Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues
Report generation date: 2025-07-18

Project overview: sleuthkit

High level conclusions

Reachability and coverage overview

Functions statically reachable by fuzzers
32.0%
436 / 1381
Cyclomatic complexity statically reachable by fuzzers
28.0%
4125 / 14697
Runtime code coverage of functions
43.0%
594 / 1381

Warning: The number of runtime covered functions are larger than the number of reachable functions. This means that Fuzz Introspector found there are more functions covered at runtime than what is considered reachable based on the static analysis. This is a limitation in the analysis as anything covered at runtime is by definition reachable by the fuzzers.
This is likely due to a limitation in the static analysis. In this case, the count of functions covered at runtime is the true value, which means this is what should be considered "achieved" by the fuzzer.

Use the project functions table below to query all functions that were not covered at runtime.

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: mmls_sun_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 711 90.4%
gold [1:9] 4 0.50%
yellow [10:29] 7 0.89%
greenyellow [30:49] 3 0.38%
lawngreen 50+ 61 7.76%
All colors 786 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
85 85 4 :

['strncmp', 'detectDiskEncryption', 'strcmp', 'free']

805 1328 tsk_vs_open call site: 00027 /src/sleuthkit/tsk/vs/mm_open.c:60
5 5 1 :

['img_read_no_cache(TSK_IMG_INFO*, long, char*, unsigned long)']

5 19 tsk_img_read_legacy call site: 00000 /src/sleuthkit/tsk/img/img_io.cpp:237
0 61 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 61 tsk_img_read call site: 00060 /src/sleuthkit/tsk/img/img_io.cpp:338
0 61 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 61 tsk_vs_read_block call site: 00044 /src/sleuthkit/tsk/vs/mm_io.c:34
0 61 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 61 tsk_vs_part_walk call site: 00776 /src/sleuthkit/tsk/vs/mm_part.c:256
0 61 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 61 tsk_vs_sun_open call site: 00634 /src/sleuthkit/tsk/vs/sun.c:359
0 5 1 :

['sun_close']

0 5 tsk_vs_sun_open call site: 00682 /src/sleuthkit/tsk/vs/sun.c:392
0 0 None 5 25 tsk_img_read_legacy call site: 00000 /src/sleuthkit/tsk/img/img_io.cpp:160
0 0 None 5 21 tsk_img_read_legacy call site: 00000 /src/sleuthkit/tsk/img/img_io.cpp:128
0 0 None 0 601 sun_load_table call site: 00642 /src/sleuthkit/tsk/vs/sun.c:241
0 0 None 0 304 sun_load_table call site: 00659 /src/sleuthkit/tsk/vs/sun.c:295
0 0 None 0 151 sun_load_table_sparc call site: 00650 /src/sleuthkit/tsk/vs/sun.c:156

Runtime coverage analysis

Covered functions
40
Functions that are reachable but not covered
56
Reachable functions
87
Percentage of reachable functions covered
35.63%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/mmls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 2
/src/sleuthkit/tsk/base/tsk_lock.c 2
/src/sleuthkit/tsk/vs/mm_open.c 1
/src/sleuthkit/tsk/base/tsk_error.c 10
/src/sleuthkit/tsk/vs/dos.c 5
/src/sleuthkit/tsk/base/mymalloc.c 1
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/vs/mm_io.c 1
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/base/tsk_endian.c 3
/src/sleuthkit/tsk/vs/mm_part.c 4
/src/sleuthkit/tsk/vs/bsd.c 4
/src/sleuthkit/tsk/vs/gpt.c 5
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/vs/sun.c 6
/src/sleuthkit/tsk/vs/mac.c 3
/src/sleuthkit/tsk/util/detect_encryption.c 8
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: mmls_mac_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 721 91.7%
gold [1:9] 3 0.38%
yellow [10:29] 2 0.25%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 60 7.63%
All colors 786 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
85 85 4 :

['strncmp', 'detectDiskEncryption', 'strcmp', 'free']

838 1328 tsk_vs_open call site: 00027 /src/sleuthkit/tsk/vs/mm_open.c:60
5 5 1 :

['img_read_no_cache(TSK_IMG_INFO*, long, char*, unsigned long)']

5 19 tsk_img_read_legacy call site: 00000 /src/sleuthkit/tsk/img/img_io.cpp:237
0 61 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 61 tsk_img_read call site: 00060 /src/sleuthkit/tsk/img/img_io.cpp:338
0 61 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 61 tsk_vs_mac_open call site: 00689 /src/sleuthkit/tsk/vs/mac.c:199
0 61 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 61 tsk_vs_read_block call site: 00044 /src/sleuthkit/tsk/vs/mm_io.c:34
0 61 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 61 tsk_vs_part_walk call site: 00776 /src/sleuthkit/tsk/vs/mm_part.c:256
0 5 1 :

['mac_close']

0 5 tsk_vs_mac_open call site: 00725 /src/sleuthkit/tsk/vs/mac.c:255
0 0 None 5 21 tsk_img_read_legacy call site: 00000 /src/sleuthkit/tsk/img/img_io.cpp:128
0 0 None 2 489 mac_load_table call site: 00694 /src/sleuthkit/tsk/vs/mac.c:35
0 0 None 2 453 mac_load_table call site: 00709 /src/sleuthkit/tsk/vs/mac.c:112
0 0 None 0 171 tsk_vs_mac_open call site: 00694 /src/sleuthkit/tsk/vs/mac.c:233
0 0 None 0 171 tsk_vs_mac_open call site: 00694 /src/sleuthkit/tsk/vs/mac.c:234

Runtime coverage analysis

Covered functions
37
Functions that are reachable but not covered
59
Reachable functions
87
Percentage of reachable functions covered
32.18%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/mmls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 2
/src/sleuthkit/tsk/base/tsk_lock.c 2
/src/sleuthkit/tsk/vs/mm_open.c 1
/src/sleuthkit/tsk/base/tsk_error.c 10
/src/sleuthkit/tsk/vs/dos.c 5
/src/sleuthkit/tsk/base/mymalloc.c 1
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/vs/mm_io.c 1
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/base/tsk_endian.c 3
/src/sleuthkit/tsk/vs/mm_part.c 4
/src/sleuthkit/tsk/vs/bsd.c 4
/src/sleuthkit/tsk/vs/gpt.c 5
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/vs/sun.c 6
/src/sleuthkit/tsk/vs/mac.c 3
/src/sleuthkit/tsk/util/detect_encryption.c 8
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: mmls_dos_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 546 69.4%
gold [1:9] 6 0.76%
yellow [10:29] 3 0.38%
greenyellow [30:49] 71 9.03%
lawngreen 50+ 160 20.3%
All colors 786 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
85 85 4 :

