Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues
Report generation date: 2024-04-23

Project overview: sleuthkit

High level conclusions

Reachability and coverage overview

Functions statically reachable by fuzzers
59.0%
684 / 1161
Cyclomatic complexity statically reachable by fuzzers
69.0%
8637 / 12570
Runtime code coverage of functions
19.0%
223 / 1161

Fuzzer details

Fuzzer: sleuthkit_mmls_mac_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 533 93.0%
gold [1:9] 39 6.80%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 0.17%
All colors 573 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
121 121 4 :

['free', 'strncmp', 'strcmp', 'detectDiskEncryption']

907 1429 tsk_vs_open call site: 00030 /src/sleuthkit/tsk/vs/mm_open.c:60
44 44 1 :

['tsk_img_read_no_cache']

44 52 tsk_img_read call site: 00076 /src/sleuthkit/tsk/img/img_io.c:215
0 60 3 :

['tsk_error_set_errstr', 'tsk_error_set_errno', 'tsk_error_reset']

0 68 tsk_img_read call site: 00070 /src/sleuthkit/tsk/img/img_io.c:117
0 60 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 60 tsk_vs_mac_open call site: 00495 /src/sleuthkit/tsk/vs/mac.c:199
0 60 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 60 tsk_vs_read_block call site: 00048 /src/sleuthkit/tsk/vs/mm_io.c:34
0 0 None 117 526 mac_load_table call site: 00502 /src/sleuthkit/tsk/vs/mac.c:35
0 0 None 117 491 mac_load_table call site: 00505 /src/sleuthkit/tsk/vs/mac.c:75
0 0 None 59 206 tsk_vs_mac_open call site: 00502 /src/sleuthkit/tsk/vs/mac.c:233
0 0 None 59 206 tsk_vs_mac_open call site: 00502 /src/sleuthkit/tsk/vs/mac.c:234
0 0 None 59 64 tsk_vs_mac_open call site: 00502 /src/sleuthkit/tsk/vs/mac.c:229
0 0 None 44 52 tsk_img_read call site: 00064 /src/sleuthkit/tsk/img/img_io.c:109
0 0 None 44 52 tsk_img_read call site: 00076 /src/sleuthkit/tsk/img/img_io.c:130

Runtime coverage analysis

Covered functions
22
Functions that are reachable but not covered
66
Reachable functions
89
Percentage of reachable functions covered
25.84%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit_mmls_fuzzer.cc 2
/src/sleuthkit/../sleuthkit_mem_img.h 4
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/vs/mm_open.c 2
/src/sleuthkit/tsk/base/tsk_error.c 10
/src/sleuthkit/tsk/vs/dos.c 5
/src/sleuthkit/tsk/base/mymalloc.c 1
/src/sleuthkit/tsk/vs/mm_part.c 4
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/vs/mm_io.c 1
/src/sleuthkit/tsk/img/img_io.c 2
/src/sleuthkit/tsk/base/tsk_endian.c 3
/src/sleuthkit/tsk/vs/bsd.c 4
/src/sleuthkit/tsk/vs/gpt.c 3
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/vs/sun.c 6
/src/sleuthkit/tsk/vs/mac.c 3
/src/sleuthkit/tsk/util/detect_encryption.c 8

Fuzzer: sleuthkit_mmls_sun_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 532 92.8%
gold [1:9] 40 6.98%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 0.17%
All colors 573 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
121 121 4 :

['free', 'strncmp', 'strcmp', 'detectDiskEncryption']

874 1429 tsk_vs_open call site: 00030 /src/sleuthkit/tsk/vs/mm_open.c:60
78 78 1 :

['sun_load_table_sparc']

261 505 sun_load_table call site: 00459 /src/sleuthkit/tsk/vs/sun.c:273
59 59 1 :

['tsk_vs_part_unused']

59 64 tsk_vs_sun_open call site: 00449 /src/sleuthkit/tsk/vs/sun.c:386
44 44 1 :

['tsk_img_read_no_cache']

44 52 tsk_img_read call site: 00076 /src/sleuthkit/tsk/img/img_io.c:215
21 21 1 :

['tsk_error_set_errstr2']

21 60 sun_load_table call site: 00476 /src/sleuthkit/tsk/vs/sun.c:302
0 60 3 :

['tsk_error_set_errstr', 'tsk_error_set_errno', 'tsk_error_reset']

0 68 tsk_img_read call site: 00070 /src/sleuthkit/tsk/img/img_io.c:117
0 60 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 60 tsk_vs_read_block call site: 00048 /src/sleuthkit/tsk/vs/mm_io.c:34
0 60 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 60 tsk_vs_sun_open call site: 00442 /src/sleuthkit/tsk/vs/sun.c:359
0 0 None 282 685 sun_load_table call site: 00452 /src/sleuthkit/tsk/vs/sun.c:241
0 0 None 102 346 sun_load_table call site: 00469 /src/sleuthkit/tsk/vs/sun.c:295
0 0 None 44 52 tsk_img_read call site: 00064 /src/sleuthkit/tsk/img/img_io.c:109
0 0 None 44 52 tsk_img_read call site: 00076 /src/sleuthkit/tsk/img/img_io.c:130

Runtime coverage analysis

Covered functions
22
Functions that are reachable but not covered
66
Reachable functions
89
Percentage of reachable functions covered
25.84%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit_mmls_fuzzer.cc 2
/src/sleuthkit/../sleuthkit_mem_img.h 4
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/vs/mm_open.c 2
/src/sleuthkit/tsk/base/tsk_error.c 10
/src/sleuthkit/tsk/vs/dos.c 5
/src/sleuthkit/tsk/base/mymalloc.c 1
/src/sleuthkit/tsk/vs/mm_part.c 4
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/vs/mm_io.c 1
/src/sleuthkit/tsk/img/img_io.c 2
/src/sleuthkit/tsk/base/tsk_endian.c 3
/src/sleuthkit/tsk/vs/bsd.c 4
/src/sleuthkit/tsk/vs/gpt.c 3
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/vs/sun.c 6
/src/sleuthkit/tsk/vs/mac.c 3
/src/sleuthkit/tsk/util/detect_encryption.c 8

Fuzzer: sleuthkit_mmls_dos_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 501 87.4%
gold [1:9] 19 3.31%
yellow [10:29] 15 2.61%
greenyellow [30:49] 1 0.17%
lawngreen 50+ 37 6.45%
All colors 573 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
121 121 4 :

['free', 'strncmp', 'strcmp', 'detectDiskEncryption']

845 1429 tsk_vs_open call site: 00030 /src/sleuthkit/tsk/vs/mm_open.c:60
44 44 1 :

['tsk_img_read_no_cache']

44 52 tsk_img_read call site: 00076 /src/sleuthkit/tsk/img/img_io.c:215
8 8 1 :

['strncmp']

58 854 dos_load_prim_table call site: 00088 /src/sleuthkit/tsk/vs/dos.c:892
0 416 4 :

['dos_get_desc', 'dos_load_ext_table', 'tsk_malloc', 'tsk_vs_part_add']

0 476 dos_load_ext_table call site: 00277 /src/sleuthkit/tsk/vs/dos.c:704
0 82 3 :

['free', 'tsk_malloc', 'tsk_vs_part_add']

0 82 tsk_vs_part_unused call site: 00329 /src/sleuthkit/tsk/vs/mm_part.c:155
0 60 3 :

['tsk_error_set_errstr', 'tsk_error_set_errno', 'tsk_error_reset']

0 68 tsk_img_read call site: 00070 /src/sleuthkit/tsk/img/img_io.c:117
0 60 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 60 tsk_vs_dos_open call site: 00032 /src/sleuthkit/tsk/vs/dos.c:1069
0 60 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 60 dos_load_prim_table call site: 00320 /src/sleuthkit/tsk/vs/dos.c:1028
0 60 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 60 tsk_vs_read_block call site: 00048 /src/sleuthkit/tsk/vs/mm_io.c:34
0 60 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 60 tsk_vs_part_walk call site: 00569 /src/sleuthkit/tsk/vs/mm_part.c:256
0 21 1 :

['tsk_error_set_errstr2']

0 60 dos_load_ext_table call site: 00274 /src/sleuthkit/tsk/vs/dos.c:692
0 5 1 :

