag_unmarshal
4 36 evbuffer_decref_and_unlock_ call site: 00036 event_deferred_cb_cancel_
4 84 event_callback_activate_nolock_ call site: 00084 evbuffer_run_callbacks
4 102 LLVMFuzzerTestOneInput call site: 00102 decode_tag_internal
3 89 LLVMFuzzerTestOneInput call site: 00089 decode_tag_internal
2 31 evbuffer_file_segment_free call site: 00031 evbuffer_chain_free

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
58
Reachable functions
108
Percentage of reachable functions covered
46.3%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/source-codeevtag_fuzzer.cc 1
libevent/buffer.c 31
libevent/event.c 26
libevent/log.c 6
libevent/evutil.c 2
libevent/minheap-internal.h 4
libevent/evmap.c 2
libevent/bufferevent.c 1
libevent/event_tagging.c 24

Fuzzer: http_message_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 496 100.%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 0 0.0%
All colors 496 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
495 0 EP call site: 00000 evhttp_parse_firstline_

Runtime coverage analysis

Covered functions
0
Functions that are reachable but not covered
207
Reachable functions
207
Percentage of reachable functions covered
0.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
http_message_fuzzer.cc 1
libevent/http.c 60
libevent/event.c 37
libevent/log.c 6
libevent/evutil.c 10
libevent/buffer.c 47
libevent/minheap-internal.h 4
libevent/evmap.c 2
libevent/bufferevent.c 10
/usr/include/x86_64-linux-gnu/bits/byteswap.h 1
libevent/listener.c 2
libevent/bufferevent_ratelim.c 1
libevent/ws.c 1

Fuzzer: http_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 187 43.7%
gold [1:9] 6 1.40%
yellow [10:29] 8 1.87%
greenyellow [30:49] 1 0.23%
lawngreen 50+ 225 52.6%
All colors 427 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
62 363 LLVMFuzzerTestOneInput call site: 00363 evhttp_free
35 44 evbuffer_decref_and_unlock_ call site: 00044 event_deferred_cb_cancel_
11 85 evbuffer_add call site: 00085 event_deferred_cb_schedule_
10 31 evbuffer_free_all_chains call site: 00031 evbuffer_chain_free
10 132 evbuffer_readln call site: 00132 evbuffer_search
6 4 event_mm_calloc_ call site: 00004 event_warn
5 11 evutil_vsnprintf call site: 00011 evutil_snprintf
4 102 evhttp_request_new call site: 00102 evhttp_request_free
4 279 evhttp_add_header_internal call site: 00279 event_warn
4 340 evhttp_uri_join call site: 00340 evbuffer_add
3 335 evhttp_uri_join call site: 00335 evbuffer_add_printf
2 147 evbuffer_search_eol call site: 00147 evbuffer_strchr

Runtime coverage analysis

Covered functions
86
Functions that are reachable but not covered
102
Reachable functions
188
Percentage of reachable functions covered
45.74%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
http_fuzzer.cc 1
libevent/http.c 46
libevent/event.c 37
libevent/log.c 6
libevent/evutil.c 10
libevent/buffer.c 42
libevent/minheap-internal.h 4
libevent/evmap.c 2
libevent/bufferevent.c 10
/usr/include/x86_64-linux-gnu/bits/byteswap.h 1
libevent/listener.c 2
libevent/bufferevent_ratelim.c 1
libevent/ws.c 1

Fuzzer: inspector/source-codedns_message_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 355 71.4%
gold [1:9] 0 0.0%
yellow [10:29] 12 2.41%
greenyellow [30:49] 1 0.20%
lawngreen 50+ 129 25.9%
All colors 497 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
56 321 bufferevent_decref call site: 00321 server_port_ready_callback
50 391 event_add call site: 00391 evdns_server_request_respond
46 443 LLVMFuzzerTestOneInput call site: 00443 event_base_loop
22 201 event_add_nolock_ call site: 00201 common_timeout_schedule
15 136 event_base_priority_init call site: 00136 evthread_make_base_notifiable
13 169 event_assign call site: 00169 event_err
12 378 event_mm_strdup_ call site: 00378 event_add
11 152 evutil_make_internal_pipe_ call site: 00152 event_assign
11 234 event_config_free call site: 00234 evdns_add_server_port_with_base
10 52 event_del_nolock_ call site: 00052 event_queue_remove_timeout
10 68 event_del_nolock_ call site: 00068 event_errx
8 283 event_callback_activate_nolock_ call site: 00283 bufferevent_write

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
117
Reachable functions
220
Percentage of reachable functions covered
46.82%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/source-codedns_message_fuzzer.cc 2
libevent/event.c 77
libevent/log.c 9
libevent/evutil.c 11
libevent/evutil_time.c 3
libevent/minheap-internal.h 12
libevent/evmap.c 19
libevent/evdns.c 23
/usr/include/x86_64-linux-gnu/bits/byteswap.h 2
libevent/bufferevent.c 11
libevent/buffer.c 19
libevent/bufferevent_ratelim.c 1
libevent/listener.c 2
libevent/signal.c 1

Fuzzer: inspector/source-codehttp_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 150 35.1%
gold [1:9] 6 1.40%
yellow [10:29] 17 3.98%
greenyellow [30:49] 2 0.46%
lawngreen 50+ 252 59.0%
All colors 427 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
16 358 evhttp_uri_join call site: 00358 evhttp_free
14 411 bufferevent_decref call site: 00411 evhttp_free
10 50 event_del_nolock_ call site: 00050 event_queue_remove_timeout
10 66 event_del_nolock_ call site: 00066 event_errx
6 85 evbuffer_add call site: 00085 event_deferred_cb_schedule_
5 92 event_callback_activate_nolock_ call site: 00092 evhttp_request_new
4 44 evbuffer_decref_and_unlock_ call site: 00044 event_deferred_cb_cancel_
4 102 evhttp_request_new call site: 00102 evhttp_request_free
4 279 evhttp_add_header_internal call site: 00279 event_warn
4 340 evhttp_uri_join call site: 00340 evbuffer_add
4 404 bufferevent_finalize_cb_ call site: 00404 bufferevent_remove_from_rate_limit_group_internal_
3 136 find_eol_char call site: 00136 evbuffer_search

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
61
Reachable functions
188
Percentage of reachable functions covered
67.55%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/source-codehttp_fuzzer.cc 1
libevent/http.c 46
libevent/event.c 37
libevent/log.c 6
libevent/evutil.c 10
libevent/buffer.c 42
libevent/minheap-internal.h 4
libevent/evmap.c 2
libevent/bufferevent.c 10
/usr/include/x86_64-linux-gnu/bits/byteswap.h 1
libevent/listener.c 2
libevent/bufferevent_ratelim.c 1
libevent/ws.c 1

Fuzzer: utils_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 27 24.1%
gold [1:9] 11 9.82%
yellow [10:29] 5 4.46%
greenyellow [30:49] 16 14.2%
lawngreen 50+ 53 47.3%
All colors 112 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
6 100 evutil_getaddrinfo call site: 00100 apply_socktype_protocol_hack
4 95 evutil_getaddrinfo call site: 00095 apply_numeric_port_hack
2 21 evutil_inet_pton_scope call site: 00021 __errno_location
2 41 evutil_inet_ntop call site: 00041 event_strlcpy_
2 74 evutil_new_addrinfo_ call site: 00074 evutil_freeaddrinfo
2 92 evutil_getaddrinfo call site: 00092 test_for_getaddrinfo_hacks
1 7 evutil_parse_sockaddr_port call site: 00007 evutil_inet_pton
1 24 event_mm_strdup_ call site: 00024 __errno_location
1 48 evutil_format_sockaddr_port_ call site: 00048 evutil_snprintf
1 59 test_for_getaddrinfo_hacks call site: 00059 parse_numeric_servname
1 61 parse_numeric_servname call site: 00061 evutil_getaddrinfo_common_
1 64 evutil_getaddrinfo_common_ call site: 00064 getprotobynumber

Runtime coverage analysis

Covered functions
27
Functions that are reachable but not covered
20
Reachable functions
47
Percentage of reachable functions covered
57.45%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
utils_fuzzer.cc 1
libevent/evutil.c 24
/usr/include/x86_64-linux-gnu/bits/byteswap.h 2
libevent/event.c 4
libevent/strlcpy.c 1

Fuzzer: inspector/source-codebuffer_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 86 45.5%
gold [1:9] 1 0.52%
yellow [10:29] 11 5.82%
greenyellow [30:49] 1 0.52%
lawngreen 50+ 90 47.6%
All colors 189 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
11 166 LLVMFuzzerTestOneInput call site: 00166 evbuffer_add_buffer_reference
10 42 event_del_nolock_ call site: 00042 event_queue_remove_timeout
10 58 event_del_nolock_ call site: 00058 event_errx
7 155 LLVMFuzzerTestOneInput call site: 00155 evbuffer_free_all_chains
6 77 evbuffer_add call site: 00077 event_deferred_cb_schedule_
4 36 evbuffer_decref_and_unlock_ call site: 00036 event_deferred_cb_cancel_
4 84 event_callback_activate_nolock_ call site: 00084 evbuffer_run_callbacks
3 94 find_eol_char call site: 00094 evbuffer_search
3 119 LLVMFuzzerTestOneInput call site: 00119 evbuffer_add
2 3 event_mm_calloc_ call site: 00003 evbuffer_add
2 31 evbuffer_file_segment_free call site: 00031 evbuffer_chain_free
2 69 event_debug_note_del_ call site: 00069 event_queue_remove_active