['strncmp', 'detectDiskEncryption', 'strcmp', 'free']

774 1328 tsk_vs_open call site: 00027 /src/sleuthkit/tsk/vs/mm_open.c:60
8 8 1 :

['strncmp']

58 801 dos_load_prim_table call site: 00073 /src/sleuthkit/tsk/vs/dos.c:892
5 5 1 :

['img_read_no_cache(TSK_IMG_INFO*, long, char*, unsigned long)']

5 19 tsk_img_read_legacy call site: 00000 /src/sleuthkit/tsk/img/img_io.cpp:237
0 61 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 61 tsk_img_read call site: 00060 /src/sleuthkit/tsk/img/img_io.cpp:338
0 61 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 61 tsk_vs_dos_open call site: 00029 /src/sleuthkit/tsk/vs/dos.c:1069
0 61 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 61 tsk_vs_read_block call site: 00044 /src/sleuthkit/tsk/vs/mm_io.c:34
0 61 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 61 tsk_vs_part_walk call site: 00776 /src/sleuthkit/tsk/vs/mm_part.c:256
0 5 1 :

['dos_close']

0 5 tsk_vs_dos_open call site: 00319 /src/sleuthkit/tsk/vs/dos.c:1103
0 0 None 58 998 dos_load_prim_table call site: 00040 /src/sleuthkit/tsk/vs/dos.c:849
0 0 None 50 465 dos_load_prim_table call site: 00097 /src/sleuthkit/tsk/vs/dos.c:964
0 0 None 50 465 dos_load_prim_table call site: 00259 /src/sleuthkit/tsk/vs/dos.c:1009
0 0 None 5 21 tsk_img_read_legacy call site: 00000 /src/sleuthkit/tsk/img/img_io.cpp:128

Runtime coverage analysis

Covered functions
39
Functions that are reachable but not covered
57
Reachable functions
87
Percentage of reachable functions covered
34.48%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/mmls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 2
/src/sleuthkit/tsk/base/tsk_lock.c 2
/src/sleuthkit/tsk/vs/mm_open.c 1
/src/sleuthkit/tsk/base/tsk_error.c 10
/src/sleuthkit/tsk/vs/dos.c 5
/src/sleuthkit/tsk/base/mymalloc.c 1
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/vs/mm_io.c 1
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/base/tsk_endian.c 3
/src/sleuthkit/tsk/vs/mm_part.c 4
/src/sleuthkit/tsk/vs/bsd.c 4
/src/sleuthkit/tsk/vs/gpt.c 5
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/vs/sun.c 6
/src/sleuthkit/tsk/vs/mac.c 3
/src/sleuthkit/tsk/util/detect_encryption.c 8
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: mmls_gpt_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 530 67.4%
gold [1:9] 3 0.38%
yellow [10:29] 1 0.12%
greenyellow [30:49] 2 0.25%
lawngreen 50+ 250 31.8%
All colors 786 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
85 85 4 :

['strncmp', 'detectDiskEncryption', 'strcmp', 'free']

679 1328 tsk_vs_open call site: 00027 /src/sleuthkit/tsk/vs/mm_open.c:60
0 61 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 61 tsk_img_read call site: 00060 /src/sleuthkit/tsk/img/img_io.cpp:338
0 61 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 61 tsk_vs_gpt_open call site: 00379 /src/sleuthkit/tsk/vs/gpt.c:590
0 61 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 61 tsk_vs_read_block call site: 00044 /src/sleuthkit/tsk/vs/mm_io.c:34
0 61 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 61 tsk_vs_part_walk call site: 00776 /src/sleuthkit/tsk/vs/mm_part.c:256
0 5 1 :

['gpt_close']

0 5 tsk_vs_gpt_open call site: 00622 /src/sleuthkit/tsk/vs/gpt.c:677
0 0 None 5 21 tsk_img_read_legacy call site: 00000 /src/sleuthkit/tsk/img/img_io.cpp:128
0 0 None 0 1198 gpt_load_table call site: 00384 /src/sleuthkit/tsk/vs/gpt.c:320
0 0 None 0 841 tsk_vs_gpt_open call site: 00609 /src/sleuthkit/tsk/vs/gpt.c:622
0 0 None 0 841 tsk_vs_gpt_open call site: 00610 /src/sleuthkit/tsk/vs/gpt.c:628
0 0 None 0 584 tsk_vs_gpt_open call site: 00613 /src/sleuthkit/tsk/vs/gpt.c:643
0 0 None 0 369 gpt_load_table call site: 00424 /src/sleuthkit/tsk/vs/gpt.c:498

Runtime coverage analysis

Covered functions
41
Functions that are reachable but not covered
55
Reachable functions
87
Percentage of reachable functions covered
36.78%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/mmls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 2
/src/sleuthkit/tsk/base/tsk_lock.c 2
/src/sleuthkit/tsk/vs/mm_open.c 1
/src/sleuthkit/tsk/base/tsk_error.c 10
/src/sleuthkit/tsk/vs/dos.c 5
/src/sleuthkit/tsk/base/mymalloc.c 1
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/vs/mm_io.c 1
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/base/tsk_endian.c 3
/src/sleuthkit/tsk/vs/mm_part.c 4
/src/sleuthkit/tsk/vs/bsd.c 4
/src/sleuthkit/tsk/vs/gpt.c 5
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/vs/sun.c 6
/src/sleuthkit/tsk/vs/mac.c 3
/src/sleuthkit/tsk/util/detect_encryption.c 8
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_btrfs_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1886 96.6%
gold [1:9] 3 0.15%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 63 3.22%
All colors 1952 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
228 228 6 :

['detectUnsupportedImageType', 'detectVolumeEncryption', 'tsk_error_get_errno', 'tsk_error_get_errstr', 'strncpy', 'free']

228 571 tsk_fs_open_img_decrypt call site: 00029 /src/sleuthkit/tsk/fs/fs_open.c:176
108 144 3 :

['tsk_malloc', 'free', 'tsk_fs_read_block_decrypt']

108 144 tsk_fs_read_decrypt call site: 00148 /src/sleuthkit/tsk/fs/fs_io.c:130
29 29 1 :

['logical_fs_open']

29 90 tsk_fs_open_img_decrypt call site: 00022 /src/sleuthkit/tsk/fs/fs_open.c:162
5 5 1 :

['img_read_no_cache(TSK_IMG_INFO*, long, char*, unsigned long)']

5 19 tsk_img_read_legacy call site: 00000 /src/sleuthkit/tsk/img/img_io.cpp:237
3 3 1 :

['tsk_list_free']