['dos_close']

0 5 tsk_vs_dos_open call site: 00326 /src/sleuthkit/tsk/vs/dos.c:1103

Runtime coverage analysis

Covered functions
30
Functions that are reachable but not covered
57
Reachable functions
89
Percentage of reachable functions covered
35.96%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit_mmls_fuzzer.cc 2
/src/sleuthkit/../sleuthkit_mem_img.h 4
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/vs/mm_open.c 2
/src/sleuthkit/tsk/base/tsk_error.c 10
/src/sleuthkit/tsk/vs/dos.c 5
/src/sleuthkit/tsk/base/mymalloc.c 1
/src/sleuthkit/tsk/vs/mm_part.c 4
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/vs/mm_io.c 1
/src/sleuthkit/tsk/img/img_io.c 2
/src/sleuthkit/tsk/base/tsk_endian.c 3
/src/sleuthkit/tsk/vs/bsd.c 4
/src/sleuthkit/tsk/vs/gpt.c 3
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/vs/sun.c 6
/src/sleuthkit/tsk/vs/mac.c 3
/src/sleuthkit/tsk/util/detect_encryption.c 8

Fuzzer: sleuthkit_mmls_gpt_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 481 83.9%
gold [1:9] 5 0.87%
yellow [10:29] 2 0.34%
greenyellow [30:49] 6 1.04%
lawngreen 50+ 79 13.7%
All colors 573 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
121 121 4 :

['free', 'strncmp', 'strcmp', 'detectDiskEncryption']

857 1429 tsk_vs_open call site: 00030 /src/sleuthkit/tsk/vs/mm_open.c:60
44 44 1 :

['tsk_img_read_no_cache']

44 52 tsk_img_read call site: 00076 /src/sleuthkit/tsk/img/img_io.c:215
0 60 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 60 tsk_vs_gpt_open call site: 00374 /src/sleuthkit/tsk/vs/gpt.c:311
0 60 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 60 tsk_vs_read_block call site: 00048 /src/sleuthkit/tsk/vs/mm_io.c:34
0 60 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 60 tsk_vs_part_walk call site: 00569 /src/sleuthkit/tsk/vs/mm_part.c:256
0 5 1 :

['gpt_close']

0 5 tsk_vs_gpt_open call site: 00433 /src/sleuthkit/tsk/vs/gpt.c:398
0 0 None 44 52 tsk_img_read call site: 00064 /src/sleuthkit/tsk/img/img_io.c:109
0 0 None 0 1207 gpt_load_table call site: 00381 /src/sleuthkit/tsk/vs/gpt.c:47
0 0 None 0 621 tsk_vs_gpt_open call site: 00421 /src/sleuthkit/tsk/vs/gpt.c:343
0 0 None 0 621 tsk_vs_gpt_open call site: 00422 /src/sleuthkit/tsk/vs/gpt.c:349
0 0 None 0 437 tsk_vs_gpt_open call site: 00425 /src/sleuthkit/tsk/vs/gpt.c:364
0 0 None 0 301 gpt_load_table call site: 00412 /src/sleuthkit/tsk/vs/gpt.c:225

Runtime coverage analysis

Covered functions
30
Functions that are reachable but not covered
57
Reachable functions
89
Percentage of reachable functions covered
35.96%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit_mmls_fuzzer.cc 2
/src/sleuthkit/../sleuthkit_mem_img.h 4
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/vs/mm_open.c 2
/src/sleuthkit/tsk/base/tsk_error.c 10
/src/sleuthkit/tsk/vs/dos.c 5
/src/sleuthkit/tsk/base/mymalloc.c 1
/src/sleuthkit/tsk/vs/mm_part.c 4
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/vs/mm_io.c 1
/src/sleuthkit/tsk/img/img_io.c 2
/src/sleuthkit/tsk/base/tsk_endian.c 3
/src/sleuthkit/tsk/vs/bsd.c 4
/src/sleuthkit/tsk/vs/gpt.c 3
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/vs/sun.c 6
/src/sleuthkit/tsk/vs/mac.c 3
/src/sleuthkit/tsk/util/detect_encryption.c 8

Fuzzer: sleuthkit_fls_iso9660_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 4987 100.%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 0 0.0%
All colors 4987 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
0 0 None 0 0 hexDigitToChar(char) call site: 00000 /src/sleuthkit/tsk/auto/guid.cpp:89

Runtime coverage analysis

Covered functions
3
Functions that are reachable but not covered
861
Reachable functions
861
Percentage of reachable functions covered
0.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit_fls_fuzzer.cc 1
/src/sleuthkit/../sleuthkit_mem_img.h 4
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 12
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 3
/src/sleuthkit/tsk/img/unsupported_types.c 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.c 2
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.c 40
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_dir.c 24
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/fs/fs_file.c 13
/src/sleuthkit/tsk/fs/fs_inode.c 5
/src/sleuthkit/tsk/fs/fs_attrlist.c 10
/src/sleuthkit/tsk/fs/fs_attr.c 16
/src/sleuthkit/tsk/fs/fs_name.c 13
/src/sleuthkit/tsk/base/tsk_list.c 4
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/img/logical_img.c 1
/src/sleuthkit/tsk/fs/fs_load.c 1
/src/sleuthkit/tsk/fs/fs_block.c 5
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 19
/src/sleuthkit/tsk/fs/fatfs_dent.cpp 6
/src/sleuthkit/tsk/fs/fatfs.c 11
/src/sleuthkit/tsk/fs/fatxxfs.c 3
/src/sleuthkit/tsk/fs/exfatfs.c 15
/src/sleuthkit/tsk/fs/fatfs_utils.c 6
/src/sleuthkit/tsk/fs/exfatfs_meta.c 25
/src/sleuthkit/tsk/fs/fatfs_meta.c 1
/src/sleuthkit/tsk/fs/ffs.c 18
/src/sleuthkit/tsk/fs/ext2fs.c 27
/src/sleuthkit/tsk/fs/unix_misc.c 3
/src/sleuthkit/tsk/fs/hfs.c 50
/src/sleuthkit/tsk/fs/hfs_dent.c 5
/src/sleuthkit/tsk/fs/decmpfs.c 3
/src/sleuthkit/tsk/fs/ifind_lib.c 1
/src/sleuthkit/tsk/fs/iso9660.c 25
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 47
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 24
/src/sleuthkit/tsk/fs/./tsk_apfs.hpp 42
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/tsk/fs/./../pool/tsk_apfs.hpp 5
/src/sleuthkit/tsk/pool/./../fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/tsk/fs/./../auto/guid.h 3
/src/sleuthkit/tsk/fs/./../util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/tsk/fs/../../tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/tsk/fs/./../util/lw_shared_ptr.hpp 6
/src/sleuthkit/tsk/fs/./apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/./apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/fls_lib.c 3
/src/sleuthkit/tsk/base/md5c.c 8
/src/sleuthkit/tsk/base/sha1c.c 6

Fuzzer: sleuthkit_fls_ext_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 4720 94.6%
gold [1:9] 8 0.16%
yellow [10:29] 20 0.40%
greenyellow [30:49] 29 0.58%
lawngreen 50+ 210 4.21%
All colors 4987 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
241 241 3 :

['detectUnsupportedImageType', 'detectVolumeEncryption', 'free']

241 519 tsk_fs_open_img_decrypt call site: 00032 /src/sleuthkit/tsk/fs/fs_open.c:175
132 132 1 :

['logicalfs_read']

132 132 tsk_fs_attr_read call site: 01528 /src/sleuthkit/tsk/fs/fs_attr.c:1118
130 231 6 :

['tsk_fs_dir_copy', 'tsk_list_find', 'tsk_fs_name_copy', 'tsk_fs_dir_add_orphan_dir_meta', 'tsk_fs_dir_alloc', 'tsk_fs_dir_free_name_internal']

130 270 tsk_fs_dir_find_orphans call site: 00965 /src/sleuthkit/tsk/fs/fs_dir.c:1407
86 86 1 :

['fs_prepost_read']

86 86 tsk_fs_read_block_decrypt call site: 00157 /src/sleuthkit/tsk/fs/fs_io.c:238
44 44 1 :

['tsk_img_read_no_cache']

44 52 tsk_img_read call site: 00075 /src/sleuthkit/tsk/img/img_io.c:215
40 40 1 :

