The following nodes represent call sites where fuzz blockers occur.
Amount of callsites blocked | Calltree index | Parent function | Callsite | Largest blocked function |
---|---|---|---|---|
14 | 0 | EP | call site: 00000 | scapy.utils.rdpcap |
...pcap_fuzzer.TestOneInput
[function]
[call site]
00000
io.BytesIO
[function]
[call site]
00001
scapy.utils.rdpcap
[function]
[call site]
00002
scapy.utils.PcapReader.__init__
[function]
[call site]
00003
scapy.utils.RawPcapReader.__init__
[function]
[call site]
00004
typing.cast.read
[function]
[call site]
00005
scapy.arch.windows.structures._win_fifo_open._opened.read
[function]
[call site]
00006
ctypes.create_string_buffer
[function]
[call site]
00007
ctypes.windll.kernel32.ReadFile
[function]
[call site]
00008
<builtin>.len
[function]
[call site]
00009
struct.unpack
[function]
[call site]
00010
scapy.error.warning
[function]
[call site]
00011
log_runtime.warning
[function]
[call site]
00012
fdesc.read_all
[function]
[call site]
00013
p.summary
[function]
[call site]
00014