44 54 tsk_fs_free call site: 00523 /src/sleuthkit/tsk/fs/fs_open.c:360
0 83 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 83 tsk_fs_read_decrypt call site: 00144 /src/sleuthkit/tsk/fs/fs_io.c:112
0 61 3 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

0 61 tsk_img_read call site: 00069 /src/sleuthkit/tsk/img/img_io.cpp:338
0 0 None 802 1072 btrfs_open call site: 01274 /src/sleuthkit/tsk/fs/btrfs.cpp:4901
0 0 None 802 1021 btrfs_open call site: 01282 /src/sleuthkit/tsk/fs/btrfs.cpp:4916
0 0 None 802 843 btrfs_open call site: 01283 /src/sleuthkit/tsk/fs/btrfs.cpp:4961
0 0 None 5 25 tsk_img_read_legacy call site: 00000 /src/sleuthkit/tsk/img/img_io.cpp:157
0 0 None 5 21 tsk_img_read_legacy call site: 00000 /src/sleuthkit/tsk/img/img_io.cpp:128

Runtime coverage analysis

Covered functions
54
Functions that are reachable but not covered
620
Reachable functions
675
Percentage of reachable functions covered
8.15%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 27
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 57
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/./tsk/auto/guid.h 3
/src/sleuthkit/./tsk/util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_hfs_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1728 88.5%
gold [1:9] 10 0.51%
yellow [10:29] 0 0.0%
greenyellow [30:49] 10 0.51%
lawngreen 50+ 204 10.4%
All colors 1952 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
190 228 6 :

['detectUnsupportedImageType', 'detectVolumeEncryption', 'tsk_error_get_errno', 'tsk_error_get_errstr', 'strncpy', 'free']

190 571 tsk_fs_open_img_decrypt call site: 00029 /src/sleuthkit/tsk/fs/fs_open.c:176
148 148 1 :

['logicalfs_read']

148 148 tsk_fs_attr_read call site: 00381 /src/sleuthkit/tsk/fs/fs_attr.cpp:1134
108 144 3 :

['tsk_malloc', 'free', 'tsk_fs_read_block_decrypt']

108 144 tsk_fs_read_decrypt call site: 00148 /src/sleuthkit/tsk/fs/fs_io.c:130
50 50 1 :

['tsk_error_print']

50 89 tsk_fs_dir_get2 call site: 00933 /src/sleuthkit/tsk/fs/fs_dir.cpp:490
43 161 6 :

['tsk_error_reset', 'tsk_error_set_errno', 'tsk_fs_dir_free_name_internal(TSK_FS_NAME*)', 'tsk_error_set_errstr', 'tsk_fs_name_copy', 'tsk_fs_dir_realloc']

43 161 tsk_fs_dir_add call site: 00000 /src/sleuthkit/tsk/fs/fs_dir.cpp:238
43 104 4 :

['tsk_fs_dir_realloc', 'tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

43 156 tsk_fs_dir_add call site: 00000 /src/sleuthkit/tsk/fs/fs_dir.cpp:256
41 41 1 :

['tsk_fs_meta_realloc']

51 380 hfs_dinode_copy(HFS_INFO*,HFS_ENTRYconst*,TSK_FS_FILE*) call site: 00000 /src/sleuthkit/tsk/fs/hfs.cpp:2302
34 34 1 :

['tsk_fs_dir_reset']

46 722 hfs_dir_open_meta(TSK_FS_INFO*,TSK_FS_DIR**,unsignedlong,int) call site: 00000 /src/sleuthkit/tsk/fs/hfs_dent.cpp:459
29 29 1 :

['logical_fs_open']

29 90 tsk_fs_open_img_decrypt call site: 00022 /src/sleuthkit/tsk/fs/fs_open.c:162
13 17 2 :

['tsk_fs_name_free', 'tsk_fs_file_reset(TSK_FS_FILE*)']

13 46 tsk_fs_file_open_meta call site: 00206 /src/sleuthkit/tsk/fs/fs_file.cpp:117
10 10 1 :

['tsk_fs_attrlist_markunused']

10 2917 hfs_load_attrs(TSK_FS_FILE*) call site: 00000 /src/sleuthkit/tsk/fs/hfs.cpp:4746
10 10 1 :

['tsk_fs_attrlist_markunused']

10 339 hfs_dinode_copy(HFS_INFO*,HFS_ENTRYconst*,TSK_FS_FILE*) call site: 00000 /src/sleuthkit/tsk/fs/hfs.cpp:2310

Runtime coverage analysis

Covered functions
138
Functions that are reachable but not covered
583
Reachable functions
675
Percentage of reachable functions covered
13.63%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 27
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 57
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/./tsk/auto/guid.h 3
/src/sleuthkit/./tsk/util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_apfs_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1733 84.2%
gold [1:9] 182 8.85%
yellow [10:29] 43 2.09%
greenyellow [30:49] 43 2.09%
lawngreen 50+ 55 2.67%
All colors 2056 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
228 228 6 :

['detectUnsupportedImageType', 'detectVolumeEncryption', 'tsk_error_get_errno', 'tsk_error_get_errstr', 'strncpy', 'free']

228 571 tsk_fs_open_img_decrypt call site: 00285 /src/sleuthkit/tsk/fs/fs_open.c:176
170 992 7 :

['APFSBtreeNodeIterator ::APFSBtreeNodeIterator(APFSJObjBtreeNode const*, unsigned int, APFSBtreeNodeIterator &&)', 'APFSBtreeNodeIterator ::operator==(APFSBtreeNodeIterator const&) const', 'lw_shared_ptr ::operator->() const', 'APFSBtreeNodeIterator APFSJObjBtreeNode::find (unsigned long const&, APFSJObjTree::jobjs(unsigned long) const::{lambda(auto:1 const&, auto:2 const&)#1}) const', 'std::__1::unique_ptr , std::__1::default_delete > >::operator->[abi:ne180100]() const', 'APFSBtreeNodeIterator ::APFSBtreeNodeIterator(APFSJObjBtreeNode const*, unsigned int, int)', 'APFSBtreeNodeIterator ::~APFSBtreeNodeIterator()']

170 1692 APFSBtreeNodeIterator APFSJObjBtreeNode::find (unsignedlongconst&,APFSJObjTree::jobjs(unsignedlong)const::{lambda(auto:1const&,auto:2const&)#1})const call site: 00000 /src/sleuthkit/tsk/fs/tsk_apfs.hpp:669
152 155 15 :