['tsk_fs_meta_realloc']

40 667 ext2fs_dinode_copy call site: 02641 /src/sleuthkit/tsk/fs/ext2fs.c:849
34 34 1 :

['tsk_fs_dir_reset']

34 1266 ext2fs_dir_open_meta call site: 00000 /src/sleuthkit/tsk/fs/ext2fs_dent.c:282
28 28 1 :

['logical_fs_open']

28 88 tsk_fs_open_img_decrypt call site: 00026 /src/sleuthkit/tsk/fs/fs_open.c:161
13 17 2 :

['tsk_fs_file_reset', 'tsk_fs_name_free']

13 46 tsk_fs_file_open_meta call site: 01008 /src/sleuthkit/tsk/fs/fs_file.c:112
7 7 1 :

['ext2fs_print_map']

7 7 ext2fs_imap_load call site: 02608 /src/sleuthkit/tsk/fs/ext2fs.c:447
6 41 3 :

['tsk_realloc', 'strlen', 'strncpy']

6 41 tsk_fs_name_copy call site: 00944 /src/sleuthkit/tsk/fs/fs_name.c:184
6 6 1 :

['tsk_fs_meta_reset']

6 648 ext2fs_inode_lookup call site: 02771 /src/sleuthkit/tsk/fs/ext2fs.c:1043

Runtime coverage analysis

Covered functions
109
Functions that are reachable but not covered
758
Reachable functions
861
Percentage of reachable functions covered
11.96%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit_fls_fuzzer.cc 1
/src/sleuthkit/../sleuthkit_mem_img.h 4
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 12
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 3
/src/sleuthkit/tsk/img/unsupported_types.c 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.c 2
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.c 40
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_dir.c 24
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/fs/fs_file.c 13
/src/sleuthkit/tsk/fs/fs_inode.c 5
/src/sleuthkit/tsk/fs/fs_attrlist.c 10
/src/sleuthkit/tsk/fs/fs_attr.c 16
/src/sleuthkit/tsk/fs/fs_name.c 13
/src/sleuthkit/tsk/base/tsk_list.c 4
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/img/logical_img.c 1
/src/sleuthkit/tsk/fs/fs_load.c 1
/src/sleuthkit/tsk/fs/fs_block.c 5
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 19
/src/sleuthkit/tsk/fs/fatfs_dent.cpp 6
/src/sleuthkit/tsk/fs/fatfs.c 11
/src/sleuthkit/tsk/fs/fatxxfs.c 3
/src/sleuthkit/tsk/fs/exfatfs.c 15
/src/sleuthkit/tsk/fs/fatfs_utils.c 6
/src/sleuthkit/tsk/fs/exfatfs_meta.c 25
/src/sleuthkit/tsk/fs/fatfs_meta.c 1
/src/sleuthkit/tsk/fs/ffs.c 18
/src/sleuthkit/tsk/fs/ext2fs.c 27
/src/sleuthkit/tsk/fs/unix_misc.c 3
/src/sleuthkit/tsk/fs/hfs.c 50
/src/sleuthkit/tsk/fs/hfs_dent.c 5
/src/sleuthkit/tsk/fs/decmpfs.c 3
/src/sleuthkit/tsk/fs/ifind_lib.c 1
/src/sleuthkit/tsk/fs/iso9660.c 25
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 47
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 24
/src/sleuthkit/tsk/fs/./tsk_apfs.hpp 42
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/tsk/fs/./../pool/tsk_apfs.hpp 5
/src/sleuthkit/tsk/pool/./../fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/tsk/fs/./../auto/guid.h 3
/src/sleuthkit/tsk/fs/./../util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/tsk/fs/../../tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/tsk/fs/./../util/lw_shared_ptr.hpp 6
/src/sleuthkit/tsk/fs/./apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/./apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/fls_lib.c 3
/src/sleuthkit/tsk/base/md5c.c 8
/src/sleuthkit/tsk/base/sha1c.c 6

Fuzzer: sleuthkit_fls_hfs_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 4875 97.7%
gold [1:9] 107 2.14%
yellow [10:29] 4 0.08%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 0.02%
All colors 4987 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
4861 4861 8 :

['hfs_make_badblockfile', 'hfs_make_blockmap', 'error_detected', 'hfs_cat_file_lookup', 'hfs_dinode_copy', 'hfs_make_startfile', 'hfs_make_attrfile', 'hfs_load_attrs']

4861 4861 hfs_inode_lookup call site: 03121 /src/sleuthkit/tsk/fs/hfs.c:2506
822 1511 10 :

['tsk_fs_file_open_meta', 'hfs_find_highest_inum', 'tsk_fs_path2inum', 'tsk_error_set_errno', 'tsk_fs_file_close', 'tsk_error_errstr2_concat', 'tsk_fs_attrlist_get', 'tsk_fs_attr_read', 'tsk_error_reset', 'tsk_error_set_errstr2']

822 1653 hfs_open call site: 03094 /src/sleuthkit/tsk/fs/hfs.c:6659
665 685 2 :

['tsk_error_reset', 'hfs_load_extended_attrs']

665 685 hfs_make_catalog call site: 03158 /src/sleuthkit/tsk/fs/hfs.c:1871
241 241 3 :

['detectUnsupportedImageType', 'detectVolumeEncryption', 'free']

241 519 tsk_fs_open_img_decrypt call site: 00032 /src/sleuthkit/tsk/fs/fs_open.c:175
194 229 3 :

['free', 'tsk_fs_read_block_decrypt', 'tsk_malloc']

194 229 tsk_fs_read_decrypt call site: 00151 /src/sleuthkit/tsk/fs/fs_io.c:129
132 132 1 :

['logicalfs_read']

132 132 tsk_fs_attr_read call site: 01528 /src/sleuthkit/tsk/fs/fs_attr.c:1118
44 44 1 :

['tsk_img_read_no_cache']

44 52 tsk_img_read call site: 00075 /src/sleuthkit/tsk/img/img_io.c:215
43 43 3 :

['tsk_realloc', 'strlen', 'strncpy']

43 43 fs_attr_put_name call site: 00455 /src/sleuthkit/tsk/fs/fs_attr.c:182
41 41 1 :

['tsk_fs_dir_close']

41 134 hfs_close call site: 03846 /src/sleuthkit/tsk/fs/hfs.c:6402
28 28 1 :

['logical_fs_open']

28 88 tsk_fs_open_img_decrypt call site: 00026 /src/sleuthkit/tsk/fs/fs_open.c:161
17 17 2 :

['tsk_fs_file_reset', 'tsk_fs_name_free']

17 46 tsk_fs_file_open_meta call site: 01008 /src/sleuthkit/tsk/fs/fs_file.c:112
10 10 1 :

['tsk_fs_attrlist_markunused']

10 10 hfs_make_specialbase call site: 03125 /src/sleuthkit/tsk/fs/hfs.c:1799

Runtime coverage analysis

Covered functions
55
Functions that are reachable but not covered
808
Reachable functions
861
Percentage of reachable functions covered
6.16%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit_fls_fuzzer.cc 1
/src/sleuthkit/../sleuthkit_mem_img.h 4
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 12
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 3
/src/sleuthkit/tsk/img/unsupported_types.c 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.c 2
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.c 40
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_dir.c 24
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/fs/fs_file.c 13
/src/sleuthkit/tsk/fs/fs_inode.c 5
/src/sleuthkit/tsk/fs/fs_attrlist.c 10
/src/sleuthkit/tsk/fs/fs_attr.c 16
/src/sleuthkit/tsk/fs/fs_name.c 13
/src/sleuthkit/tsk/base/tsk_list.c 4
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/img/logical_img.c 1
/src/sleuthkit/tsk/fs/fs_load.c 1
/src/sleuthkit/tsk/fs/fs_block.c 5
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 19
/src/sleuthkit/tsk/fs/fatfs_dent.cpp 6
/src/sleuthkit/tsk/fs/fatfs.c 11
/src/sleuthkit/tsk/fs/fatxxfs.c 3
/src/sleuthkit/tsk/fs/exfatfs.c 15
/src/sleuthkit/tsk/fs/fatfs_utils.c 6
/src/sleuthkit/tsk/fs/exfatfs_meta.c 25
/src/sleuthkit/tsk/fs/fatfs_meta.c 1
/src/sleuthkit/tsk/fs/ffs.c 18
/src/sleuthkit/tsk/fs/ext2fs.c 27
/src/sleuthkit/tsk/fs/unix_misc.c 3
/src/sleuthkit/tsk/fs/hfs.c 50
/src/sleuthkit/tsk/fs/hfs_dent.c 5
/src/sleuthkit/tsk/fs/decmpfs.c 3
/src/sleuthkit/tsk/fs/ifind_lib.c 1
/src/sleuthkit/tsk/fs/iso9660.c 25
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 47
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 24
/src/sleuthkit/tsk/fs/./tsk_apfs.hpp 42
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/tsk/fs/./../pool/tsk_apfs.hpp 5
/src/sleuthkit/tsk/pool/./../fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/tsk/fs/./../auto/guid.h 3
/src/sleuthkit/tsk/fs/./../util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/tsk/fs/../../tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/tsk/fs/./../util/lw_shared_ptr.hpp 6
/src/sleuthkit/tsk/fs/./apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/./apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/fls_lib.c 3
/src/sleuthkit/tsk/base/md5c.c 8
/src/sleuthkit/tsk/base/sha1c.c 6