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
42
Reachable functions
112
Percentage of reachable functions covered
62.5%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/source-codebuffer_fuzzer.cc 1
libevent/buffer.c 57
libevent/event.c 26
libevent/log.c 6
libevent/evutil.c 2
libevent/minheap-internal.h 4
libevent/evmap.c 2
libevent/bufferevent.c 1

Fuzzer: inspector/light/source_filesbuffer_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 86 45.5%
gold [1:9] 1 0.52%
yellow [10:29] 11 5.82%
greenyellow [30:49] 1 0.52%
lawngreen 50+ 90 47.6%
All colors 189 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
11 166 LLVMFuzzerTestOneInput call site: 00166 evbuffer_add_buffer_reference
10 42 event_del_nolock_ call site: 00042 event_queue_remove_timeout
10 58 event_del_nolock_ call site: 00058 event_errx
7 155 LLVMFuzzerTestOneInput call site: 00155 evbuffer_free_all_chains
6 77 evbuffer_add call site: 00077 event_deferred_cb_schedule_
4 36 evbuffer_decref_and_unlock_ call site: 00036 event_deferred_cb_cancel_
4 84 event_callback_activate_nolock_ call site: 00084 evbuffer_run_callbacks
3 94 find_eol_char call site: 00094 evbuffer_search
3 119 LLVMFuzzerTestOneInput call site: 00119 evbuffer_add
2 3 event_mm_calloc_ call site: 00003 evbuffer_add
2 31 evbuffer_file_segment_free call site: 00031 evbuffer_chain_free
2 69 event_debug_note_del_ call site: 00069 event_queue_remove_active

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
42
Reachable functions
112
Percentage of reachable functions covered
62.5%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/light/source_filesbuffer_fuzzer.cc 1
libevent/buffer.c 57
libevent/event.c 26
libevent/log.c 6
libevent/evutil.c 2
libevent/minheap-internal.h 4
libevent/evmap.c 2
libevent/bufferevent.c 1

Fuzzer: inspector/light/source_filesparse_query_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 24 18.8%
gold [1:9] 1 0.78%
yellow [10:29] 10 7.87%
greenyellow [30:49] 1 0.78%
lawngreen 50+ 91 71.6%
All colors 127 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
3 111 evhttp_add_header_internal call site: 00111 event_warn
2 8 evhttp_uri_parse_with_flags call site: 00008 __errno_location
2 38 parse_authority call site: 00038 event_mm_strdup_
2 71 evhttp_uri_parse_with_flags call site: 00071 event_warn
2 108 evhttp_add_header_internal call site: 00108 event_warn
2 122 evhttp_parse_query_impl call site: 00122 evhttp_parse_query_str_flags
1 0 EP call site: 00000 evhttp_parse_query
1 6 event_mm_calloc_ call site: 00006 __errno_location
1 11 event_mm_strdup_ call site: 00011 __errno_location
1 20 parse_authority call site: 00020 event_warn
1 36 parse_authority call site: 00036 event_warn
1 59 parse_authority call site: 00059 event_warn

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
14
Reachable functions
51
Percentage of reachable functions covered
72.55%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/light/source_filesparse_query_fuzzer.cc 1
libevent/http.c 20
libevent/event.c 4
libevent/evutil.c 9
libevent/log.c 4
/usr/include/x86_64-linux-gnu/bits/byteswap.h 1

Fuzzer: parse_query_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 34 26.7%
gold [1:9] 1 0.78%
yellow [10:29] 0 0.0%
greenyellow [30:49] 3 2.36%
lawngreen 50+ 89 70.0%
All colors 127 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
11 20 parse_authority call site: 00020 event_warn
3 111 evhttp_add_header_internal call site: 00111 event_warn
2 8 evhttp_uri_parse_with_flags call site: 00008 __errno_location
2 38 parse_authority call site: 00038 event_mm_strdup_
2 47 bracket_addr_ok call site: 00047 __isoc99_sscanf
2 71 evhttp_uri_parse_with_flags call site: 00071 event_warn
2 108 evhttp_add_header_internal call site: 00108 event_warn
1 6 event_mm_calloc_ call site: 00006 __errno_location
1 11 event_mm_strdup_ call site: 00011 __errno_location
1 36 parse_authority call site: 00036 event_warn
1 59 parse_authority call site: 00059 event_warn
1 63 end_of_path call site: 00063 strlen

Runtime coverage analysis

Covered functions
32
Functions that are reachable but not covered
19
Reachable functions
51
Percentage of reachable functions covered
62.75%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
parse_query_fuzzer.cc 1
libevent/http.c 20
libevent/event.c 4
libevent/evutil.c 9
libevent/log.c 4
/usr/include/x86_64-linux-gnu/bits/byteswap.h 1

Fuzzer: inspector/source-codedns_config_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 812 63.8%
gold [1:9] 12 0.94%
yellow [10:29] 13 1.02%
greenyellow [30:49] 8 0.62%
lawngreen 50+ 427 33.5%
All colors 1272 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
125 823 evutil_sockaddr_cmp call site: 00823 reply_parse
83 959 bufferevent_enable call site: 00959 evdns_getaddrinfo_gotresolve
46 386 evutil_ascii_strcasecmp call site: 00386 evdns_base_resolve_ipv4
40 721 evbuffer_remove call site: 00721 reply_parse
38 346 evutil_getaddrinfo call site: 00346 evutil_getaddrinfo_common_
36 786 evutil_sockaddr_is_loopback_ call site: 00786 nameserver_ready_callback
33 585 event_add call site: 00585 bufferevent_trigger_nolock_
23 620 bufferevent_socket_new call site: 00620 evbuffer_write_atmost
22 200 event_add_nolock_ call site: 00200 common_timeout_schedule
22 648 evbuffer_drain call site: 00648 bufferevent_decrement_write_buckets_
19 541 bufferevent_socket_new call site: 00541 evbuffer_read
17 567 evbuffer_free_all_chains call site: 00567 bufferevent_decrement_read_buckets_

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
257
Reachable functions
463
Percentage of reachable functions covered
44.49%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/source-codedns_config_fuzzer.cc 1
libevent/event.c 71
libevent/log.c 9
libevent/evutil.c 62
libevent/evutil_time.c 3
libevent/minheap-internal.h 11
libevent/evmap.c 19
libevent/evdns.c 106
libevent/evutil_rand.c 3
libevent/./arc4random.c 13
/usr/include/x86_64-linux-gnu/bits/byteswap.h 2
libevent/bufferevent.c 31
libevent/buffer.c 42
libevent/bufferevent_ratelim.c 15
libevent/bufferevent_sock.c 7
libevent/evthread-internal.h 1
libevent/bufferevent-internal.h 1
libevent/strlcpy.c 1

Fuzzer: dns_message_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 355 71.4%
gold [1:9] 0 0.0%
yellow [10:29] 12 2.41%
greenyellow [30:49] 1 0.20%
lawngreen 50+ 129 25.9%
All colors 497 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
56 321 bufferevent_decref call site: 00321 server_port_ready_callback
50 391 event_add call site: 00391 evdns_server_request_respond
46 443 LLVMFuzzerTestOneInput call site: 00443 event_base_loop
22 201 event_add_nolock_ call site: 00201 common_timeout_schedule
15 136 event_base_priority_init call site: 00136 evthread_make_base_notifiable
13 169 event_assign call site: 00169 event_err
12 378 event_mm_strdup_ call site: 00378 event_add
11 152 evutil_make_internal_pipe_ call site: 00152 event_assign
11 234 event_config_free call site: 00234 evdns_add_server_port_with_base
10 52 event_del_nolock_ call site: 00052 event_queue_remove_timeout
10 68 event_del_nolock_ call site: 00068 event_errx
8 283 event_callback_activate_nolock_ call site: 00283 bufferevent_write

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
117
Reachable functions
220
Percentage of reachable functions covered
46.82%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
dns_message_fuzzer.cc 2
libevent/event.c 77
libevent/log.c 9
libevent/evutil.c 11
libevent/evutil_time.c 3
libevent/minheap-internal.h 12
libevent/evmap.c 19
libevent/evdns.c 23
/usr/include/x86_64-linux-gnu/bits/byteswap.h 2
libevent/bufferevent.c 11
libevent/buffer.c 19
libevent/bufferevent_ratelim.c 1
libevent/listener.c 2
libevent/signal.c 1