['tsk_fs_dir_add', 'APFSJObject::valid() const', 'std::__1::basic_string , std::__1::allocator >::c_str[abi:ne180100]() const', 'unsigned short bitfield_value (unsigned short, int, int)', 'std::__1::vector >::begin[abi:ne180100]() const', 'std::__1::basic_string , std::__1::allocator >::length[abi:ne180100]() const', 'std::__1::vector >::end[abi:ne180100]() const', 'std::__1::__wrap_iter ::operator++[abi:ne180100]()', 'to_name_type(APFS_ITEM_TYPE)', 'tsk_fs_name_alloc', 'bool std::__1::operator!=[abi:ne180100] (std::__1::__wrap_iter const&, std::__1::__wrap_iter const&)', 'tsk_fs_name_free', 'strncpy', 'std::__1::__wrap_iter ::operator*[abi:ne180100]() const', 'APFSJObject::children() const']

160 285 APFSFSCompat::dir_open_meta(TSK_FS_DIR**,unsignedlong,int)const call site: 00000 /src/sleuthkit/tsk/fs/apfs_compat.cpp:512
150 387 6 :

['APFSBtreeNodeIterator >::APFSBtreeNodeIterator(APFSBtreeNode const*, unsigned int, APFSBtreeNodeIterator >&&)', 'APFSBtreeNodeIterator >::operator==(APFSBtreeNodeIterator > const&) const', 'std::__1::unique_ptr >, std::__1::default_delete > > >::operator->[abi:ne180100]() const', 'APFSBtreeNodeIterator >::~APFSBtreeNodeIterator()', 'lw_shared_ptr >::operator->() const', 'APFSBtreeNodeIterator > APFSBtreeNode ::find (unsigned long const&, APFSObjectBtreeNode::find(unsigned long) const::$_0) const']

150 1062 APFSBtreeNodeIterator >APFSBtreeNode ::find (unsignedlongconst&,APFSObjectBtreeNode::find(unsignedlong)const::$_0)const call site: 00000 /src/sleuthkit/tsk/fs/tsk_apfs.hpp:526
34 34 1 :

['tsk_fs_dir_reset']

194 470 APFSFSCompat::dir_open_meta(TSK_FS_DIR**,unsignedlong,int)const call site: 00000 /src/sleuthkit/tsk/fs/apfs_compat.cpp:500
29 29 1 :

['logical_fs_open']

29 90 tsk_fs_open_img_decrypt call site: 00281 /src/sleuthkit/tsk/fs/fs_open.c:162
18 18 1 :

['save_inum_named(TSK_FS_INFO*, DENT_DINFO*)']

18 20 tsk_fs_dir_walk_internal call site: 02005 /src/sleuthkit/tsk/fs/fs_dir.cpp:1014
17 17 2 :

['tsk_fs_name_free', 'tsk_fs_file_reset(TSK_FS_FILE*)']

17 46 tsk_fs_file_open_meta call site: 00446 /src/sleuthkit/tsk/fs/fs_file.cpp:117
11 11 1 :

['tsk_fs_attrlist_free']

11 11 tsk_fs_meta_close call site: 00454 /src/sleuthkit/tsk/fs/fs_inode.c:119
10 10 6 :

['__cxa_allocate_exception', 'APFSObject::~APFSObject()', 'std::runtime_error::runtime_error(char const*)', '__cxa_free_exception', 'std::__1::unique_ptr >::~unique_ptr[abi:ne180100]()', '__cxa_throw']

10 10 APFSSuperblock::APFSSuperblock(APFSPoolconst&,unsignedlong) call site: 00000 /src/sleuthkit/tsk/fs/apfs.cpp:217
10 10 5 :

['__cxa_allocate_exception', 'std::runtime_error::runtime_error(char const*)', '__cxa_free_exception', 'APFSBtreeNode ::~APFSBtreeNode()', '__cxa_throw']

10 10 APFSJObjBtreeNode::APFSJObjBtreeNode(APFSObjectBtreeNodeconst*,unsignedlong,unsignedcharconst*) call site: 00000 /src/sleuthkit/tsk/fs/apfs.cpp:650
10 10 5 :

['__cxa_allocate_exception', 'std::runtime_error::runtime_error(char const*)', '__cxa_free_exception', 'APFSBtreeNode ::~APFSBtreeNode()', '__cxa_throw']

10 10 APFSObjectBtreeNode::APFSObjectBtreeNode(APFSPoolconst&,unsignedlong) call site: 00000 /src/sleuthkit/tsk/fs/apfs.cpp:671

Runtime coverage analysis

Covered functions
216
Functions that are reachable but not covered
479
Reachable functions
736
Percentage of reachable functions covered
34.92%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_apfs_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/pool/pool_open.cpp 2
/src/sleuthkit/tsk/pool/apfs_pool_compat.hpp 1
/src/sleuthkit/tsk/pool/pool_compat.hpp 6
/src/sleuthkit/tsk/pool/apfs_pool.cpp 5
/src/sleuthkit/tsk/pool/tsk_pool.hpp 7
/src/sleuthkit/tsk/auto/guid.cpp 4
/src/sleuthkit/tsk/fs/apfs.cpp 28
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 45
/src/sleuthkit/./tsk/auto/guid.h 4
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 25
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/pool/apfs_pool_compat.cpp 1
/src/sleuthkit/tsk/img/img_open.cpp 1
/src/sleuthkit/tsk/fs/fs_open.c 3
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 1
/src/sleuthkit/./tsk/util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 2
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5

Fuzzer: fls_fat_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1769 90.6%
gold [1:9] 32 1.63%
yellow [10:29] 25 1.28%
greenyellow [30:49] 27 1.38%
lawngreen 50+ 99 5.07%
All colors 1952 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
190 228 6 :

['detectUnsupportedImageType', 'detectVolumeEncryption', 'tsk_error_get_errno', 'tsk_error_get_errstr', 'strncpy', 'free']

190 571 tsk_fs_open_img_decrypt call site: 00029 /src/sleuthkit/tsk/fs/fs_open.c:176
50 70 2 :

['tsk_error_print', 'tsk_error_reset']

50 70 exfatfs_inode_lookup call site: 00000 /src/sleuthkit/tsk/fs/exfatfs_meta.cpp:1675
50 70 2 :

['tsk_error_print', 'tsk_error_reset']

50 70 fatxxfs_inode_lookup call site: 00000 /src/sleuthkit/tsk/fs/fatxxfs_meta.cpp:733
50 50 2 :

['tsk_fs_attr_walk_res(TSK_FS_ATTR const*, TSK_FS_FILE_WALK_FLAG_ENUM, TSK_WALK_RET_ENUM (*)(TSK_FS_FILE*, long, unsigned long, char*, unsigned long, TSK_FS_BLOCK_FLAG_ENUM, void*), void*)', 'fflush']

50 50 tsk_fs_attr_walk call site: 00000 /src/sleuthkit/tsk/fs/fs_attr.cpp:1087
43 43 1 :