Fuzzer: sleuthkit_fls_fat_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 4766 95.5%
gold [1:9] 109 2.18%
yellow [10:29] 41 0.82%
greenyellow [30:49] 26 0.52%
lawngreen 50+ 45 0.90%
All colors 4987 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
241 241 3 :

['detectUnsupportedImageType', 'detectVolumeEncryption', 'free']

439 519 tsk_fs_open_img_decrypt call site: 00032 /src/sleuthkit/tsk/fs/fs_open.c:175
171 231 4 :

['tsk_error_set_errstr', 'tsk_UTF16toUTF8', 'tsk_error_set_errno', 'tsk_error_reset']

171 627 fatxxfs_dinode_copy call site: 00000 /src/sleuthkit/tsk/fs/fatxxfs_meta.c:455
86 86 1 :

['fs_prepost_read']

86 86 tsk_fs_read_block_decrypt call site: 00157 /src/sleuthkit/tsk/fs/fs_io.c:238
82 102 4 :

['tsk_fs_dir_realloc', 'tsk_error_set_errstr', 'tsk_error_set_errno', 'tsk_error_reset']

82 153 tsk_fs_dir_add call site: 00977 /src/sleuthkit/tsk/fs/fs_dir.c:254
80 236 6 :

['tsk_error_set_errstr', 'tsk_guess_end_u16', 'tsk_error_set_errno', 'tsk_fs_read', 'tsk_error_reset', 'tsk_error_set_errstr2']

2852 5186 fatfs_open call site: 01595 /src/sleuthkit/tsk/fs/fatfs.c:102
61 81 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

61 81 fatfs_ptr_arg_is_null call site: 01856 /src/sleuthkit/tsk/fs/fatfs_utils.c:41
61 81 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

61 81 tsk_fs_read_block_decrypt call site: 00155 /src/sleuthkit/tsk/fs/fs_io.c:222
50 70 2 :

['tsk_error_reset', 'tsk_error_print']

50 70 fatxxfs_inode_lookup call site: 00000 /src/sleuthkit/tsk/fs/fatxxfs_meta.c:729
49 49 2 :

['fflush', 'tsk_fs_attr_walk_res']

49 49 tsk_fs_attr_walk call site: 00746 /src/sleuthkit/tsk/fs/fs_attr.c:1071
44 64 5 :

['strerror', '__errno_location', 'tsk_error_set_errstr', 'tsk_error_set_errno', 'tsk_error_reset']

44 64 tsk_realloc call site: 00307 /src/sleuthkit/tsk/base/mymalloc.c:47
44 44 1 :

['tsk_img_read_no_cache']

44 52 tsk_img_read call site: 00075 /src/sleuthkit/tsk/img/img_io.c:215
42 268 2 :

['tsk_fs_read', 'tsk_error_set_errstr2']

200 776 fatxxfs_open call site: 01621 /src/sleuthkit/tsk/fs/fatxxfs.c:634

Runtime coverage analysis

Covered functions
118
Functions that are reachable but not covered
761
Reachable functions
861
Percentage of reachable functions covered
11.61%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit_fls_fuzzer.cc 1
/src/sleuthkit/../sleuthkit_mem_img.h 4
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 12
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 3
/src/sleuthkit/tsk/img/unsupported_types.c 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.c 2
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.c 40
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_dir.c 24
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/fs/fs_file.c 13
/src/sleuthkit/tsk/fs/fs_inode.c 5
/src/sleuthkit/tsk/fs/fs_attrlist.c 10
/src/sleuthkit/tsk/fs/fs_attr.c 16
/src/sleuthkit/tsk/fs/fs_name.c 13
/src/sleuthkit/tsk/base/tsk_list.c 4
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/img/logical_img.c 1
/src/sleuthkit/tsk/fs/fs_load.c 1
/src/sleuthkit/tsk/fs/fs_block.c 5
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 19
/src/sleuthkit/tsk/fs/fatfs_dent.cpp 6
/src/sleuthkit/tsk/fs/fatfs.c 11
/src/sleuthkit/tsk/fs/fatxxfs.c 3
/src/sleuthkit/tsk/fs/exfatfs.c 15
/src/sleuthkit/tsk/fs/fatfs_utils.c 6
/src/sleuthkit/tsk/fs/exfatfs_meta.c 25
/src/sleuthkit/tsk/fs/fatfs_meta.c 1
/src/sleuthkit/tsk/fs/ffs.c 18
/src/sleuthkit/tsk/fs/ext2fs.c 27
/src/sleuthkit/tsk/fs/unix_misc.c 3
/src/sleuthkit/tsk/fs/hfs.c 50
/src/sleuthkit/tsk/fs/hfs_dent.c 5
/src/sleuthkit/tsk/fs/decmpfs.c 3
/src/sleuthkit/tsk/fs/ifind_lib.c 1
/src/sleuthkit/tsk/fs/iso9660.c 25
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 47
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 24
/src/sleuthkit/tsk/fs/./tsk_apfs.hpp 42
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/tsk/fs/./../pool/tsk_apfs.hpp 5
/src/sleuthkit/tsk/pool/./../fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/tsk/fs/./../auto/guid.h 3
/src/sleuthkit/tsk/fs/./../util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/tsk/fs/../../tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/tsk/fs/./../util/lw_shared_ptr.hpp 6
/src/sleuthkit/tsk/fs/./apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/./apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/fls_lib.c 3
/src/sleuthkit/tsk/base/md5c.c 8
/src/sleuthkit/tsk/base/sha1c.c 6

Fuzzer: sleuthkit_fls_ntfs_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 4797 96.1%
gold [1:9] 169 3.38%
yellow [10:29] 16 0.32%
greenyellow [30:49] 3 0.06%
lawngreen 50+ 2 0.04%
All colors 4987 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
1023 1023 2 :

['ntfs_proc_attrlist', 'tsk_stack_push']

1023 1023 ntfs_proc_attrseq call site: 00733 /src/sleuthkit/tsk/fs/ntfs.c:2538
438 438 1 :

['tsk_fs_dir_find_orphans']

438 438 ntfs_dir_open_meta call site: 00933 /src/sleuthkit/tsk/fs/ntfs_dent.cpp:817
308 1274 23 :

['tsk_fs_dir_contains', 'tsk_fs_file_open_meta', 'tsk_fs_name_free', 'NTFS_META_ADDR::getAddr()', 'getParentMap(NTFS_INFO*)', 'ntfs_proc_idxentry(NTFS_INFO*, TSK_FS_DIR*, unsigned char, ntfs_idxentry*, unsigned int, unsigned int)', 'tsk_fs_dir_make_orphan_dir_name', 'NTFS_META_ADDR::getSeq()', 'ntfs_parent_map_get(NTFS_INFO*, unsigned long, unsigned int)', 'ntfs_fix_idxrec(NTFS_INFO*, ntfs_idxrec*, unsigned int)', 'tsk_release_lock', 'std::__1::vector >::operator[](unsigned long)', 'tsk_fs_name_alloc', 'tsk_take_lock', 'ntfs_parent_map_exists(NTFS_INFO*, unsigned long, unsigned int)', 'std::__1::vector >::size() const', 'tsk_error_set_errstr', 'tsk_error_set_errno', 'NTFS_META_ADDR::getHash()', 'tsk_fs_file_close', 'tsk_fs_dir_add', 'strncpy', 'tsk_error_reset']