Fuzzer: inspector/source-codeutils_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 29 25.8%
gold [1:9] 10 8.92%
yellow [10:29] 1 0.89%
greenyellow [30:49] 7 6.25%
lawngreen 50+ 65 58.0%
All colors 112 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
6 100 evutil_getaddrinfo call site: 00100 apply_socktype_protocol_hack
4 95 evutil_getaddrinfo call site: 00095 apply_numeric_port_hack
2 21 evutil_inet_pton_scope call site: 00021 __errno_location
2 41 evutil_inet_ntop call site: 00041 event_strlcpy_
2 48 evutil_format_sockaddr_port_ call site: 00048 evutil_getaddrinfo
2 74 evutil_new_addrinfo_ call site: 00074 evutil_freeaddrinfo
2 92 evutil_getaddrinfo call site: 00092 test_for_getaddrinfo_hacks
1 7 evutil_parse_sockaddr_port call site: 00007 evutil_inet_pton
1 24 event_mm_strdup_ call site: 00024 __errno_location
1 59 test_for_getaddrinfo_hacks call site: 00059 parse_numeric_servname
1 61 parse_numeric_servname call site: 00061 evutil_getaddrinfo_common_
1 64 evutil_getaddrinfo_common_ call site: 00064 getprotobynumber

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
19
Reachable functions
47
Percentage of reachable functions covered
59.57%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/source-codeutils_fuzzer.cc 1
libevent/evutil.c 24
/usr/include/x86_64-linux-gnu/bits/byteswap.h 2
libevent/event.c 4
libevent/strlcpy.c 1

Fuzzer: inspector/light/source_fileshttp_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 150 35.1%
gold [1:9] 6 1.40%
yellow [10:29] 17 3.98%
greenyellow [30:49] 2 0.46%
lawngreen 50+ 252 59.0%
All colors 427 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
16 358 evhttp_uri_join call site: 00358 evhttp_free
14 411 bufferevent_decref call site: 00411 evhttp_free
10 50 event_del_nolock_ call site: 00050 event_queue_remove_timeout
10 66 event_del_nolock_ call site: 00066 event_errx
6 85 evbuffer_add call site: 00085 event_deferred_cb_schedule_
5 92 event_callback_activate_nolock_ call site: 00092 evhttp_request_new
4 44 evbuffer_decref_and_unlock_ call site: 00044 event_deferred_cb_cancel_
4 102 evhttp_request_new call site: 00102 evhttp_request_free
4 279 evhttp_add_header_internal call site: 00279 event_warn
4 340 evhttp_uri_join call site: 00340 evbuffer_add
4 404 bufferevent_finalize_cb_ call site: 00404 bufferevent_remove_from_rate_limit_group_internal_
3 136 find_eol_char call site: 00136 evbuffer_search

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
61
Reachable functions
188
Percentage of reachable functions covered
67.55%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/light/source_fileshttp_fuzzer.cc 1
libevent/http.c 46
libevent/event.c 37
libevent/log.c 6
libevent/evutil.c 10
libevent/buffer.c 42
libevent/minheap-internal.h 4
libevent/evmap.c 2
libevent/bufferevent.c 10
/usr/include/x86_64-linux-gnu/bits/byteswap.h 1
libevent/listener.c 2
libevent/bufferevent_ratelim.c 1
libevent/ws.c 1

Fuzzer: inspector/source-codehttp_message_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 210 42.3%
gold [1:9] 6 1.20%
yellow [10:29] 17 3.42%
greenyellow [30:49] 2 0.40%
lawngreen 50+ 261 52.6%
All colors 496 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
48 328 evbuffer_add_buffer call site: 00328 evhttp_parse_firstline_
23 294 evhttp_request_get_host call site: 00294 evbuffer_add_buffer
16 427 evhttp_parse_query_impl call site: 00427 evhttp_free
14 480 bufferevent_decref call site: 00480 evhttp_free
10 70 event_del_nolock_ call site: 00070 event_queue_remove_timeout
10 86 event_del_nolock_ call site: 00086 event_errx
6 118 evbuffer_add call site: 00118 event_deferred_cb_schedule_
5 125 event_callback_activate_nolock_ call site: 00125 evhttp_parse_firstline_
4 27 evhttp_request_new call site: 00027 evhttp_request_free
4 64 evbuffer_decref_and_unlock_ call site: 00064 event_deferred_cb_cancel_
4 279 evhttp_add_header_internal call site: 00279 event_warn
4 473 bufferevent_finalize_cb_ call site: 00473 bufferevent_remove_from_rate_limit_group_internal_

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
73
Reachable functions
207
Percentage of reachable functions covered
64.73%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/source-codehttp_message_fuzzer.cc 1
libevent/http.c 60
libevent/event.c 37
libevent/log.c 6
libevent/evutil.c 10
libevent/buffer.c 47
libevent/minheap-internal.h 4
libevent/evmap.c 2
libevent/bufferevent.c 10
/usr/include/x86_64-linux-gnu/bits/byteswap.h 1
libevent/listener.c 2
libevent/bufferevent_ratelim.c 1
libevent/ws.c 1

Fuzzer: inspector/light/source_fileshttp_message_fuzzer.cc

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 210 42.3%
gold [1:9] 6 1.20%
yellow [10:29] 17 3.42%
greenyellow [30:49] 2 0.40%
lawngreen 50+ 261 52.6%
All colors 496 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
48 328 evbuffer_add_buffer call site: 00328 evhttp_parse_firstline_
23 294 evhttp_request_get_host call site: 00294 evbuffer_add_buffer
16 427 evhttp_parse_query_impl call site: 00427 evhttp_free
14 480 bufferevent_decref call site: 00480 evhttp_free
10 70 event_del_nolock_ call site: 00070 event_queue_remove_timeout
10 86 event_del_nolock_ call site: 00086 event_errx
6 118 evbuffer_add call site: 00118 event_deferred_cb_schedule_
5 125 event_callback_activate_nolock_ call site: 00125 evhttp_parse_firstline_
4 27 evhttp_request_new call site: 00027 evhttp_request_free
4 64 evbuffer_decref_and_unlock_ call site: 00064 event_deferred_cb_cancel_
4 279 evhttp_add_header_internal call site: 00279 event_warn
4 473 bufferevent_finalize_cb_ call site: 00473 bufferevent_remove_from_rate_limit_group_internal_

Runtime coverage analysis

Covered functions
327
Functions that are reachable but not covered
73
Reachable functions
207
Percentage of reachable functions covered
64.73%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
inspector/light/source_fileshttp_message_fuzzer.cc 1
libevent/http.c 60
libevent/event.c 37
libevent/log.c 6
libevent/evutil.c 10
libevent/buffer.c 47
libevent/minheap-internal.h 4
libevent/evmap.c 2
libevent/bufferevent.c 10
/usr/include/x86_64-linux-gnu/bits/byteswap.h 1
libevent/listener.c 2
libevent/bufferevent_ratelim.c 1
libevent/ws.c 1

Analyses and suggestions

Optimal target analysis

Remaining optimal interesting functions

The following table shows a list of functions that are optimal targets. Optimal targets are identified by finding the functions that in combination, yield a high code coverage.

Func name Functions filename Arg count Args Function depth hitcount instr count bb count cyclomatic complexity Reachable functions Incoming references total cyclomatic complexity Unreached complexity
evhttp_start /src/libevent/http.c 2 ['N/A', 'short'] 37 0 32 8 4 431 0 2681 649
evws_new_session /src/libevent/ws.c 4 ['N/A', 'N/A', 'N/A', 'int'] 30 0 138 28 12 371 0 2319 90
epoll_dispatch /src/libevent/epoll.c 2 ['N/A', 'N/A'] 7 0 319 71 28 29 0 136 77
event_reinit /src/libevent/event.c 1 ['N/A'] 8 0 240 51 19 104 0 550 65
evthread_set_lock_callbacks /src/libevent/evthread.c 1 ['N/A'] 6 0 157 37 16 24 0 95 48
event_base_dump_events /src/libevent/event.c 2 ['N/A', 'N/A'] 3 0 46 9 4 11 0 62 46
sigfd_add /src/libevent/signalfd.c 5 ['N/A', 'int', 'short', 'short', 'N/A'] 7 0 128 26 11 89 0 458 36
epoll_init /src/libevent/epoll.c 1 ['N/A'] 8 0 193 43 18 67 0 266 35

Implementing fuzzers that target the above functions will improve reachability such that it becomes:

Functions statically reachable by fuzzers
67.0%
761 / 1132
Cyclomatic complexity statically reachable by fuzzers
77.0%
5364 / 6965

All functions overview

If you implement fuzzers for these functions, the status of all functions in the project will be:

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

buffer_add_file_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['evbuffer_decref_and_unlock_', 'evbuffer_add_file_segment', 'evbuffer_file_segment_new', 'evbuffer_file_segment_materialize', 'evbuffer_file_segment_free', 'event_mm_calloc_']

evtag_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


bufferevent_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['LLVMFuzzerTestOneInput', 'bufferevent_socket_new', 'be_pair_wants_to_talk', 'event_callback_activate_nolock_', 'event_add_nolock_', 'event_add', 'event_base_priority_init', 'event_assign']

buffer_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['evbuffer_decref_and_unlock_', 'evbuffer_free_all_chains', 'evbuffer_add', 'evbuffer_search_range', 'LLVMFuzzerTestOneInput', 'evbuffer_search_eol', 'event_mm_calloc_']

dns_config_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['evutil_sockaddr_cmp', 'search_state_decref', 'evutil_inet_pton_scope', 'event_add', 'evutil_socket_', 'evdns_base_new', 'evutil_sockaddr_is_loopback_', 'event_add_nolock_', 'event_base_priority_init', 'event_assign']

inspector/light/source_filesdns_message_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['bufferevent_decref', 'event_add', 'LLVMFuzzerTestOneInput', 'event_add_nolock_', 'event_base_priority_init', 'event_assign', 'event_mm_strdup_', 'evutil_make_internal_pipe_', 'event_config_free', 'event_del_nolock_']

inspector/source-codebufferevent_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['event_get_priority', 'bufferevent_socket_new', 'evbuffer_remove', 'event_add_nolock_', 'evbuffer_drain', 'event_add', 'event_base_priority_init', 'event_assign', 'bufferevent_filter_new']

inspector/light/source_filesbuffer_add_file_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['event_del_nolock_', 'evbuffer_add_file_segment', 'evbuffer_decref_and_unlock_', 'event_callback_activate_nolock_', 'evbuffer_file_segment_materialize', 'evutil_fd_filesize', 'evbuffer_file_segment_free', 'event_debug_note_del_']

inspector/light/source_filesbufferevent_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['event_get_priority', 'bufferevent_socket_new', 'evbuffer_remove', 'event_add_nolock_', 'evbuffer_drain', 'event_add', 'event_base_priority_init', 'event_assign', 'bufferevent_filter_new']

inspector/source-codeparse_query_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['evhttp_add_header_internal', 'evhttp_uri_parse_with_flags', 'parse_authority', 'evhttp_parse_query_impl', 'event_mm_calloc_', 'event_mm_strdup_']

inspector/light/source_filesdns_config_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['evutil_sockaddr_cmp', 'bufferevent_enable', 'evutil_ascii_strcasecmp', 'evbuffer_remove', 'evutil_getaddrinfo', 'evutil_sockaddr_is_loopback_', 'event_add', 'bufferevent_socket_new', 'event_add_nolock_', 'evbuffer_drain']

inspector/light/source_filesutils_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['evutil_getaddrinfo', 'evutil_inet_pton_scope', 'evutil_inet_ntop', 'evutil_format_sockaddr_port_', 'evutil_new_addrinfo_', 'evutil_parse_sockaddr_port', 'event_mm_strdup_', 'test_for_getaddrinfo_hacks']

inspector/light/source_filesevtag_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['evbuffer_remove', 'evbuffer_free', 'event_del_nolock_', 'LLVMFuzzerTestOneInput', 'evbuffer_add', 'evbuffer_add_buffer', 'evbuffer_decref_and_unlock_', 'event_callback_activate_nolock_']

inspector/source-codebuffer_add_file_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['event_del_nolock_', 'evbuffer_add_file_segment', 'evbuffer_decref_and_unlock_', 'event_callback_activate_nolock_', 'evbuffer_file_segment_materialize', 'evutil_fd_filesize', 'evbuffer_file_segment_free', 'event_debug_note_del_']

inspector/source-codeevtag_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['evbuffer_remove', 'evbuffer_free', 'event_del_nolock_', 'LLVMFuzzerTestOneInput', 'evbuffer_add', 'evbuffer_add_buffer', 'evbuffer_decref_and_unlock_', 'event_callback_activate_nolock_']

http_message_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


http_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['LLVMFuzzerTestOneInput', 'evbuffer_decref_and_unlock_', 'evbuffer_add', 'evbuffer_free_all_chains', 'evbuffer_readln', 'event_mm_calloc_', 'evutil_vsnprintf', 'evhttp_request_new', 'evhttp_add_header_internal', 'evhttp_uri_join']

inspector/source-codedns_message_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['bufferevent_decref', 'event_add', 'LLVMFuzzerTestOneInput', 'event_add_nolock_', 'event_base_priority_init', 'event_assign', 'event_mm_strdup_', 'evutil_make_internal_pipe_', 'event_config_free', 'event_del_nolock_']

inspector/source-codehttp_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['evhttp_uri_join', 'bufferevent_decref', 'event_del_nolock_', 'evbuffer_add', 'event_callback_activate_nolock_', 'evbuffer_decref_and_unlock_', 'evhttp_request_new', 'evhttp_add_header_internal']

utils_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['evutil_getaddrinfo', 'evutil_inet_pton_scope', 'evutil_inet_ntop', 'evutil_new_addrinfo_', 'evutil_parse_sockaddr_port', 'event_mm_strdup_', 'evutil_format_sockaddr_port_', 'test_for_getaddrinfo_hacks']

inspector/source-codebuffer_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['LLVMFuzzerTestOneInput', 'event_del_nolock_', 'evbuffer_add', 'evbuffer_decref_and_unlock_', 'event_callback_activate_nolock_', 'find_eol_char', 'event_mm_calloc_']

inspector/light/source_filesbuffer_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['LLVMFuzzerTestOneInput', 'event_del_nolock_', 'evbuffer_add', 'evbuffer_decref_and_unlock_', 'event_callback_activate_nolock_', 'find_eol_char', 'event_mm_calloc_']

inspector/light/source_filesparse_query_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['evhttp_add_header_internal', 'evhttp_uri_parse_with_flags', 'parse_authority', 'evhttp_parse_query_impl', 'event_mm_calloc_', 'event_mm_strdup_']

parse_query_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['parse_authority', 'evhttp_add_header_internal', 'evhttp_uri_parse_with_flags', 'bracket_addr_ok', 'event_mm_calloc_', 'event_mm_strdup_']

inspector/source-codedns_config_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['evutil_sockaddr_cmp', 'bufferevent_enable', 'evutil_ascii_strcasecmp', 'evbuffer_remove', 'evutil_getaddrinfo', 'evutil_sockaddr_is_loopback_', 'event_add', 'bufferevent_socket_new', 'event_add_nolock_', 'evbuffer_drain']

dns_message_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['bufferevent_decref', 'event_add', 'LLVMFuzzerTestOneInput', 'event_add_nolock_', 'event_base_priority_init', 'event_assign', 'event_mm_strdup_', 'evutil_make_internal_pipe_', 'event_config_free', 'event_del_nolock_']

inspector/source-codeutils_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['evutil_getaddrinfo', 'evutil_inet_pton_scope', 'evutil_inet_ntop', 'evutil_format_sockaddr_port_', 'evutil_new_addrinfo_', 'evutil_parse_sockaddr_port', 'event_mm_strdup_', 'test_for_getaddrinfo_hacks']

inspector/light/source_fileshttp_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['evhttp_uri_join', 'bufferevent_decref', 'event_del_nolock_', 'evbuffer_add', 'event_callback_activate_nolock_', 'evbuffer_decref_and_unlock_', 'evhttp_request_new', 'evhttp_add_header_internal']

inspector/source-codehttp_message_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['evbuffer_add_buffer', 'evhttp_request_get_host', 'evhttp_parse_query_impl', 'bufferevent_decref', 'event_del_nolock_', 'evbuffer_add', 'event_callback_activate_nolock_', 'evhttp_request_new', 'evbuffer_decref_and_unlock_']

inspector/light/source_fileshttp_message_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['evbuffer_add_buffer', 'evhttp_request_get_host', 'evhttp_parse_query_impl', 'bufferevent_decref', 'event_del_nolock_', 'evbuffer_add', 'event_callback_activate_nolock_', 'evhttp_request_new', 'evbuffer_decref_and_unlock_']

Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
evbuffer_chain_free 42 23 54.76% ['/src/inspector/light/source_files/src/evtag_fuzzer.cc', '/src/inspector/source-code/src/http_message_fuzzer.cc', 'buffer_fuzzer', '/src/inspector/source-code/src/dns_config_fuzzer.cc', '/src/inspector/source-code/src/buffer_fuzzer.cc', 'bufferevent_fuzzer', 'evtag_fuzzer', '/src/inspector/source-code/src/buffer_add_file_fuzzer.cc', 'http_fuzzer', '/src/inspector/source-code/src/dns_message_fuzzer.cc', '/src/inspector/source-code/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/buffer_fuzzer.cc', '/src/inspector/light/source_files/src/http_fuzzer.cc', 'dns_config_fuzzer', '/src/inspector/source-code/src/evtag_fuzzer.cc', 'buffer_add_file_fuzzer', '/src/inspector/light/source_files/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/dns_message_fuzzer.cc', 'dns_message_fuzzer', '/src/inspector/light/source_files/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/http_fuzzer.cc', '/src/inspector/light/source_files/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/http_message_fuzzer.cc', '/src/inspector/light/source_files/src/bufferevent_fuzzer.cc', 'http_message_fuzzer', '/src/inspector/source-code/src/utils_fuzzer.cc', '/src/inspector/light/source_files/src/utils_fuzzer.cc', '/src/inspector/source-code/src/bufferevent_fuzzer.cc']
ev_token_bucket_cfg_new 34 10 29.41% ['/src/inspector/light/source_files/src/evtag_fuzzer.cc', '/src/inspector/source-code/src/http_message_fuzzer.cc', '/src/inspector/source-code/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/utils_fuzzer.cc', '/src/inspector/source-code/src/buffer_fuzzer.cc', 'bufferevent_fuzzer', '/src/inspector/source-code/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/dns_message_fuzzer.cc', '/src/inspector/source-code/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/http_fuzzer.cc', '/src/inspector/source-code/src/evtag_fuzzer.cc', '/src/inspector/light/source_files/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/dns_message_fuzzer.cc', 'dns_message_fuzzer', '/src/inspector/light/source_files/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/http_fuzzer.cc', '/src/inspector/light/source_files/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/http_message_fuzzer.cc', '/src/inspector/light/source_files/src/bufferevent_fuzzer.cc', '/src/inspector/source-code/src/utils_fuzzer.cc', '/src/inspector/light/source_files/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/bufferevent_fuzzer.cc']
bufferevent_set_rate_limit 61 15 24.59% ['/src/inspector/light/source_files/src/evtag_fuzzer.cc', '/src/inspector/source-code/src/http_message_fuzzer.cc', '/src/inspector/source-code/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/utils_fuzzer.cc', '/src/inspector/source-code/src/buffer_fuzzer.cc', 'bufferevent_fuzzer', '/src/inspector/source-code/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/dns_message_fuzzer.cc', '/src/inspector/source-code/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/http_fuzzer.cc', '/src/inspector/source-code/src/evtag_fuzzer.cc', '/src/inspector/light/source_files/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/dns_message_fuzzer.cc', 'dns_message_fuzzer', '/src/inspector/light/source_files/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/http_fuzzer.cc', '/src/inspector/light/source_files/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/http_message_fuzzer.cc', '/src/inspector/light/source_files/src/bufferevent_fuzzer.cc', '/src/inspector/source-code/src/utils_fuzzer.cc', '/src/inspector/light/source_files/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/bufferevent_fuzzer.cc']
epoll_init 65 27 41.53% ['/src/inspector/light/source_files/src/evtag_fuzzer.cc', '/src/inspector/source-code/src/http_message_fuzzer.cc', '/src/inspector/source-code/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/utils_fuzzer.cc', '/src/inspector/source-code/src/buffer_fuzzer.cc', 'bufferevent_fuzzer', '/src/inspector/source-code/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/dns_message_fuzzer.cc', '/src/inspector/source-code/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/http_fuzzer.cc', 'dns_config_fuzzer', '/src/inspector/source-code/src/evtag_fuzzer.cc', '/src/inspector/light/source_files/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/dns_message_fuzzer.cc', 'dns_message_fuzzer', '/src/inspector/light/source_files/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/http_fuzzer.cc', '/src/inspector/light/source_files/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/http_message_fuzzer.cc', '/src/inspector/light/source_files/src/bufferevent_fuzzer.cc', '/src/inspector/source-code/src/utils_fuzzer.cc', '/src/inspector/light/source_files/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/bufferevent_fuzzer.cc']
event_add_nolock_ 102 37 36.27% ['/src/inspector/light/source_files/src/evtag_fuzzer.cc', '/src/inspector/source-code/src/http_message_fuzzer.cc', '/src/inspector/source-code/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/utils_fuzzer.cc', '/src/inspector/source-code/src/buffer_fuzzer.cc', 'bufferevent_fuzzer', '/src/inspector/source-code/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/dns_message_fuzzer.cc', '/src/inspector/source-code/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/http_fuzzer.cc', 'dns_config_fuzzer', '/src/inspector/source-code/src/evtag_fuzzer.cc', '/src/inspector/light/source_files/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/dns_message_fuzzer.cc', 'dns_message_fuzzer', '/src/inspector/light/source_files/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/http_fuzzer.cc', '/src/inspector/light/source_files/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/http_message_fuzzer.cc', '/src/inspector/light/source_files/src/bufferevent_fuzzer.cc', '/src/inspector/source-code/src/utils_fuzzer.cc', '/src/inspector/light/source_files/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/bufferevent_fuzzer.cc']
event_base_free_ 82 42 51.21% ['/src/inspector/light/source_files/src/evtag_fuzzer.cc', '/src/inspector/source-code/src/http_message_fuzzer.cc', '/src/inspector/source-code/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/utils_fuzzer.cc', '/src/inspector/source-code/src/buffer_fuzzer.cc', 'bufferevent_fuzzer', '/src/inspector/source-code/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/dns_message_fuzzer.cc', '/src/inspector/source-code/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/http_fuzzer.cc', 'dns_config_fuzzer', '/src/inspector/source-code/src/evtag_fuzzer.cc', '/src/inspector/light/source_files/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/dns_message_fuzzer.cc', 'dns_message_fuzzer', '/src/inspector/light/source_files/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/http_fuzzer.cc', '/src/inspector/light/source_files/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/http_message_fuzzer.cc', '/src/inspector/light/source_files/src/bufferevent_fuzzer.cc', '/src/inspector/source-code/src/utils_fuzzer.cc', '/src/inspector/light/source_files/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/bufferevent_fuzzer.cc']
event_base_cancel_single_callback_ 33 18 54.54% ['/src/inspector/light/source_files/src/evtag_fuzzer.cc', '/src/inspector/source-code/src/http_message_fuzzer.cc', '/src/inspector/source-code/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/utils_fuzzer.cc', '/src/inspector/source-code/src/buffer_fuzzer.cc', 'bufferevent_fuzzer', '/src/inspector/source-code/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/dns_message_fuzzer.cc', '/src/inspector/source-code/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/http_fuzzer.cc', 'dns_config_fuzzer', '/src/inspector/source-code/src/evtag_fuzzer.cc', '/src/inspector/light/source_files/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/dns_message_fuzzer.cc', 'dns_message_fuzzer', '/src/inspector/light/source_files/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/http_fuzzer.cc', '/src/inspector/light/source_files/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/http_message_fuzzer.cc', '/src/inspector/light/source_files/src/bufferevent_fuzzer.cc', '/src/inspector/source-code/src/utils_fuzzer.cc', '/src/inspector/light/source_files/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/bufferevent_fuzzer.cc']
evbuffer_commit_space 54 24 44.44% ['/src/inspector/light/source_files/src/evtag_fuzzer.cc', '/src/inspector/source-code/src/http_message_fuzzer.cc', 'buffer_fuzzer', '/src/inspector/source-code/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/utils_fuzzer.cc', '/src/inspector/source-code/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/dns_message_fuzzer.cc', '/src/inspector/source-code/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/http_fuzzer.cc', '/src/inspector/source-code/src/evtag_fuzzer.cc', '/src/inspector/light/source_files/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/dns_message_fuzzer.cc', 'dns_message_fuzzer', '/src/inspector/light/source_files/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/http_fuzzer.cc', '/src/inspector/light/source_files/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/http_message_fuzzer.cc', '/src/inspector/light/source_files/src/bufferevent_fuzzer.cc', '/src/inspector/source-code/src/utils_fuzzer.cc', '/src/inspector/light/source_files/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/bufferevent_fuzzer.cc']
evbuffer_prepend_buffer 32 12 37.5% ['/src/inspector/light/source_files/src/evtag_fuzzer.cc', '/src/inspector/source-code/src/http_message_fuzzer.cc', 'buffer_fuzzer', '/src/inspector/source-code/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/utils_fuzzer.cc', '/src/inspector/source-code/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/dns_message_fuzzer.cc', '/src/inspector/source-code/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/http_fuzzer.cc', '/src/inspector/source-code/src/evtag_fuzzer.cc', '/src/inspector/light/source_files/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/dns_message_fuzzer.cc', 'dns_message_fuzzer', '/src/inspector/light/source_files/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/http_fuzzer.cc', '/src/inspector/light/source_files/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/http_message_fuzzer.cc', '/src/inspector/light/source_files/src/bufferevent_fuzzer.cc', '/src/inspector/source-code/src/utils_fuzzer.cc', '/src/inspector/light/source_files/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/bufferevent_fuzzer.cc']
PRESERVE_PINNED 32 7 21.87% ['/src/inspector/light/source_files/src/evtag_fuzzer.cc', '/src/inspector/source-code/src/http_message_fuzzer.cc', 'buffer_fuzzer', '/src/inspector/source-code/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/utils_fuzzer.cc', '/src/inspector/source-code/src/buffer_fuzzer.cc', 'bufferevent_fuzzer', 'evtag_fuzzer', '/src/inspector/source-code/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/dns_message_fuzzer.cc', '/src/inspector/source-code/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/http_fuzzer.cc', '/src/inspector/source-code/src/evtag_fuzzer.cc', '/src/inspector/light/source_files/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/dns_message_fuzzer.cc', 'dns_message_fuzzer', '/src/inspector/light/source_files/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/http_fuzzer.cc', '/src/inspector/light/source_files/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/http_message_fuzzer.cc', '/src/inspector/light/source_files/src/bufferevent_fuzzer.cc', 'http_message_fuzzer', '/src/inspector/source-code/src/utils_fuzzer.cc', '/src/inspector/light/source_files/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/bufferevent_fuzzer.cc']