['fs_prepost_read']

43 43 tsk_fs_read_block_decrypt call site: 00156 /src/sleuthkit/tsk/fs/fs_io.c:249
41 41 1 :

['tsk_fs_meta_realloc']

41 827 fatxxfs_dinode_copy call site: 00000 /src/sleuthkit/tsk/fs/fatxxfs_meta.cpp:349
41 41 1 :

['tsk_fs_meta_realloc']

41 51 exfatfs_inode_copy_init(FATFS_INFO*,unsignedlong,unsignedchar,TSK_FS_FILE*) call site: 00000 /src/sleuthkit/tsk/fs/exfatfs_meta.cpp:1394
34 34 1 :

['tsk_fs_dir_reset']

40 1419 fatfs_dir_open_meta call site: 00000 /src/sleuthkit/tsk/fs/fatfs_dent.cpp:256
29 29 1 :

['logical_fs_open']

29 90 tsk_fs_open_img_decrypt call site: 00022 /src/sleuthkit/tsk/fs/fs_open.c:162
13 17 2 :

['tsk_fs_name_free', 'tsk_fs_file_reset(TSK_FS_FILE*)']

13 46 tsk_fs_file_open_meta call site: 00206 /src/sleuthkit/tsk/fs/fs_file.cpp:117
8 44 3 :

['strncpy', 'tsk_realloc', 'strlen']

8 44 fs_attr_put_name(TSK_FS_ATTR*,charconst*) call site: 00000 /src/sleuthkit/tsk/fs/fs_attr.cpp:184
6 6 1 :

['tsk_fs_meta_reset']

6 426 fatfs_inode_lookup call site: 00000 /src/sleuthkit/tsk/fs/fatfs_meta.cpp:339

Runtime coverage analysis

Covered functions
186
Functions that are reachable but not covered
576
Reachable functions
675
Percentage of reachable functions covered
14.67%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 27
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 57
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/./tsk/auto/guid.h 3
/src/sleuthkit/./tsk/util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_ntfs_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1670 85.5%
gold [1:9] 39 1.99%
yellow [10:29] 13 0.66%
greenyellow [30:49] 7 0.35%
lawngreen 50+ 223 11.4%
All colors 1952 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
190 228 6 :

['detectUnsupportedImageType', 'detectVolumeEncryption', 'tsk_error_get_errno', 'tsk_error_get_errstr', 'strncpy', 'free']

190 571 tsk_fs_open_img_decrypt call site: 00029 /src/sleuthkit/tsk/fs/fs_open.c:176
148 148 1 :

['logicalfs_read']

148 148 tsk_fs_attr_read call site: 00381 /src/sleuthkit/tsk/fs/fs_attr.cpp:1134
43 104 4 :

['tsk_fs_dir_realloc', 'tsk_error_reset', 'tsk_error_set_errno', 'tsk_error_set_errstr']

43 156 tsk_fs_dir_add call site: 00000 /src/sleuthkit/tsk/fs/fs_dir.cpp:256
43 43 1 :

['tsk_fs_dir_realloc']

43 95 tsk_fs_dir_copy(TSK_FS_DIRconst*,TSK_FS_DIR*) call site: 00000 /src/sleuthkit/tsk/fs/fs_dir.cpp:131
43 43 1 :

['fs_prepost_read']

43 43 tsk_fs_read_block_decrypt call site: 00156 /src/sleuthkit/tsk/fs/fs_io.c:249
40 124 2 :

['tsk_error_get', 'ntfs_close(TSK_FS_INFO*)']

40 124 ntfs_open call site: 00357 /src/sleuthkit/tsk/fs/ntfs.cpp:5572
40 40 1 :

['tsk_error_get']

40 124 ntfs_open call site: 00204 /src/sleuthkit/tsk/fs/ntfs.cpp:5517
40 40 1 :

['tsk_error_get']

40 124 ntfs_open call site: 00254 /src/sleuthkit/tsk/fs/ntfs.cpp:5553
40 40 1 :

['tsk_error_get']

40 124 ntfs_open call site: 00268 /src/sleuthkit/tsk/fs/ntfs.cpp:5562
34 34 1 :

['tsk_fs_dir_reset']

40 3142 ntfs_dir_open_meta call site: 00000 /src/sleuthkit/tsk/fs/ntfs_dent.cpp:810
32 333 3 :

['tsk_malloc', 'ntfs_proc_sii(TSK_FS_INFO*, NTFS_SXX_BUFFER*)', 'tsk_fs_attr_read']

51 372 ntfs_load_secure(NTFS_INFO*) call site: 00000 /src/sleuthkit/tsk/fs/ntfs.cpp:3944
29 29 1 :

['logical_fs_open']

29 90 tsk_fs_open_img_decrypt call site: 00022 /src/sleuthkit/tsk/fs/fs_open.c:162

Runtime coverage analysis

Covered functions
157
Functions that are reachable but not covered
576
Reachable functions
675
Percentage of reachable functions covered
14.67%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 27
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 57
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/./tsk/auto/guid.h 3
/src/sleuthkit/./tsk/util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_ext_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1771 90.7%
gold [1:9] 19 0.97%
yellow [10:29] 6 0.30%
greenyellow [30:49] 10 0.51%
lawngreen 50+ 146 7.47%
All colors 1952 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
190 228 6 :

['detectUnsupportedImageType', 'detectVolumeEncryption', 'tsk_error_get_errno', 'tsk_error_get_errstr', 'strncpy', 'free']

190 571 tsk_fs_open_img_decrypt call site: 00029 /src/sleuthkit/tsk/fs/fs_open.c:176
148 148 1 :

['logicalfs_read']

148 148 tsk_fs_attr_read call site: 00381 /src/sleuthkit/tsk/fs/fs_attr.cpp:1134
43 43 1 :

['fs_prepost_read']

43 43 tsk_fs_read_block_decrypt call site: 00156 /src/sleuthkit/tsk/fs/fs_io.c:249
41 41 1 :

['tsk_fs_meta_realloc']

41 595 ext2fs_dinode_copy(EXT2FS_INFO*,TSK_FS_FILE*,unsignedlong,ext2fs_inodeconst*,unsignedcharconst*,unsignedlong) call site: 00000 /src/sleuthkit/tsk/fs/ext2fs.cpp:853
34 34 1 :

['tsk_fs_dir_reset']

34 1234 ext2fs_dir_open_meta call site: 00000 /src/sleuthkit/tsk/fs/ext2fs_dent.cpp:290
29 29 1 :

['logical_fs_open']

29 90 tsk_fs_open_img_decrypt call site: 00022 /src/sleuthkit/tsk/fs/fs_open.c:162
13 17 2 :