308 1274 ntfs_dir_open_meta call site: 01087 /src/sleuthkit/tsk/fs/ntfs_dent.cpp:1053
306 1380 20 :

['tsk_list_add', 'prioritizeDirNames', 'tsk_fs_meta_close', 'tsk_error_get_errno', 'tsk_list_free', 'tsk_error_print', 'tsk_malloc', 'strncat', 'strlen', 'tsk_stack_find', 'tsk_stack_pop', 'tsk_stack_push', 'save_inum_named', 'tsk_fs_file_close', 'strncpy', 'tsk_error_reset', 'tsk_fs_dir_walk_recursive', 'tsk_fs_dir_close', 'free', 'tsk_fs_file_alloc']

306 1380 tsk_fs_dir_walk_recursive call site: 00232 /src/sleuthkit/tsk/fs/fs_dir.c:661
241 241 3 :

['detectUnsupportedImageType', 'detectVolumeEncryption', 'free']

241 519 tsk_fs_open_img_decrypt call site: 00032 /src/sleuthkit/tsk/fs/fs_open.c:175
116 234 3 :

['tsk_error_set_errstr', 'tsk_fs_read_block_decrypt', 'logicalfs_read_block']

116 332 tsk_fs_attr_walk_nonres call site: 00825 /src/sleuthkit/tsk/fs/fs_attr.c:935
86 86 1 :

['fs_prepost_read']

86 86 tsk_fs_read_block_decrypt call site: 00157 /src/sleuthkit/tsk/fs/fs_io.c:238
84 84 1 :

['tsk_fs_dir_add']

84 92 ntfs_proc_idxentry(NTFS_INFO*,TSK_FS_DIR*,unsignedchar,ntfs_idxentry*,unsignedint,unsignedint) call site: 00000 /src/sleuthkit/tsk/fs/ntfs_dent.cpp:638
53 53 1 :

['tsk_fs_dir_make_orphan_dir_meta']

53 53 ntfs_inode_lookup call site: 00916 /src/sleuthkit/tsk/fs/ntfs.c:3060
49 49 2 :

['fflush', 'tsk_fs_attr_walk_res']

49 49 tsk_fs_attr_walk call site: 00746 /src/sleuthkit/tsk/fs/fs_attr.c:1071
44 44 1 :

['tsk_img_read_no_cache']

44 52 tsk_img_read call site: 00075 /src/sleuthkit/tsk/img/img_io.c:215
40 115 2 :

['ntfs_close', 'tsk_error_get']

40 115 ntfs_open call site: 01501 /src/sleuthkit/tsk/fs/ntfs.c:5515

Runtime coverage analysis

Covered functions
84
Functions that are reachable but not covered
778
Reachable functions
861
Percentage of reachable functions covered
9.64%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit_fls_fuzzer.cc 1
/src/sleuthkit/../sleuthkit_mem_img.h 4
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 12
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 3
/src/sleuthkit/tsk/img/unsupported_types.c 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.c 2
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.c 40
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_dir.c 24
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/fs/fs_file.c 13
/src/sleuthkit/tsk/fs/fs_inode.c 5
/src/sleuthkit/tsk/fs/fs_attrlist.c 10
/src/sleuthkit/tsk/fs/fs_attr.c 16
/src/sleuthkit/tsk/fs/fs_name.c 13
/src/sleuthkit/tsk/base/tsk_list.c 4
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/img/logical_img.c 1
/src/sleuthkit/tsk/fs/fs_load.c 1
/src/sleuthkit/tsk/fs/fs_block.c 5
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 19
/src/sleuthkit/tsk/fs/fatfs_dent.cpp 6
/src/sleuthkit/tsk/fs/fatfs.c 11
/src/sleuthkit/tsk/fs/fatxxfs.c 3
/src/sleuthkit/tsk/fs/exfatfs.c 15
/src/sleuthkit/tsk/fs/fatfs_utils.c 6
/src/sleuthkit/tsk/fs/exfatfs_meta.c 25
/src/sleuthkit/tsk/fs/fatfs_meta.c 1
/src/sleuthkit/tsk/fs/ffs.c 18
/src/sleuthkit/tsk/fs/ext2fs.c 27
/src/sleuthkit/tsk/fs/unix_misc.c 3
/src/sleuthkit/tsk/fs/hfs.c 50
/src/sleuthkit/tsk/fs/hfs_dent.c 5
/src/sleuthkit/tsk/fs/decmpfs.c 3
/src/sleuthkit/tsk/fs/ifind_lib.c 1
/src/sleuthkit/tsk/fs/iso9660.c 25
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 47
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 24
/src/sleuthkit/tsk/fs/./tsk_apfs.hpp 42
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/tsk/fs/./../pool/tsk_apfs.hpp 5
/src/sleuthkit/tsk/pool/./../fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/tsk/fs/./../auto/guid.h 3
/src/sleuthkit/tsk/fs/./../util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/tsk/fs/../../tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/tsk/fs/./../util/lw_shared_ptr.hpp 6
/src/sleuthkit/tsk/fs/./apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/./apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/fls_lib.c 3
/src/sleuthkit/tsk/base/md5c.c 8
/src/sleuthkit/tsk/base/sha1c.c 6

Fuzzer: sleuthkit_fls_apfs_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 5015 98.7%
gold [1:9] 60 1.18%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 1 0.01%
All colors 5076 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
191 275 13 :

['std::__1::vector >::empty() const', 'std::__1::unique_ptr >::operator=(std::__1::unique_ptr >&&)', 'std::__1::vector >::end() const', 'APFSPool::nx(bool) const', 'std::__1::__wrap_iter ::operator->() const', 'std::__1::vector >::~vector()', 'std::__1::__wrap_iter std::__1::max_element , APFSPool::__wrap_iter(std::__1::vector , std::__1::allocator > >&&, unsigned long)::$_0>(std::__1::__wrap_iter , std::__1::__wrap_iter , APFSPool::__wrap_iter(std::__1::vector , std::__1::allocator > >&&, unsigned long)::$_0)', '__cxa_end_catch', 'std::__1::vector >::begin() const', 'APFSPool::known_versions() const', '__clang_call_terminate', 'APFSObject::xid() const', '__cxa_begin_catch']

461 547 APFSPool::APFSPool(std::__1::vector ,std::__1::allocator >>&&,unsignedlong) call site: 00000 /src/sleuthkit/tsk/pool/apfs_pool.cpp:44
44 44 1 :

['tsk_img_read_no_cache']

44 52 tsk_img_read call site: 00086 /src/sleuthkit/tsk/img/img_io.c:215
14 14 3 :

['bool bit_is_set (unsigned long, unsigned long long)', 'APFSSuperblock::sb() const', 'APFSSuperblock::block_size() const']

42 42 APFSSuperblock::APFSSuperblock(APFSPoolconst&,unsignedlong) call site: 00000 /src/sleuthkit/tsk/fs/apfs.cpp:197
8 8 4 :

['std::runtime_error::runtime_error(char const*)', '__cxa_allocate_exception', '__cxa_throw', '__cxa_free_exception']

8 10 APFSPool::APFSPool(std::__1::vector ,std::__1::allocator >>&&,unsignedlong) call site: 00000 /src/sleuthkit/tsk/pool/apfs_pool.cpp:22
8 8 4 :

['std::runtime_error::runtime_error(char const*)', '__cxa_allocate_exception', '__cxa_throw', '__cxa_free_exception']

8 8 APFSBlock::APFSBlock(APFSPoolconst&,unsignedlong) call site: 00000 /src/sleuthkit/tsk/fs/apfs.cpp:133
8 8 4 :

['std::runtime_error::runtime_error(char const*)', '__cxa_allocate_exception', '__cxa_throw', '__cxa_free_exception']

8 8 APFSPool::nx(bool)const call site: 00000 /src/sleuthkit/tsk/pool/apfs_pool.cpp:94
0 60 3 :