epoll_apply_one_change 65 28 43.07% ['/src/inspector/light/source_files/src/evtag_fuzzer.cc', '/src/inspector/source-code/src/http_message_fuzzer.cc', '/src/inspector/source-code/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/utils_fuzzer.cc', '/src/inspector/source-code/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/dns_message_fuzzer.cc', '/src/inspector/source-code/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/http_fuzzer.cc', 'dns_config_fuzzer', '/src/inspector/source-code/src/evtag_fuzzer.cc', '/src/inspector/light/source_files/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/dns_message_fuzzer.cc', 'dns_message_fuzzer', '/src/inspector/light/source_files/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/http_fuzzer.cc', '/src/inspector/light/source_files/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/http_message_fuzzer.cc', '/src/inspector/light/source_files/src/bufferevent_fuzzer.cc', '/src/inspector/source-code/src/utils_fuzzer.cc', '/src/inspector/light/source_files/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/bufferevent_fuzzer.cc']
evutil_getaddrinfo 35 19 54.28% ['/src/inspector/light/source_files/src/evtag_fuzzer.cc', '/src/inspector/source-code/src/http_message_fuzzer.cc', '/src/inspector/source-code/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/utils_fuzzer.cc', '/src/inspector/source-code/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/buffer_add_file_fuzzer.cc', 'utils_fuzzer', '/src/inspector/source-code/src/dns_message_fuzzer.cc', '/src/inspector/source-code/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/http_fuzzer.cc', 'dns_config_fuzzer', '/src/inspector/source-code/src/evtag_fuzzer.cc', '/src/inspector/light/source_files/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/dns_message_fuzzer.cc', 'dns_message_fuzzer', '/src/inspector/light/source_files/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/http_fuzzer.cc', '/src/inspector/light/source_files/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/http_message_fuzzer.cc', '/src/inspector/light/source_files/src/bufferevent_fuzzer.cc', '/src/inspector/source-code/src/utils_fuzzer.cc', '/src/inspector/light/source_files/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/bufferevent_fuzzer.cc']
evhttp_free 36 16 44.44% ['/src/inspector/light/source_files/src/evtag_fuzzer.cc', '/src/inspector/source-code/src/http_message_fuzzer.cc', '/src/inspector/source-code/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/utils_fuzzer.cc', '/src/inspector/source-code/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/buffer_add_file_fuzzer.cc', 'http_fuzzer', '/src/inspector/source-code/src/dns_message_fuzzer.cc', '/src/inspector/source-code/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/http_fuzzer.cc', '/src/inspector/source-code/src/evtag_fuzzer.cc', '/src/inspector/light/source_files/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/dns_message_fuzzer.cc', 'dns_message_fuzzer', '/src/inspector/light/source_files/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/http_fuzzer.cc', '/src/inspector/light/source_files/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/http_message_fuzzer.cc', '/src/inspector/light/source_files/src/bufferevent_fuzzer.cc', 'http_message_fuzzer', '/src/inspector/source-code/src/utils_fuzzer.cc', '/src/inspector/light/source_files/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/bufferevent_fuzzer.cc']
evhttp_request_new 36 18 50.0% ['/src/inspector/light/source_files/src/evtag_fuzzer.cc', '/src/inspector/source-code/src/http_message_fuzzer.cc', '/src/inspector/source-code/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/utils_fuzzer.cc', '/src/inspector/source-code/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/buffer_add_file_fuzzer.cc', 'http_fuzzer', '/src/inspector/source-code/src/dns_message_fuzzer.cc', '/src/inspector/source-code/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/http_fuzzer.cc', '/src/inspector/source-code/src/evtag_fuzzer.cc', '/src/inspector/light/source_files/src/parse_query_fuzzer.cc', '/src/inspector/light/source_files/src/dns_message_fuzzer.cc', 'dns_message_fuzzer', '/src/inspector/light/source_files/src/buffer_add_file_fuzzer.cc', '/src/inspector/source-code/src/http_fuzzer.cc', '/src/inspector/light/source_files/src/dns_config_fuzzer.cc', '/src/inspector/light/source_files/src/http_message_fuzzer.cc', '/src/inspector/light/source_files/src/bufferevent_fuzzer.cc', 'http_message_fuzzer', '/src/inspector/source-code/src/utils_fuzzer.cc', '/src/inspector/light/source_files/src/buffer_fuzzer.cc', '/src/inspector/source-code/src/bufferevent_fuzzer.cc']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
/src/inspector/light/source_files/src/evtag_fuzzer.cc ['inspector/light/source_filesevtag_fuzzer.cc'] ['inspector/light/source_filesevtag_fuzzer.cc']
/src/buffer_fuzzer.cc ['buffer_fuzzer'] ['buffer_fuzzer']
/src/inspector/source-code/src/http_message_fuzzer.cc ['inspector/source-codehttp_message_fuzzer.cc'] ['inspector/source-codehttp_message_fuzzer.cc']
/src/bufferevent_fuzzer.cc ['bufferevent_fuzzer'] ['bufferevent_fuzzer']
/src/libevent/event_tagging.c ['evtag_fuzzer', 'inspector/light/source_filesevtag_fuzzer.cc', 'inspector/source-codeevtag_fuzzer.cc'] []
/src/libevent/buffer.c ['buffer_add_file_fuzzer', 'evtag_fuzzer', 'bufferevent_fuzzer', 'buffer_fuzzer', 'dns_config_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbuffer_add_file_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/light/source_filesevtag_fuzzer.cc', 'inspector/source-codebuffer_add_file_fuzzer.cc', 'inspector/source-codeevtag_fuzzer.cc', 'http_message_fuzzer', 'http_fuzzer', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codehttp_fuzzer.cc', 'inspector/source-codebuffer_fuzzer.cc', 'inspector/light/source_filesbuffer_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc'] ['buffer_add_file_fuzzer', 'bufferevent_fuzzer', 'buffer_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbuffer_add_file_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/light/source_filesevtag_fuzzer.cc', 'inspector/source-codebuffer_add_file_fuzzer.cc', 'inspector/source-codeevtag_fuzzer.cc', 'http_fuzzer', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codehttp_fuzzer.cc', 'inspector/source-codebuffer_fuzzer.cc', 'inspector/light/source_filesbuffer_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc']
/src/libevent/./arc4random.c ['dns_config_fuzzer', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc'] []
/src/libevent/bufferevent-internal.h ['bufferevent_fuzzer', 'dns_config_fuzzer', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc'] []
/usr/include/x86_64-linux-gnu/bits/byteswap.h ['dns_config_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codeparse_query_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/light/source_filesutils_fuzzer.cc', 'http_message_fuzzer', 'http_fuzzer', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codehttp_fuzzer.cc', 'utils_fuzzer', 'inspector/light/source_filesparse_query_fuzzer.cc', 'parse_query_fuzzer', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer', 'inspector/source-codeutils_fuzzer.cc', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc'] []
/src/libevent/strlcpy.c ['dns_config_fuzzer', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/light/source_filesutils_fuzzer.cc', 'utils_fuzzer', 'inspector/source-codedns_config_fuzzer.cc', 'inspector/source-codeutils_fuzzer.cc'] ['dns_config_fuzzer', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/light/source_filesutils_fuzzer.cc', 'utils_fuzzer', 'inspector/source-codedns_config_fuzzer.cc', 'inspector/source-codeutils_fuzzer.cc']
/src/libevent/minheap-internal.h ['buffer_add_file_fuzzer', 'evtag_fuzzer', 'bufferevent_fuzzer', 'buffer_fuzzer', 'dns_config_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbuffer_add_file_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/light/source_filesevtag_fuzzer.cc', 'inspector/source-codebuffer_add_file_fuzzer.cc', 'inspector/source-codeevtag_fuzzer.cc', 'http_message_fuzzer', 'http_fuzzer', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codehttp_fuzzer.cc', 'inspector/source-codebuffer_fuzzer.cc', 'inspector/light/source_filesbuffer_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc'] ['bufferevent_fuzzer', 'dns_config_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbuffer_add_file_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/light/source_filesevtag_fuzzer.cc', 'inspector/source-codebuffer_add_file_fuzzer.cc', 'inspector/source-codeevtag_fuzzer.cc', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codehttp_fuzzer.cc', 'inspector/source-codebuffer_fuzzer.cc', 'inspector/light/source_filesbuffer_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc']
/src/inspector/source-code/src/dns_config_fuzzer.cc ['inspector/source-codedns_config_fuzzer.cc'] ['inspector/source-codedns_config_fuzzer.cc']
/src/libevent/epoll.c [] []
/src/inspector/source-code/src/buffer_fuzzer.cc ['inspector/source-codebuffer_fuzzer.cc'] ['inspector/source-codebuffer_fuzzer.cc']
/src/libevent/bufferevent.c ['buffer_add_file_fuzzer', 'evtag_fuzzer', 'bufferevent_fuzzer', 'buffer_fuzzer', 'dns_config_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbuffer_add_file_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/light/source_filesevtag_fuzzer.cc', 'inspector/source-codebuffer_add_file_fuzzer.cc', 'inspector/source-codeevtag_fuzzer.cc', 'http_message_fuzzer', 'http_fuzzer', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codehttp_fuzzer.cc', 'inspector/source-codebuffer_fuzzer.cc', 'inspector/light/source_filesbuffer_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc'] ['bufferevent_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbuffer_add_file_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/light/source_filesevtag_fuzzer.cc', 'inspector/source-codebuffer_add_file_fuzzer.cc', 'inspector/source-codeevtag_fuzzer.cc', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codehttp_fuzzer.cc', 'inspector/source-codebuffer_fuzzer.cc', 'inspector/light/source_filesbuffer_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc']
/src/parse_query_fuzzer.cc ['parse_query_fuzzer'] ['parse_query_fuzzer']