['tsk_fs_name_free', 'tsk_fs_file_reset(TSK_FS_FILE*)']

13 46 tsk_fs_file_open_meta call site: 00206 /src/sleuthkit/tsk/fs/fs_file.cpp:117
7 7 1 :

['ext2fs_print_map(unsigned char*, int)']

7 7 ext2fs_imap_load(EXT2FS_INFO*,unsignedlong) call site: 00000 /src/sleuthkit/tsk/fs/ext2fs.cpp:451
6 42 3 :

['strncpy', 'tsk_realloc', 'strlen']

6 42 tsk_fs_name_copy call site: 00941 /src/sleuthkit/tsk/fs/fs_name.cpp:185
6 6 1 :

['tsk_fs_meta_reset']

6 602 ext2fs_inode_lookup(TSK_FS_INFO*,TSK_FS_FILE*,unsignedlong) call site: 00000 /src/sleuthkit/tsk/fs/ext2fs.cpp:1047
5 5 1 :

['dump_attr(TSK_FS_ATTR*)']

5 5 tsk_fs_attr_add_run call site: 00000 /src/sleuthkit/tsk/fs/fs_attr.cpp:553
5 5 1 :

['dump_attr(TSK_FS_ATTR*)']

5 5 tsk_fs_attr_add_run call site: 00000 /src/sleuthkit/tsk/fs/fs_attr.cpp:662

Runtime coverage analysis

Covered functions
125
Functions that are reachable but not covered
600
Reachable functions
675
Percentage of reachable functions covered
11.11%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 27
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 57
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/./tsk/auto/guid.h 3
/src/sleuthkit/./tsk/util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_iso9660_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1763 90.3%
gold [1:9] 11 0.56%
yellow [10:29] 11 0.56%
greenyellow [30:49] 6 0.30%
lawngreen 50+ 161 8.24%
All colors 1952 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
190 228 6 :

['detectUnsupportedImageType', 'detectVolumeEncryption', 'tsk_error_get_errno', 'tsk_error_get_errstr', 'strncpy', 'free']

190 571 tsk_fs_open_img_decrypt call site: 00029 /src/sleuthkit/tsk/fs/fs_open.c:176
148 148 1 :

['logicalfs_read']

148 148 tsk_fs_attr_read call site: 00381 /src/sleuthkit/tsk/fs/fs_attr.cpp:1134
108 144 3 :

['tsk_malloc', 'free', 'tsk_fs_read_block_decrypt']

108 144 tsk_fs_read_decrypt call site: 00148 /src/sleuthkit/tsk/fs/fs_io.c:130
41 41 1 :

['tsk_fs_meta_realloc']

53 53 iso9660_dinode_copy(ISO_INFO*,TSK_FS_META*,unsignedlong,iso9660_inode*) call site: 00000 /src/sleuthkit/tsk/fs/iso9660.cpp:1115
34 34 1 :

['tsk_fs_dir_reset']

34 1215 iso9660_dir_open_meta(TSK_FS_INFO*,TSK_FS_DIR**,unsignedlong,int) call site: 00000 /src/sleuthkit/tsk/fs/iso9660_dent.cpp:259
29 29 1 :

['logical_fs_open']

29 90 tsk_fs_open_img_decrypt call site: 00022 /src/sleuthkit/tsk/fs/fs_open.c:162
24 290 2 :

['tsk_error_errstr2_concat', 'tsk_fs_dir_load_inum_named']

44 621 iso9660_inode_walk(TSK_FS_INFO*,unsignedlong,unsignedlong,TSK_FS_META_FLAG_ENUM,TSK_WALK_RET_ENUM(*)(TSK_FS_FILE*,void*),void*) call site: 00000 /src/sleuthkit/tsk/fs/iso9660.cpp:1329
24 279 2 :

['tsk_error_errstr2_concat', 'tsk_fs_dir_walk_internal']

24 279 find_orphan_meta_walk_cb(TSK_FS_FILE*,void*) call site: 00000 /src/sleuthkit/tsk/fs/fs_dir.cpp:1314
24 24 1 :

['tsk_error_errstr2_concat']

24 24 tsk_fs_dir_load_inum_named call site: 00000 /src/sleuthkit/tsk/fs/fs_dir.cpp:1178
13 17 2 :

['tsk_fs_name_free', 'tsk_fs_file_reset(TSK_FS_FILE*)']

13 46 tsk_fs_file_open_meta call site: 00206 /src/sleuthkit/tsk/fs/fs_file.cpp:117
10 10 1 :

['tsk_fs_attrlist_markunused']

63 63 iso9660_dinode_copy(ISO_INFO*,TSK_FS_META*,unsignedlong,iso9660_inode*) call site: 00000 /src/sleuthkit/tsk/fs/iso9660.cpp:1111
10 10 1 :

['tsk_fs_attrlist_markunused']

12 12 tsk_fs_dir_make_orphan_dir_meta call site: 00000 /src/sleuthkit/tsk/fs/fs_dir.cpp:1102

Runtime coverage analysis

Covered functions
111
Functions that are reachable but not covered
587
Reachable functions
675
Percentage of reachable functions covered
13.04%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 27
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 57
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/./tsk/auto/guid.h 3
/src/sleuthkit/./tsk/util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/img/img_open.cpp 1

Analyses and suggestions

Optimal target analysis

Remaining optimal interesting functions

The following table shows a list of functions that are optimal targets. Optimal targets are identified by finding the functions that in combination, yield a high code coverage.