['tsk_error_set_errstr', 'tsk_error_set_errno', 'tsk_error_reset']

0 68 tsk_img_read call site: 00079 /src/sleuthkit/tsk/img/img_io.c:117
0 0 None 44 52 tsk_img_read call site: 00068 /src/sleuthkit/tsk/img/img_io.c:109
0 0 None 44 52 tsk_img_read call site: 00086 /src/sleuthkit/tsk/img/img_io.c:130
0 0 None 44 52 tsk_img_read call site: 00086 /src/sleuthkit/tsk/img/img_io.c:140
0 0 None 44 52 tsk_img_read call site: 00086 /src/sleuthkit/tsk/img/img_io.c:200
0 0 None 0 60 tsk_img_read call site: 00044 /src/sleuthkit/tsk/img/img_io.c:67

Runtime coverage analysis

Covered functions
33
Functions that are reachable but not covered
888
Reachable functions
928
Percentage of reachable functions covered
4.31%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit_fls_apfs_fuzzer.cc 1
/src/sleuthkit/../sleuthkit_mem_img.h 4
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/pool/pool_open.cpp 3
/src/sleuthkit/tsk/pool/./apfs_pool_compat.hpp 1
/src/sleuthkit/tsk/pool/./pool_compat.hpp 6
/src/sleuthkit/tsk/pool/apfs_pool.cpp 5
/src/sleuthkit/tsk/pool/./tsk_pool.hpp 7
/src/sleuthkit/tsk/auto/guid.cpp 4
/src/sleuthkit/tsk/fs/apfs.cpp 25
/src/sleuthkit/tsk/pool/./../fs/tsk_apfs.hpp 41
/src/sleuthkit/tsk/pool/./../fs/../auto/guid.h 2
/src/sleuthkit/tsk/img/img_io.c 2
/src/sleuthkit/tsk/base/tsk_error.c 12
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/pool/./../fs/../pool/tsk_apfs.hpp 5
/src/sleuthkit/tsk/base/tsk_printf.c 3
/src/sleuthkit/tsk/fs/./tsk_apfs.hpp 18
/src/sleuthkit/tsk/pool/./../fs/../util/lw_shared_ptr.hpp 6
/src/sleuthkit/tsk/pool/apfs_pool_compat.cpp 1
/src/sleuthkit/tsk/fs/fs_open.c 3
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/img/unsupported_types.c 4
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.c 40
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_dir.c 24
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/fs/fs_file.c 13
/src/sleuthkit/tsk/fs/fs_inode.c 5
/src/sleuthkit/tsk/fs/fs_attrlist.c 10
/src/sleuthkit/tsk/fs/fs_attr.c 16
/src/sleuthkit/tsk/fs/fs_name.c 13
/src/sleuthkit/tsk/base/tsk_list.c 4
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/img/logical_img.c 1
/src/sleuthkit/tsk/fs/fs_load.c 1
/src/sleuthkit/tsk/fs/fs_block.c 5
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 19
/src/sleuthkit/tsk/fs/fatfs_dent.cpp 6
/src/sleuthkit/tsk/fs/fatfs.c 11
/src/sleuthkit/tsk/fs/fatxxfs.c 3
/src/sleuthkit/tsk/fs/exfatfs.c 15
/src/sleuthkit/tsk/fs/fatfs_utils.c 6
/src/sleuthkit/tsk/fs/exfatfs_meta.c 25
/src/sleuthkit/tsk/fs/fatfs_meta.c 1
/src/sleuthkit/tsk/fs/ffs.c 18
/src/sleuthkit/tsk/fs/ext2fs.c 27
/src/sleuthkit/tsk/fs/unix_misc.c 3
/src/sleuthkit/tsk/fs/hfs.c 50
/src/sleuthkit/tsk/fs/hfs_dent.c 5
/src/sleuthkit/tsk/fs/decmpfs.c 3
/src/sleuthkit/tsk/fs/ifind_lib.c 1
/src/sleuthkit/tsk/fs/iso9660.c 25
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 47
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/./../pool/tsk_apfs.hpp 1
/src/sleuthkit/tsk/fs/./../auto/guid.h 2
/src/sleuthkit/tsk/fs/./../util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/tsk/pool/./../fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/./apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/../../tsk/pool/tsk_pool.hpp 2
/src/sleuthkit/tsk/fs/fls_lib.c 3
/src/sleuthkit/tsk/base/md5c.c 8
/src/sleuthkit/tsk/base/sha1c.c 6
/src/sleuthkit/tsk/img/img_open.cpp 1

Analyses and suggestions

Optimal target analysis

Remaining optimal interesting functions

The following table shows a list of functions that are optimal targets. Optimal targets are identified by finding the functions that in combination, yield a high code coverage.

Func name Functions filename Arg count Args Function depth hitcount instr count bb count cyclomatic complexity Reachable functions Incoming references total cyclomatic complexity Unreached complexity
APFSFSCompat::load_attrs(TSK_FS_FILE*)const /src/sleuthkit/tsk/fs/apfs_compat.cpp 2 ['class.APFSFSCompat *', 'struct.TSK_FS_FILE *'] 24 0 1544 214 213 274 0 1065 479
fatxxfs_inode_lookup /src/sleuthkit/tsk/fs/fatxxfs_meta.c 3 ['struct.FATFS_INFO.1024 *', 'struct.TSK_FS_FILE *', 'size_t'] 14 0 198 27 12 63 0 715 403
APFSFSCompat::istat(TSK_FS_ISTAT_FLAG_ENUM,_IO_FILE*,unsignedlong,unsignedlong,int)const /src/sleuthkit/tsk/fs/apfs_compat.cpp 6 ['class.APFSFSCompat *', 'int', 'struct._IO_FILE *', 'size_t', 'size_t', 'int'] 13 0 1438 231 199 122 0 837 244
APFSFSCompat::fsstat(_IO_FILE*)const /src/sleuthkit/tsk/fs/apfs_compat.cpp 2 ['class.APFSFSCompat *', 'struct._IO_FILE *'] 20 0 888 158 111 243 0 663 209
APFSPoolCompat::poolstat(_IO_FILE*)const /src/sleuthkit/tsk/pool/apfs_pool_compat.cpp 2 ['class.APFSPoolCompat *', 'struct._IO_FILE *'] 24 0 1167 197 123 316 0 809 174
APFSSpaceman::unallocated_ranges()const /src/sleuthkit/tsk/fs/apfs.cpp 2 ['class.std::__1::vector.172 *', 'class.APFSSpaceman *'] 14 0 217 31 32 75 0 265 153
tsk_img_open_utf8_sing /src/sleuthkit/tsk/img/img_open.cpp 3 ['char *', 'int', 'int'] 7 0 27 3 2 50 0 209 141
fatfs_inode_walk /src/sleuthkit/tsk/fs/fatfs_meta.c 6 ['struct.TSK_FS_INFO.1595 *', 'size_t', 'size_t', 'int', 'func_type *', 'char *'] 13 0 1538 220 86 105 0 720 124
fatxxfs_dent_parse_buf /src/sleuthkit/tsk/fs/fatxxfs_dent.c 6 ['struct.FATFS_INFO.994 *', 'struct.TSK_FS_DIR *', 'char *', 'size_t', 'size_t *', 'int'] 9 0 1636 243 85 73 0 750 93
fatfs_make_data_runs /src/sleuthkit/tsk/fs/fatfs_meta.c 1 ['struct.TSK_FS_FILE.1596 *'] 12 0 1871 222 85 52 0 359 85

Implementing fuzzers that target the above functions will improve reachability such that it becomes:

Functions statically reachable by fuzzers
72.0%
835 / 1161
Cyclomatic complexity statically reachable by fuzzers
85.0%
10732 / 12570

All functions overview

If you implement fuzzers for these functions, the status of all functions in the project will be:

Func name Functions filename Args Function call depth Reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

/src/sleuthkit_mmls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_img_read', 'tsk_vs_mac_open', 'mac_load_table', 'tsk_malloc', 'tsk_vs_open', 'tsk_vs_read_block', 'tsk_take_lock', 'tsk_error_set_errstr', 'tsk_init_lock']

/src/sleuthkit_mmls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_img_read', 'tsk_vs_sun_open', 'sun_load_table', 'tsk_malloc', 'tsk_vs_read_block', 'tsk_take_lock', 'tsk_vs_open', 'tsk_error_set_errstr']