/src/libevent/event.c ['buffer_add_file_fuzzer', 'evtag_fuzzer', 'bufferevent_fuzzer', 'buffer_fuzzer', 'dns_config_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbuffer_add_file_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/source-codeparse_query_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/light/source_filesutils_fuzzer.cc', 'inspector/light/source_filesevtag_fuzzer.cc', 'inspector/source-codebuffer_add_file_fuzzer.cc', 'inspector/source-codeevtag_fuzzer.cc', 'http_message_fuzzer', 'http_fuzzer', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codehttp_fuzzer.cc', 'utils_fuzzer', 'inspector/source-codebuffer_fuzzer.cc', 'inspector/light/source_filesbuffer_fuzzer.cc', 'inspector/light/source_filesparse_query_fuzzer.cc', 'parse_query_fuzzer', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer', 'inspector/source-codeutils_fuzzer.cc', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc'] ['buffer_add_file_fuzzer', 'bufferevent_fuzzer', 'buffer_fuzzer', 'dns_config_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbuffer_add_file_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/source-codeparse_query_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/light/source_filesutils_fuzzer.cc', 'inspector/light/source_filesevtag_fuzzer.cc', 'inspector/source-codebuffer_add_file_fuzzer.cc', 'inspector/source-codeevtag_fuzzer.cc', 'http_fuzzer', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codehttp_fuzzer.cc', 'utils_fuzzer', 'inspector/source-codebuffer_fuzzer.cc', 'inspector/light/source_filesbuffer_fuzzer.cc', 'inspector/light/source_filesparse_query_fuzzer.cc', 'parse_query_fuzzer', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer', 'inspector/source-codeutils_fuzzer.cc', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc']
/src/libevent/evthread-internal.h ['bufferevent_fuzzer', 'dns_config_fuzzer', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc'] []
/src/libevent/evmap.c ['buffer_add_file_fuzzer', 'evtag_fuzzer', 'bufferevent_fuzzer', 'buffer_fuzzer', 'dns_config_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbuffer_add_file_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/light/source_filesevtag_fuzzer.cc', 'inspector/source-codebuffer_add_file_fuzzer.cc', 'inspector/source-codeevtag_fuzzer.cc', 'http_message_fuzzer', 'http_fuzzer', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codehttp_fuzzer.cc', 'inspector/source-codebuffer_fuzzer.cc', 'inspector/light/source_filesbuffer_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc'] ['bufferevent_fuzzer', 'dns_config_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbuffer_add_file_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/light/source_filesevtag_fuzzer.cc', 'inspector/source-codebuffer_add_file_fuzzer.cc', 'inspector/source-codeevtag_fuzzer.cc', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codehttp_fuzzer.cc', 'inspector/source-codebuffer_fuzzer.cc', 'inspector/light/source_filesbuffer_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc']
/src/inspector/source-code/src/buffer_add_file_fuzzer.cc ['inspector/source-codebuffer_add_file_fuzzer.cc'] ['inspector/source-codebuffer_add_file_fuzzer.cc']
/src/libevent/bufferevent_ratelim.c ['bufferevent_fuzzer', 'dns_config_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'http_message_fuzzer', 'http_fuzzer', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codehttp_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc'] ['bufferevent_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codehttp_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc']
/src/http_fuzzer.cc ['http_fuzzer'] ['http_fuzzer']
/src/libevent/bufferevent_pair.c ['bufferevent_fuzzer', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc'] ['bufferevent_fuzzer', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc']
/src/inspector/source-code/src/dns_message_fuzzer.cc ['inspector/source-codedns_message_fuzzer.cc'] ['inspector/source-codedns_message_fuzzer.cc']
/src/http_message_fuzzer.cc ['http_message_fuzzer'] []
/src/buffer_add_file_fuzzer.cc ['buffer_add_file_fuzzer'] ['buffer_add_file_fuzzer']
/src/evtag_fuzzer.cc ['evtag_fuzzer'] []
/src/inspector/source-code/src/parse_query_fuzzer.cc ['inspector/source-codeparse_query_fuzzer.cc'] ['inspector/source-codeparse_query_fuzzer.cc']
/src/inspector/light/source_files/src/buffer_fuzzer.cc ['inspector/light/source_filesbuffer_fuzzer.cc'] ['inspector/light/source_filesbuffer_fuzzer.cc']
/src/libevent/poll.c [] []
/src/libevent/select.c [] []
/src/inspector/light/source_files/src/http_fuzzer.cc ['inspector/light/source_fileshttp_fuzzer.cc'] ['inspector/light/source_fileshttp_fuzzer.cc']
/src/libevent/bufferevent_sock.c ['bufferevent_fuzzer', 'dns_config_fuzzer', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc'] ['bufferevent_fuzzer', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc']
/src/libevent/signalfd.c [] []
/src/libevent/http.c ['inspector/source-codeparse_query_fuzzer.cc', 'http_message_fuzzer', 'http_fuzzer', 'inspector/source-codehttp_fuzzer.cc', 'inspector/light/source_filesparse_query_fuzzer.cc', 'parse_query_fuzzer', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc'] ['inspector/source-codeparse_query_fuzzer.cc', 'http_fuzzer', 'inspector/source-codehttp_fuzzer.cc', 'inspector/light/source_filesparse_query_fuzzer.cc', 'parse_query_fuzzer', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc']
/src/dns_message_fuzzer.cc ['dns_message_fuzzer'] ['dns_message_fuzzer']
/src/inspector/source-code/src/evtag_fuzzer.cc ['inspector/source-codeevtag_fuzzer.cc'] ['inspector/source-codeevtag_fuzzer.cc']
/src/libevent/signal.c ['inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codedns_message_fuzzer.cc', 'dns_message_fuzzer'] ['inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codedns_message_fuzzer.cc', 'dns_message_fuzzer']
/src/dns_config_fuzzer.cc ['dns_config_fuzzer'] ['dns_config_fuzzer']
/src/utils_fuzzer.cc ['utils_fuzzer'] ['utils_fuzzer']
/src/inspector/light/source_files/src/parse_query_fuzzer.cc ['inspector/light/source_filesparse_query_fuzzer.cc'] ['inspector/light/source_filesparse_query_fuzzer.cc']
/src/libevent/log.c ['buffer_add_file_fuzzer', 'evtag_fuzzer', 'bufferevent_fuzzer', 'buffer_fuzzer', 'dns_config_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbuffer_add_file_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/source-codeparse_query_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/light/source_filesevtag_fuzzer.cc', 'inspector/source-codebuffer_add_file_fuzzer.cc', 'inspector/source-codeevtag_fuzzer.cc', 'http_message_fuzzer', 'http_fuzzer', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codehttp_fuzzer.cc', 'inspector/source-codebuffer_fuzzer.cc', 'inspector/light/source_filesbuffer_fuzzer.cc', 'inspector/light/source_filesparse_query_fuzzer.cc', 'parse_query_fuzzer', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc'] ['buffer_add_file_fuzzer', 'bufferevent_fuzzer', 'dns_config_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbuffer_add_file_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/source-codeparse_query_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/light/source_filesevtag_fuzzer.cc', 'inspector/source-codebuffer_add_file_fuzzer.cc', 'inspector/source-codeevtag_fuzzer.cc', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codehttp_fuzzer.cc', 'inspector/source-codebuffer_fuzzer.cc', 'inspector/light/source_filesbuffer_fuzzer.cc', 'inspector/light/source_filesparse_query_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc']
/src/libevent/evdns.c ['dns_config_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer'] ['dns_config_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer']
/src/inspector/light/source_files/src/dns_message_fuzzer.cc ['inspector/light/source_filesdns_message_fuzzer.cc'] ['inspector/light/source_filesdns_message_fuzzer.cc']
/src/libevent/sha1.c [] []
/src/libevent/evutil_time.c ['bufferevent_fuzzer', 'dns_config_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer'] ['bufferevent_fuzzer', 'dns_config_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer']
/src/libevent/evutil_rand.c ['dns_config_fuzzer', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc'] ['dns_config_fuzzer', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/source-codedns_config_fuzzer.cc']
/src/inspector/light/source_files/src/buffer_add_file_fuzzer.cc ['inspector/light/source_filesbuffer_add_file_fuzzer.cc'] ['inspector/light/source_filesbuffer_add_file_fuzzer.cc']
/src/libevent/ws.c ['http_message_fuzzer', 'http_fuzzer', 'inspector/source-codehttp_fuzzer.cc', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc'] []
/src/inspector/light/source_files/src/dns_config_fuzzer.cc ['inspector/light/source_filesdns_config_fuzzer.cc'] ['inspector/light/source_filesdns_config_fuzzer.cc']
/src/inspector/source-code/src/http_fuzzer.cc ['inspector/source-codehttp_fuzzer.cc'] ['inspector/source-codehttp_fuzzer.cc']
/src/inspector/light/source_files/src/bufferevent_fuzzer.cc ['inspector/light/source_filesbufferevent_fuzzer.cc'] ['inspector/light/source_filesbufferevent_fuzzer.cc']
/src/libevent/evutil.c ['buffer_add_file_fuzzer', 'evtag_fuzzer', 'bufferevent_fuzzer', 'buffer_fuzzer', 'dns_config_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbuffer_add_file_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/source-codeparse_query_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/light/source_filesutils_fuzzer.cc', 'inspector/light/source_filesevtag_fuzzer.cc', 'inspector/source-codebuffer_add_file_fuzzer.cc', 'inspector/source-codeevtag_fuzzer.cc', 'http_message_fuzzer', 'http_fuzzer', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codehttp_fuzzer.cc', 'utils_fuzzer', 'inspector/source-codebuffer_fuzzer.cc', 'inspector/light/source_filesbuffer_fuzzer.cc', 'inspector/light/source_filesparse_query_fuzzer.cc', 'parse_query_fuzzer', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer', 'inspector/source-codeutils_fuzzer.cc', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc'] ['buffer_add_file_fuzzer', 'bufferevent_fuzzer', 'dns_config_fuzzer', 'inspector/light/source_filesdns_message_fuzzer.cc', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbuffer_add_file_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc', 'inspector/source-codeparse_query_fuzzer.cc', 'inspector/light/source_filesdns_config_fuzzer.cc', 'inspector/light/source_filesutils_fuzzer.cc', 'inspector/light/source_filesevtag_fuzzer.cc', 'inspector/source-codebuffer_add_file_fuzzer.cc', 'inspector/source-codeevtag_fuzzer.cc', 'http_fuzzer', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codehttp_fuzzer.cc', 'utils_fuzzer', 'inspector/source-codebuffer_fuzzer.cc', 'inspector/light/source_filesbuffer_fuzzer.cc', 'inspector/light/source_filesparse_query_fuzzer.cc', 'parse_query_fuzzer', 'inspector/source-codedns_config_fuzzer.cc', 'dns_message_fuzzer', 'inspector/source-codeutils_fuzzer.cc', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc']
/src/inspector/light/source_files/src/http_message_fuzzer.cc ['inspector/light/source_fileshttp_message_fuzzer.cc'] ['inspector/light/source_fileshttp_message_fuzzer.cc']
/src/libevent/listener.c ['inspector/light/source_filesdns_message_fuzzer.cc', 'http_message_fuzzer', 'http_fuzzer', 'inspector/source-codedns_message_fuzzer.cc', 'inspector/source-codehttp_fuzzer.cc', 'dns_message_fuzzer', 'inspector/light/source_fileshttp_fuzzer.cc', 'inspector/source-codehttp_message_fuzzer.cc', 'inspector/light/source_fileshttp_message_fuzzer.cc'] []
/src/libevent/bufferevent_filter.c ['bufferevent_fuzzer', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc'] ['bufferevent_fuzzer', 'inspector/source-codebufferevent_fuzzer.cc', 'inspector/light/source_filesbufferevent_fuzzer.cc']
/src/inspector/light/source_files/src/utils_fuzzer.cc ['inspector/light/source_filesutils_fuzzer.cc'] ['inspector/light/source_filesutils_fuzzer.cc']
/src/inspector/source-code/src/utils_fuzzer.cc ['inspector/source-codeutils_fuzzer.cc'] ['inspector/source-codeutils_fuzzer.cc']
/src/libevent/evthread.c [] []
/src/inspector/source-code/src/bufferevent_fuzzer.cc ['inspector/source-codebufferevent_fuzzer.cc'] ['inspector/source-codebufferevent_fuzzer.cc']

