Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Fuzzer details

Fuzzer: fuzz_file

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 87 81.3%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 20 18.6%
All colors 107 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
65 29 tables.path.join_path call site: 00029 tables.file.File.create_group
13 3 ...fuzz_file.TestOneInput call site: 00003 tables.file.File._create_path
9 97 ...fuzz_file.TestOneInput call site: 00097 tables.file.File._get_or_create_path

Runtime coverage analysis

Covered functions
179
Functions that are reachable but not covered
62
Reachable functions
63
Percentage of reachable functions covered
1.59%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_file 7
tables.file 34
tables.group 20
tables.path 5
tables.unimplemented 2
tables.link 1
tables.flavor 2

Fuzzer: fuzz_file_extended

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 96 77.4%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 28 22.5%
All colors 124 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
65 32 tables.path.join_path call site: 00032 tables.file.File.create_group
18 105 ...fuzz_file_extended.TestOneInput call site: 00105 tables.file.File.create_array
13 6 ...fuzz_file_extended.TestOneInput call site: 00006 tables.file.File._create_path

Runtime coverage analysis

Covered functions
179
Functions that are reachable but not covered
66
Reachable functions
67
Percentage of reachable functions covered
1.49%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_file_extended 11
tables.file 34
tables.group 20
tables.path 5
tables.unimplemented 2
tables.link 1
tables.flavor 2

Analyses and suggestions

Optimal target analysis

Remaining optimal interesting functions

The following table shows a list of functions that are optimal targets. Optimal targets are identified by finding the functions that in combination, yield a high code coverage.

Func name Functions filename Arg count Args Function depth hitcount instr count bb count cyclomatic complexity Reachable functions Incoming references total cyclomatic complexity Unreached complexity
tables.node.Node.__init__ tables.node 4 ['N/A', 'N/A', 'N/A', 'N/A'] 7 0 17 5 5 371 0 1248 1094
tables.table.Table.read_where tables.table 7 ['N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A'] 4 0 2 3 4 109 0 374 284
tables.link.SoftLink.__setitem__ tables.link 3 ['N/A', 'N/A', 'N/A'] 4 0 2 2 4 130 1 452 227
tables.table.Column._do_reindex tables.table 2 ['N/A', 'N/A'] 4 0 3 2 4 145 2 506 190
tables.scripts.ptrepack.copy_leaf tables.scripts.ptrepack 19 ['N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A'] 6 0 11 11 7 265 1 869 143
tables.nodes.filenode.save_to_filenode tables.nodes.filenode 7 ['N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A'] 2 0 7 10 7 40 0 136 103
tables.file.File.goto tables.file 2 ['N/A', 'N/A'] 4 0 5 2 4 117 0 392 97
tables.link.SoftLink.__getitem__ tables.link 2 ['N/A', 'N/A'] 3 0 1 2 4 129 1 453 93
tables.index.Index.search tables.index 2 ['N/A', 'N/A'] 1 0 6 24 13 43 0 148 89
tables.leaf.Leaf._g_copy tables.leaf 6 ['N/A', 'N/A', 'N/A', 'N/A', 'N/A', 'N/A'] 5 0 2 8 6 124 0 433 85

Implementing fuzzers that target the above functions will improve reachability such that it becomes:

Functions statically reachable by fuzzers
41.0%
337 / 829
Cyclomatic complexity statically reachable by fuzzers
44.0%
1340 / 3043

All functions overview

If you implement fuzzers for these functions, the status of all functions in the project will be:

Func name Functions filename Args Function call depth Reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
tables.leaf.Leaf._calc_chunkshape 33 0 0.0% []
tables.leaf.Leaf._point_selection 37 0 0.0% []
tables.file.File.__init__ 34 11 32.35% []
tables.file.File.enable_undo 39 0 0.0% []
ctypes.cdll.LoadLibrary 55 19 34.54% []
re.sub 2443 656 26.85% []
tables.description.Description.__init__ 95 0 0.0% []
tables.description.dtype_from_descr 64 1 1.562% []
array.Array.close 34 10 29.41% []
tables.index.Index._g_post_init_hook 80 0 0.0% []
tables.index.Index.initial_append 45 0 0.0% []
tables.index.Index.append 51 0 0.0% []
tables.index.Index.append_last_row 34 0 0.0% []
tables.index.Index.optimize 42 0 0.0% []
tables.index.Index.do_complete_sort 76 0 0.0% []
tables.index.Index.swap 31 0 0.0% []
tables.index.Index.cleanup_temp 41 0 0.0% []
tables.index.Index.swap_chunks 32 0 0.0% []
tables.index.Index.reorder_slices 53 0 0.0% []
tables.index.Index.swap_slices 55 0 0.0% []
tables.index.Index.compute_overlaps_finegrain 54 0 0.0% []
tables.index.Index.read_sorted_indices 34 0 0.0% []
tables.index.Index.search 66 0 0.0% []
tables.index.Index.search_last_row 43 0 0.0% []
tables.index.Index.get_chunkmap 51 0 0.0% []
tables.index.Index.get_lookup_range 34 0 0.0% []
tables.table._table__where_indexed 51 0 0.0% []
tables.table._column__create_index 48 2 4.166% []
tables.table.Table.__init__ 77 0 0.0% []
tables.table.Table._g_post_init_hook 39 0 0.0% []
tables.table.Table._required_expr_vars 41 0 0.0% []
tables.table.Table._read 36 0 0.0% []
tables.table.Table.modify_column 39 0 0.0% []
tables.table.Table.modify_columns 39 0 0.0% []
tables.vlarray.VLArray.__init__ 32 0 0.0% []
tables.array.Array._interpret_indexing 49 0 0.0% []
tables.array.Array._fancy_selection.translate_slice 82 0 0.0% []
tables.node.Node._f_move 31 0 0.0% []
tables.node.Node._f_copy 31 0 0.0% []
tables.conditions._get_idx_expr_recurse.fix_invert 35 0 0.0% []
s.indices 310 129 41.61% []
packaging.version.Version 165 87 52.72% []
tables.tests.common.print_versions 51 0 0.0% []
tables.tests.common.allequal 31 0 0.0% []
pkg_resources.resource_filename 1578 2 0.126% []
type.__new__ 172 22 12.79% []
tables.expression.Expr.__init__ 48 0 0.0% []
tables.expression.Expr._guess_shape 31 0 0.0% []
tables.expression.Expr._get_info 42 0 0.0% []
tables.expression.Expr.eval 34 0 0.0% []
tables.expression.Expr.__iter__ 35 1 2.857% []
numexpr.necompiler.stringToExpression 468 72 15.38% []
tables.carray.CArray.__init__ 38 0 0.0% []
c.isidentifier 412 24 5.825% []
cpuinfo.get_cpu_info 1419 535 37.70% []
tables.attributeset.AttributeSet.__getattr__ 46 0 0.0% []
tables.indexes.IndexArray._search_bin 42 0 0.0% []
io.RawIOBase.append 788 75 9.517% []

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
[] []
numexpr [] []
io [] []
tables.file ['fuzz_file', 'fuzz_file_extended'] []
tables.description [] []
tables.utils [] []
functools [] []
atheris [] []
...fuzz_file ['fuzz_file'] []
array [] []
tables.misc [] []
tables.tests.common [] []
bisect [] []
tables.misc.proxydict [] []
tables.attributeset [] []
tables.array [] []
tables.link ['fuzz_file', 'fuzz_file_extended'] []
tables.scripts.ptrepack [] []
tables.nodes.filenode [] []
tables.exceptions [] []
tables.scripts [] []
tables.tests.test_suite [] []
tables.group ['fuzz_file', 'fuzz_file_extended'] []
math [] []
ctypes [] []
argparse [] []
tables.path ['fuzz_file', 'fuzz_file_extended'] []
inspect [] []
tableextension [] []
tables.carray [] []
keyword [] []
tables.unimplemented ['fuzz_file', 'fuzz_file_extended'] []
tables.flavor ['fuzz_file', 'fuzz_file_extended'] []
tables.scripts.pttree [] []
time [] []
tables.filters [] []
pkg_resources [] []
operator [] []
tables.conditions [] []
pathlib [] []
tables.index [] []
linkextension [] []
os [] []
atexit [] []
tables.indexes [] []
blosc2_compcode_to_compname [] []
collections [] []
tables.misc.enum [] []
platform [] []
tables.vlarray [] []
tables.idxutils [] []
blosc2_compressor_list [] []
lrucacheextension [] []
weakref [] []
numpy [] []
indexesextension [] []
doctest [] []
tables.tests [] []
pickle [] []
...fuzz_file_extended ['fuzz_file_extended'] []
unittest [] []
cpuinfo [] []
re [] []
tables.table [] []
tables.scripts.pt2to3 [] []
tempfile [] []
tables.atom [] []
blosc_compressor_list [] []
tables._version [] []
copy [] []
tables.registry [] []
tables.earray [] []
locale [] []
datetime [] []
tables.req_versions [] []
tables.leaf [] []
utilsextension [] []
hdf5extension [] []
traceback [] []
packaging [] []
blosc_compcode_to_compname [] []
warnings [] []
sys [] []
tables.undoredo [] []
tables.expression [] []
tables.scripts.ptdump [] []
tables.nodes [] []
tables.node [] []
tables [] []
tables.parameters [] []

Directories in report

Directory