/src/sleuthkit_mmls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_vs_part_unused', 'dos_get_desc', 'dos_load_ext_table', 'dos_load_prim_table', 'tsk_vs_read_block', 'tsk_take_lock', 'tsk_vs_open', 'tsk_vs_part_add']

/src/sleuthkit_mmls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_vs_part_add', 'tsk_vs_gpt_open', 'tsk_vs_part_unused', 'tsk_error_set_errstr2', 'tsk_malloc', 'tsk_error_set_errstr', 'tsk_take_lock', 'tsk_vs_read_block', 'LLVMFuzzerTestOneInput', 'tsk_img_read']

/src/sleuthkit_fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


/src/sleuthkit_fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_fs_file_read', 'tsk_fs_file_attr_get', 'tsk_fs_dir_make_orphan_dir_name', 'tsk_fs_attr_add_run', 'ext2fs_open', 'tsk_fs_attr_read', 'tsk_fs_file_open_meta', 'tsk_fs_fls']

/src/sleuthkit_fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_fs_attr_read', 'hfs_open', 'tsk_fs_attr_set_run', 'tsk_fs_file_open_meta', 'hfs_make_catalog', 'tsk_fs_free', 'tsk_error_get_errno', 'tsk_error_set_errstr2']

/src/sleuthkit_fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['fatfs_open', 'tsk_fs_dir_make_orphan_dir_name', 'tsk_fs_read_block', 'tsk_fs_free', 'tsk_fs_file_open_meta', 'fatfs_dentry_load', 'tsk_fs_fls', 'fatfs_ptr_arg_is_null', 'fatfs_inum_arg_is_in_range', 'tsk_fs_attr_walk_nonres']

/src/sleuthkit_fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['ntfs_open', 'tsk_fs_read_block', 'tsk_fs_fls', 'tsk_fs_file_alloc', 'tsk_fs_attr_walk_nonres', 'ntfs_dir_open_meta', 'ntfs_load_secure', 'tsk_img_read']

/src/sleuthkit_fls_apfs_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_pool_open_img', 'APFSPool::APFSPool(std::__1::vector, std::__1::allocator > >&&, unsigned long)', 'APFSPoolCompat::APFSPoolCompat, std::__1::allocator > >, unsigned long long>(std::__1::vector, std::__1::allocator > >&&, unsigned long long&&)', 'APFSObject::obj_type() const', 'tsk_take_lock', 'tsk_error_set_errstr', 'tsk_release_lock', 'APFSPool::APFSPool(std::__1::vector, std::__1::allocator > >&&, unsigned long)', 'APFSPoolCompat::APFSPoolCompat, std::__1::allocator > >, unsigned long long>(std::__1::vector, std::__1::allocator > >&&, unsigned long long&&)', 'TSKPoolCompat::TSKPoolCompat, std::__1::allocator > >, unsigned long long>(TSK_POOL_TYPE_ENUM, std::__1::vector, std::__1::allocator > >&&, unsigned long long&&)']

Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
mac_load_table 115 32 27.82% ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer']
tsk_vs_open 150 17 11.33% ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer']
sun_load_table 86 35 40.69% ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer']
dos_load_prim_table 158 66 41.77% ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer']
dos_get_desc 525 20 3.809% ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer']
dos_load_ext_table 108 20 18.51% ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer']
tsk_vs_part_walk 35 16 45.71% ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer']
tsk_list_add 65 34 52.30% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
ext2fs_inode_walk 160 73 45.62% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
ext2fs_imap_load 49 25 51.02% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
ext2fs_group_load 98 42 42.85% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
ext2fs_dinode_load 92 46 50.0% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
ext4_load_attrs_extents 122 67 54.91% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
ext2fs_make_data_run_extent_index 82 32 39.02% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
print_dent_act 56 7 12.5% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
tsk_fs_attr_alloc 31 16 51.61% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
tsk_fs_attr_set_run 52 24 46.15% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
tsk_fs_attrlist_getnew 47 25 53.19% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
tsk_fs_dir_find_orphans 83 35 42.16% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
tsk_fs_read_decrypt 47 21 44.68% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
tsk_fs_read_block_decrypt 42 22 52.38% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
tsk_fs_open_img_decrypt 135 36 26.66% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
unix_make_data_run_indirect 98 21 21.42% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
hfs_open 300 76 25.33% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
hfs_inode_lookup 73 19 26.02% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
hfs_ext_find_extent_record_attr 303 31 10.23% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
fatfs_open 87 41 47.12% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
fatfs_getFAT 126 41 32.53% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
fatfs_dir_open_meta 139 69 49.64% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
fatfs_dentry_load 33 17 51.51% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
fatfs_make_data_runs 357 90 25.21% []
fatfs_inode_walk 362 144 39.77% []
fatfs_dos_2_unix_time 42 23 54.76% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
fatxxfs_open 298 137 45.97% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
fatxxfs_dent_parse_buf 266 112 42.10% []
fatxxfs_dinode_copy 239 104 43.51% []
fatxxfs_inode_lookup 53 25 47.16% []
is_83_name 87 28 32.18% []
tsk_fs_attr_walk 41 15 36.58% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
tsk_fs_attrlist_get_name_type 41 16 39.02% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
ntfs_dinode_lookup 202 68 33.66% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
ntfs_open 243 122 50.20% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
ntfs_proc_attrseq 514 249 48.44% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
ntfs_make_data_run 131 56 42.74% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
ntfs_inode_lookup 55 19 34.54% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
ntfs_load_ver 49 22 44.89% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
ntfs_load_bmap 97 51 52.57% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
ntfs_load_secure 134 27 20.14% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
ntfs_dir_open_meta 413 79 19.12% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
ntfs_proc_idxentry(NTFS_INFO*,TSK_FS_DIR*,unsignedchar,ntfs_idxentry*,unsignedint,unsignedint) 162 16 9.876% ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
APFSPool::APFSPool(std::__1::vector ,std::__1::allocator >>&&,unsignedlong) 49 16 32.65% ['sleuthkit_fls_apfs_fuzzer']
tsk_pool_open_img 42 20 47.61% ['sleuthkit_fls_apfs_fuzzer']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
/src/sleuthkit/tsk/fs/ext2fs_journal.c [] []
/src/sleuthkit/tsk/pool/./../fs/../auto/guid.h ['sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/iso9660.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/exfatfs_dent.c [] []
/src/sleuthkit/tsk/pool/./pool_compat.hpp ['sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/fs_types.c [] []
/src/sleuthkit/tsk/fs/fs_open.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer']
/src/sleuthkit/tsk/pool/apfs_pool.cpp ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_apfs_fuzzer']
/src/sleuthkit/tsk/pool/./../fs/../util/lw_shared_ptr.hpp ['sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/base/tsk_list.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer']
/src/sleuthkit/tsk/img/unsupported_types.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/ifind_lib.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/logical_fs.cpp ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/img/logical_img.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/vs/bsd.c ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer'] []
/src/sleuthkit/tsk/fs/fatxxfs_dent.c [] []
/src/sleuthkit/tsk/pool/pool_open.cpp ['sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_apfs_fuzzer']
/src/sleuthkit/tsk/img/img_io.c ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer', 'sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
/src/sleuthkit/tsk/pool/./../fs/tsk_apfs.hpp ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/util/detect_encryption.c ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer', 'sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/ntfs_dent.cpp ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_ntfs_fuzzer']
/src/sleuthkit/tsk/pool/./tsk_pool.hpp ['sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/lzvn.c [] []
/src/sleuthkit/tsk/fs/iso9660_dent.c [] []
/src/sleuthkit/tsk/fs/unix_misc.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_ext_fuzzer']
/src/sleuthkit/tsk/base/tsk_error.c ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer', 'sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/exfatfs_meta.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/apfs_compat.cpp ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/exfatfs.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/fatfs_utils.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_fat_fuzzer']
/src/sleuthkit/tsk/vs/gpt.c ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer'] ['sleuthkit_mmls_gpt_fuzzer']
/src/sleuthkit/tsk/fs/fs_name.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer']
/src/sleuthkit/tsk/vs/dos.c ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer'] ['sleuthkit_mmls_dos_fuzzer']
/src/sleuthkit/tsk/base/tsk_lock.c ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer', 'sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/apfs_open.cpp ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/pool/./../fs/../util/span.hpp [] []
/src/sleuthkit_fls_apfs_fuzzer.cc ['sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/ffs.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/fs_attrlist.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer']
/src/sleuthkit/tsk/img/raw.c [] []
/src/sleuthkit/tsk/pool/./../fs/../pool/tsk_apfs.hpp ['sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/auto/guid.cpp ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer']
/src/sleuthkit/tsk/vs/mac.c ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer'] ['sleuthkit_mmls_mac_fuzzer']
/src/sleuthkit/tsk/fs/ext2fs.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_ext_fuzzer']
/src/sleuthkit/tsk/base/tsk_printf.c ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer', 'sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/./../util/lw_shared_ptr.hpp ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer'] []
/src/sleuthkit/tsk/fs/fatfs_dent.cpp ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/./../util/span.hpp ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/fs_block.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/img/img_open.cpp ['sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/ext2fs_dent.c [] []
/src/sleuthkit/tsk/base/tsk_endian.c ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer', 'sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer']
/src/sleuthkit/tsk/fs/decmpfs.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/usr/local/bin/../include/c++/v1/math.h [] []
/src/sleuthkit/tsk/fs/../../tsk/pool/tsk_pool.hpp ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit_mmls_fuzzer.cc ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer'] ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer']
/src/sleuthkit/tsk/fs/./../auto/guid.h ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/hfs_dent.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/fatfs_meta.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/nofs_misc.c [] []
/src/sleuthkit/tsk/pool/./apfs_pool_compat.hpp ['sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/hfs_unicompare.c [] []
/src/sleuthkit/tsk/fs/./apfs_fs.hpp ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer'] []
/src/sleuthkit/tsk/base/mymalloc.c ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer', 'sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer']
/src/sleuthkit/tsk/fs/yaffs.cpp ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/ffs_dent.c [] []
/src/sleuthkit/tsk/fs/./tsk_apfs.hpp ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/./apfs_compat.hpp ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit_fls_fuzzer.cc ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer'] ['sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer']
/src/sleuthkit/tsk/fs/fatxxfs_meta.c [] []
/src/sleuthkit/tsk/util/file_system_utils.c [] []
/src/sleuthkit/tsk/fs/rawfs.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/fs_dir.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer']
/src/sleuthkit/tsk/fs/fs_attr.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer']
/src/sleuthkit/tsk/fs/hfs.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_hfs_fuzzer']
/src/sleuthkit/tsk/vs/mm_part.c ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer'] ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer']
/src/sleuthkit/tsk/fs/ntfs.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_ntfs_fuzzer']
/usr/local/bin/../include/c++/v1/iosfwd [] []
/src/sleuthkit/tsk/vs/mm_open.c ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer'] ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer']
/src/sleuthkit/tsk/fs/swapfs.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/hfs_journal.c [] []
/src/sleuthkit/tsk/base/sha1c.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/fs_io.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer']
/src/sleuthkit/tsk/img/mult_files.c [] []
/src/sleuthkit/tsk/pool/apfs_pool_compat.cpp ['sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/vs/mm_io.c ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer'] ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer']
/src/sleuthkit/tsk/base/md5c.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/./../pool/tsk_apfs.hpp ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/fs_load.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/pool/./../fs/apfs_fs.hpp ['sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/fs_inode.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer']
/src/sleuthkit/tsk/base/tsk_unicode.c ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer', 'sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_mmls_gpt_fuzzer', 'sleuthkit_fls_ntfs_fuzzer']
/src/sleuthkit/tsk/fs/fatfs.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_fat_fuzzer']
/src/sleuthkit/../sleuthkit_mem_img.h ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer', 'sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/fs_file.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer']
/src/sleuthkit/tsk/fs/apfs.cpp ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/fls_lib.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer']
/usr/local/bin/../include/c++/v1/stdexcept [] []
/src/sleuthkit/tsk/vs/sun.c ['sleuthkit_mmls_mac_fuzzer', 'sleuthkit_mmls_sun_fuzzer', 'sleuthkit_mmls_dos_fuzzer', 'sleuthkit_mmls_gpt_fuzzer'] ['sleuthkit_mmls_sun_fuzzer']
/src/sleuthkit/tsk/base/tsk_stack.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer']
/src/sleuthkit/tsk/fs/fatxxfs.c ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] ['sleuthkit_fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/apfs_fs.cpp ['sleuthkit_fls_iso9660_fuzzer', 'sleuthkit_fls_ext_fuzzer', 'sleuthkit_fls_hfs_fuzzer', 'sleuthkit_fls_fat_fuzzer', 'sleuthkit_fls_ntfs_fuzzer', 'sleuthkit_fls_apfs_fuzzer'] []