Directories in report

Directory
/src/
/src/inspector/source-code/src/
/src/libevent/./
/src/inspector/light/source_files/src/
/src/libevent/
/usr/include/x86_64-linux-gnu/bits/

Metadata section

This sections shows the raw data that is used to produce this report. This is mainly used for further processing and developer debugging.

Fuzzer Calltree file Program data file Coverage file
buffer_add_file_fuzzer fuzzerLogFile-0-Ol8wm3kuyg.data fuzzerLogFile-0-Ol8wm3kuyg.data.yaml buffer_add_file_fuzzer.covreport
evtag_fuzzer fuzzerLogFile-0-GS7kDDYdzz.data fuzzerLogFile-0-GS7kDDYdzz.data.yaml evtag_fuzzer.covreport
bufferevent_fuzzer fuzzerLogFile-0-YNe27cUB3M.data fuzzerLogFile-0-YNe27cUB3M.data.yaml bufferevent_fuzzer.covreport
buffer_fuzzer fuzzerLogFile-0-NiMVch7KCb.data fuzzerLogFile-0-NiMVch7KCb.data.yaml buffer_fuzzer.covreport
dns_config_fuzzer fuzzerLogFile-0-09RmPBb2zI.data fuzzerLogFile-0-09RmPBb2zI.data.yaml dns_config_fuzzer.covreport
inspector/light/source_filesdns_message_fuzzer.cc fuzzerLogFile-0-W03vzZVI6w.data fuzzerLogFile-0-W03vzZVI6w.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
inspector/source-codebufferevent_fuzzer.cc fuzzerLogFile-0-qwTrLiQscS.data fuzzerLogFile-0-qwTrLiQscS.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
inspector/light/source_filesbuffer_add_file_fuzzer.cc fuzzerLogFile-0-lAiH99nsM9.data fuzzerLogFile-0-lAiH99nsM9.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
inspector/light/source_filesbufferevent_fuzzer.cc fuzzerLogFile-0-7uOm9EAeMg.data fuzzerLogFile-0-7uOm9EAeMg.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
inspector/source-codeparse_query_fuzzer.cc fuzzerLogFile-0-nkqP6wqReh.data fuzzerLogFile-0-nkqP6wqReh.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
inspector/light/source_filesdns_config_fuzzer.cc fuzzerLogFile-0-DEu9Cq4eoS.data fuzzerLogFile-0-DEu9Cq4eoS.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
inspector/light/source_filesutils_fuzzer.cc fuzzerLogFile-0-LqRJjhFJRp.data fuzzerLogFile-0-LqRJjhFJRp.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
inspector/light/source_filesevtag_fuzzer.cc fuzzerLogFile-0-CScX2i7dWy.data fuzzerLogFile-0-CScX2i7dWy.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
inspector/source-codebuffer_add_file_fuzzer.cc fuzzerLogFile-0-eRiCI0HZC4.data fuzzerLogFile-0-eRiCI0HZC4.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
inspector/source-codeevtag_fuzzer.cc fuzzerLogFile-0-vCTjXuixor.data fuzzerLogFile-0-vCTjXuixor.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
http_message_fuzzer fuzzerLogFile-0-H8SsQGOTmq.data fuzzerLogFile-0-H8SsQGOTmq.data.yaml http_message_fuzzer.covreport
http_fuzzer fuzzerLogFile-0-U4653GwcR9.data fuzzerLogFile-0-U4653GwcR9.data.yaml http_fuzzer.covreport
inspector/source-codedns_message_fuzzer.cc fuzzerLogFile-0-51vDYmXjC0.data fuzzerLogFile-0-51vDYmXjC0.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
inspector/source-codehttp_fuzzer.cc fuzzerLogFile-0-gK3a9GESMM.data fuzzerLogFile-0-gK3a9GESMM.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
utils_fuzzer fuzzerLogFile-0-VIjZK2KZFI.data fuzzerLogFile-0-VIjZK2KZFI.data.yaml utils_fuzzer.covreport
inspector/source-codebuffer_fuzzer.cc fuzzerLogFile-0-Fw5Io3now2.data fuzzerLogFile-0-Fw5Io3now2.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
inspector/light/source_filesbuffer_fuzzer.cc fuzzerLogFile-0-ARWolfJYwr.data fuzzerLogFile-0-ARWolfJYwr.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
inspector/light/source_filesparse_query_fuzzer.cc fuzzerLogFile-0-gVOaiaAqXr.data fuzzerLogFile-0-gVOaiaAqXr.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
parse_query_fuzzer fuzzerLogFile-0-O0RjY7ppmq.data fuzzerLogFile-0-O0RjY7ppmq.data.yaml parse_query_fuzzer.covreport
inspector/source-codedns_config_fuzzer.cc fuzzerLogFile-0-uzzn5TzYD9.data fuzzerLogFile-0-uzzn5TzYD9.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
dns_message_fuzzer fuzzerLogFile-0-5pvML3aQcb.data fuzzerLogFile-0-5pvML3aQcb.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
inspector/source-codeutils_fuzzer.cc fuzzerLogFile-0-Y6OL4m7wbi.data fuzzerLogFile-0-Y6OL4m7wbi.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
inspector/light/source_fileshttp_fuzzer.cc fuzzerLogFile-0-x5tXbff6O2.data fuzzerLogFile-0-x5tXbff6O2.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
inspector/source-codehttp_message_fuzzer.cc fuzzerLogFile-0-8lPRrrJBJ0.data fuzzerLogFile-0-8lPRrrJBJ0.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport
inspector/light/source_fileshttp_message_fuzzer.cc fuzzerLogFile-0-Gq2A7iCoQb.data fuzzerLogFile-0-Gq2A7iCoQb.data.yaml http_message_fuzzer.covreport , utils_fuzzer.covreport , parse_query_fuzzer.covreport , evtag_fuzzer.covreport , buffer_fuzzer.covreport , bufferevent_fuzzer.covreport , http_fuzzer.covreport , dns_config_fuzzer.covreport , buffer_add_file_fuzzer.covreport