Directories in report

Directory
/src/sleuthkit/tsk/util/
/src/sleuthkit/tsk/fs/./../pool/
/src/
/src/sleuthkit/../
/src/sleuthkit/tsk/pool/./../fs/
/src/sleuthkit/tsk/fs/./
/src/sleuthkit/tsk/pool/./../fs/../auto/
/src/sleuthkit/tsk/pool/./../fs/../util/
/src/sleuthkit/tsk/img/
/src/sleuthkit/tsk/pool/
/src/sleuthkit/tsk/fs/./../util/
/src/sleuthkit/tsk/base/
/src/sleuthkit/tsk/fs/../../tsk/pool/
/src/sleuthkit/tsk/fs/
/src/sleuthkit/tsk/vs/
/src/sleuthkit/tsk/fs/./../auto/
/src/sleuthkit/tsk/pool/./
/src/sleuthkit/tsk/auto/
/usr/local/bin/../include/c++/v1/
/src/sleuthkit/tsk/pool/./../fs/../pool/

Metadata section

This sections shows the raw data that is used to produce this report. This is mainly used for further processing and developer debugging.

Fuzzer Calltree file Program data file Coverage file
sleuthkit_mmls_mac_fuzzer fuzzerLogFile-0-0sWSE9vRjq.data fuzzerLogFile-0-0sWSE9vRjq.data.yaml sleuthkit_mmls_mac_fuzzer.covreport
sleuthkit_mmls_sun_fuzzer fuzzerLogFile-0-DEXn7iZgSd.data fuzzerLogFile-0-DEXn7iZgSd.data.yaml sleuthkit_mmls_sun_fuzzer.covreport
sleuthkit_mmls_dos_fuzzer fuzzerLogFile-0-HITbHKEelS.data fuzzerLogFile-0-HITbHKEelS.data.yaml sleuthkit_mmls_dos_fuzzer.covreport
sleuthkit_mmls_gpt_fuzzer fuzzerLogFile-0-kEJHZftne6.data fuzzerLogFile-0-kEJHZftne6.data.yaml sleuthkit_mmls_gpt_fuzzer.covreport
sleuthkit_fls_iso9660_fuzzer fuzzerLogFile-0-kFK3XEVz7T.data fuzzerLogFile-0-kFK3XEVz7T.data.yaml sleuthkit_fls_iso9660_fuzzer.covreport
sleuthkit_fls_ext_fuzzer fuzzerLogFile-0-Oq7f8iscC8.data fuzzerLogFile-0-Oq7f8iscC8.data.yaml sleuthkit_fls_ext_fuzzer.covreport
sleuthkit_fls_hfs_fuzzer fuzzerLogFile-0-dX6DJ3j687.data fuzzerLogFile-0-dX6DJ3j687.data.yaml sleuthkit_fls_hfs_fuzzer.covreport
sleuthkit_fls_fat_fuzzer fuzzerLogFile-0-WlzLSktYFo.data fuzzerLogFile-0-WlzLSktYFo.data.yaml sleuthkit_fls_fat_fuzzer.covreport
sleuthkit_fls_ntfs_fuzzer fuzzerLogFile-0-D4SguPlMtb.data fuzzerLogFile-0-D4SguPlMtb.data.yaml sleuthkit_fls_ntfs_fuzzer.covreport
sleuthkit_fls_apfs_fuzzer fuzzerLogFile-0-yJvSoswBpB.data fuzzerLogFile-0-yJvSoswBpB.data.yaml sleuthkit_fls_apfs_fuzzer.covreport