Func name Functions filename Arg count Args Function depth hitcount instr count bb count cyclomatic complexity Reachable functions Incoming references total cyclomatic complexity Unreached complexity
hfs_istat(TSK_FS_INFO*,TSK_FS_ISTAT_FLAG_ENUM,_IO_FILE*,unsignedlong,unsignedlong,int) /src/sleuthkit/tsk/fs/hfs.cpp 6 ['N/A', 'int', 'N/A', 'size_t', 'size_t', 'int'] 12 0 4198 472 462 132 0 1425 866
APFSFSCompat::APFSFSCompat(TSK_IMG_INFO*,_TSK_POOL_INFOconst*,unsignedlong,charconst*)::$_11::__invoke(TSK_FS_FILE*) /src/sleuthkit/tsk/fs/apfs_compat.cpp 1 ['N/A'] 25 0 17 3 2 325 0 1139 657
fatxxfs_inode_lookup /src/sleuthkit/tsk/fs/fatxxfs_meta.cpp 3 ['N/A', 'N/A', 'size_t'] 12 0 194 27 12 66 0 691 505
ntfs_proc_attrseq(NTFS_INFO*,TSK_FS_FILE*,ntfs_attrconst*,unsignedlong,unsignedlong,NTFS_ATTRLIST_MAPconst*,TSK_STACK*) /src/sleuthkit/tsk/fs/ntfs.cpp 7 ['N/A', 'N/A', 'N/A', 'size_t', 'size_t', 'N/A', 'N/A'] 14 0 7380 472 169 98 5 928 450
ext2fs_fsstat(TSK_FS_INFO*,_IO_FILE*) /src/sleuthkit/tsk/fs/ext2fs.cpp 2 ['N/A', 'N/A'] 11 0 10662 567 176 76 0 630 437
APFSPoolCompat::poolstat(_IO_FILE*)const /src/sleuthkit/tsk/pool/apfs_pool_compat.cpp 2 ['N/A', 'N/A'] 23 0 1148 197 123 388 0 1026 391
hfs_inode_walk(TSK_FS_INFO*,unsignedlong,unsignedlong,TSK_FS_META_FLAG_ENUM,TSK_WALK_RET_ENUM(*)(TSK_FS_FILE*,void*),void*) /src/sleuthkit/tsk/fs/hfs.cpp 6 ['N/A', 'size_t', 'size_t', 'int', 'N/A', 'N/A'] 12 0 367 63 16 183 0 1373 386
ntfs_dir_open_meta /src/sleuthkit/tsk/fs/ntfs_dent.cpp 4 ['N/A', 'N/A', 'size_t', 'int'] 13 0 3403 275 102 161 0 895 361
exfatfs_fsstat /src/sleuthkit/tsk/fs/exfatfs.cpp 2 ['N/A', 'N/A'] 15 0 104 21 6 112 0 672 310
APFSFSCompat::APFSFSCompat(TSK_IMG_INFO*,_TSK_POOL_INFOconst*,unsignedlong,charconst*)::$_4::__invoke(TSK_FS_INFO*,TSK_FS_ISTAT_FLAG_ENUM,_IO_FILE*,unsignedlong,unsignedlong,int) /src/sleuthkit/tsk/fs/apfs_compat.cpp 6 ['N/A', 'int', 'N/A', 'size_t', 'size_t', 'int'] 15 0 37 3 2 141 0 815 250

Implementing fuzzers that target the above functions will improve reachability such that it becomes:

Functions statically reachable by fuzzers
52.0%
722 / 1381
Cyclomatic complexity statically reachable by fuzzers
57.9%
8557 / 14697

All functions overview

If you implement fuzzers for these functions, the status of all functions in the project will be:

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

/src/sleuthkit/ossfuzz/mmls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_vs_part_unused', 'tsk_vs_part_add', 'tsk_vs_sun_open', 'tsk_error_set_errstr2', 'tsk_malloc', 'tsk_error_set_errstr', 'tsk_vs_read_block', 'tsk_img_read', 'LLVMFuzzerTestOneInput']

/src/sleuthkit/ossfuzz/mmls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_vs_part_unused', 'tsk_vs_part_add', 'tsk_vs_mac_open', 'tsk_error_set_errstr2', 'tsk_malloc', 'tsk_error_set_errstr', 'tsk_vs_read_block', 'tsk_img_read', 'tsk_vs_open', 'LLVMFuzzerTestOneInput']

/src/sleuthkit/ossfuzz/mmls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_vs_part_unused', 'dos_load_ext_table', 'dos_load_prim_table', 'tsk_vs_read_block', 'tsk_vs_open', 'LLVMFuzzerTestOneInput', 'tsk_error_set_errstr', 'tsk_malloc', 'tsk_vs_dos_open']

/src/sleuthkit/ossfuzz/mmls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_vs_part_add', 'tsk_vs_gpt_open', 'tsk_vs_part_unused', 'tsk_error_set_errstr2', 'tsk_malloc', 'tsk_error_set_errstr', 'tsk_vs_read_block', 'tsk_img_read', 'LLVMFuzzerTestOneInput']

/src/sleuthkit/ossfuzz/fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_fs_free', 'btrfs_open', 'tsk_fs_read_decrypt', 'tsk_take_lock', 'tsk_img_read', 'tsk_error_set_errstr', 'tsk_fs_read', 'tsk_malloc', 'tsk_release_lock', 'tsk_deinit_lock']

/src/sleuthkit/ossfuzz/fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['hfs_open', 'tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int)', 'tsk_fs_free', 'tsk_take_lock', 'tsk_fs_attr_run_alloc', 'tsk_error_errstr2_concat', 'tsk_img_read', 'tsk_error_set_errstr2', 'tsk_fs_file_close', 'tsk_fs_attr_read']

/src/sleuthkit/ossfuzz/fls_apfs_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int)', 'tsk_fs_file_close', 'APFSFileSystem::APFSFileSystem(APFSPool const&, unsigned long)', 'tsk_malloc', 'tsk_take_lock', 'tsk_release_lock', 'tsk_fs_dir_walk_recursive(TSK_FS_INFO*, DENT_DINFO*, unsigned long, TSK_FS_DIR_WALK_FLAG_ENUM, TSK_WALK_RET_ENUM (*)(TSK_FS_FILE*, char const*, void*), void*, int)', 'apfs_open', 'LLVMFuzzerTestOneInput', 'APFSBtreeNodeIterator > APFSBtreeNode::find(unsigned long const&, APFSObjectBtreeNode::find(unsigned long) const::$_0) const']

/src/sleuthkit/ossfuzz/fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_fs_name_copy', 'fatfs_open', 'tsk_take_lock', 'tsk_malloc', 'tsk_error_errstr2_concat', 'fatxxfs_open', 'tsk_fs_read_block', 'tsk_error_set_errstr2', 'tsk_fs_attr_free', 'tsk_fs_attr_run_alloc']

/src/sleuthkit/ossfuzz/fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_fs_file_attr_get_idx', 'tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int)', 'tsk_fs_free', 'tsk_take_lock', 'tsk_img_read', 'tsk_fs_attr_free', 'ntfs_load_secure(NTFS_INFO*)', 'tsk_fs_attr_read', 'ntfs_load_secure(NTFS_INFO*)', 'tsk_error_set_errstr']

/src/sleuthkit/ossfuzz/fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_fs_name_copy', 'tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int)', 'ext2fs_open', 'tsk_take_lock', 'tsk_fs_free', 'tsk_error_errstr2_concat', 'tsk_img_read', 'tsk_fs_read_block', 'tsk_error_set_errstr2', 'tsk_fs_attr_run_alloc']

/src/sleuthkit/ossfuzz/fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['iso9660_open', 'tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int)', 'tsk_fs_attr_free', 'tsk_fs_free', 'tsk_take_lock', 'tsk_fs_attr_run_alloc', 'tsk_img_read', 'tsk_fs_name_copy', 'tsk_error_set_errstr2', 'tsk_fs_attr_read']

Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
tsk_img_read 33 18 54.54% ['fls_btrfs_fuzzer', 'fls_ext_fuzzer', 'mmls_sun_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_fat_fuzzer', 'mmls_gpt_fuzzer', 'fls_ntfs_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_hfs_fuzzer']
tsk_vs_open 151 17 11.25% ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_sun_fuzzer']
tsk_vs_part_walk 35 16 45.71% ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_sun_fuzzer']
dos_load_prim_table 158 81 51.26% ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_sun_fuzzer']
btrfs_open 104 41 39.42% ['fls_btrfs_fuzzer', 'fls_ext_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_hfs_fuzzer']
tsk_fs_open_img_decrypt 158 50 31.64% ['fls_btrfs_fuzzer', 'fls_ext_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_hfs_fuzzer']
print_dent_act(TSK_FS_FILE*,charconst*,void*) 56 7 12.5% ['fls_ext_fuzzer', 'fls_iso9660_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_hfs_fuzzer']
tsk_fs_attr_alloc 31 16 51.61% ['fls_ext_fuzzer', 'fls_iso9660_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_hfs_fuzzer']
hfs_follow_hard_link(HFS_INFO*,hfs_file*,unsignedchar*) 89 27 30.33% ['fls_hfs_fuzzer']
hfs_load_attrs(TSK_FS_FILE*) 233 118 50.64% ['fls_hfs_fuzzer']
APFSFSCompat::dir_open_meta(TSK_FS_DIR**,unsignedlong,int)const 66 17 25.75% ['fls_apfs_fuzzer']
APFSFSCompat::file_add_meta(TSK_FS_FILE*,unsignedlong)const 72 19 26.38% ['fls_apfs_fuzzer']
APFSBtreeNodeIterator APFSJObjBtreeNode::find (unsignedlongconst&,APFSJObjTree::jobjs(unsignedlong)const::{lambda(auto:1const&,auto:2const&)#1})const 43 7 16.27% ['fls_apfs_fuzzer']
tsk_pool_open_img 42 20 47.61% ['fls_apfs_fuzzer']
exfatfs_get_fs_layout(FATFS_INFO*) 78 30 38.46% ['fls_btrfs_fuzzer', 'fls_ext_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_hfs_fuzzer']
exfatfs_inode_lookup 59 28 47.45% ['fls_fat_fuzzer']
fatfs_getFAT 126 69 54.76% ['fls_fat_fuzzer']
fatfs_dentry_load 33 17 51.51% ['fls_fat_fuzzer']
fatfs_make_data_runs 353 187 52.97% ['fls_fat_fuzzer']
fatfs_inode_walk 340 150 44.11% ['fls_fat_fuzzer']
fatxxfs_open 300 151 50.33% ['fls_btrfs_fuzzer', 'fls_ext_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_hfs_fuzzer']
fatxxfs_inode_lookup 53 25 47.16% ['fls_fat_fuzzer']
tsk_fs_attr_walk 41 21 51.21% ['fls_fat_fuzzer', 'fls_ntfs_fuzzer']
ntfs_load_secure(NTFS_INFO*) 127 51 40.15% ['fls_btrfs_fuzzer', 'fls_ext_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_hfs_fuzzer']
ext2fs_make_data_run_extent_index(TSK_FS_INFO*,TSK_FS_ATTR*,TSK_FS_ATTR*,unsignedlong,unsignedlong*) 82 44 53.65% ['fls_ext_fuzzer']
iso9660_inode_walk(TSK_FS_INFO*,unsignedlong,unsignedlong,TSK_FS_META_FLAG_ENUM,TSK_WALK_RET_ENUM(*)(TSK_FS_FILE*,void*),void*) 114 51 44.73% ['fls_iso9660_fuzzer']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
/usr/local/bin/../include/c++/v1/sstream [] []
/src/sleuthkit/tsk/img/img_io.cpp ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/fs/fs_dir.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/fs/fatxxfs.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/encryptionHelper.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/base/tsk_stack.c ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/img/logical_img.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] []
/src/sleuthkit/tsk/fs/yaffs.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] []
/src/sleuthkit/tsk/img/legacy_cache.cpp ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/base/tsk_error.c ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/fs/unix_misc.cpp [] []
/src/sleuthkit/tsk/base/tsk_printf.c ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] []
/src/sleuthkit/tsk/base/crc.c ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_btrfs_fuzzer']
/src/sleuthkit/tsk/fs/exfatfs_dent.cpp [] []
/src/sleuthkit/tsk/base/tsk_unicode.c ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['mmls_gpt_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/fs/fs_open.c ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/pool/tsk_apfs.hpp ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/fatfs_meta.cpp [] []
/src/sleuthkit/tsk/fs/fatfs.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/xfs.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] []
/src/sleuthkit/tsk/img/unsupported_types.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] []
/src/sleuthkit/tsk/fs/fs_attr.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_hfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/img/img_open.h [] []
/usr/local/bin/../include/c++/v1/stdexcept [] []
/src/sleuthkit/tsk/fs/fs_load.cpp [] []
/src/sleuthkit/tsk/vs/bsd.c ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer'] []
/src/sleuthkit/tsk/fs/fs_block.c [] []
/src/sleuthkit/./tsk/auto/guid.h ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] []
/src/sleuthkit/tsk/fs/ext2fs.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_ext_fuzzer']
/src/sleuthkit/ossfuzz/fls_fuzzer.cc ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/fs/apfs_compat.hpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/base/md5c.c [] []
/src/sleuthkit/tsk/fs/fs_file.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/fs/ffs_dent.cpp [] []
/src/sleuthkit/tsk/fs/iso9660.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_iso9660_fuzzer']
/src/sleuthkit/ossfuzz/fls_apfs_fuzzer.cc ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/vs/dos.c ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer'] ['mmls_dos_fuzzer']
/src/sleuthkit/ossfuzz/mem_img.h ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/./tsk/pool/tsk_pool.hpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/btrfs.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_btrfs_fuzzer']
/src/sleuthkit/tsk/fs/fs_inode.c ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/fs/fs_attrlist.c ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_hfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/logical_fs.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/fs/decmpfs.cpp [] []
/src/sleuthkit/tsk/pool/apfs_pool_compat.hpp ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/fs_io.c ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/fs/fatxxfs_meta.cpp [] []
/src/sleuthkit/ossfuzz/mmls_fuzzer.cc ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer'] ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer']
/src/sleuthkit/tsk/fs/fs_types.c [] []
/src/sleuthkit/tsk/vs/mm_part.c ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer'] ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer']
/src/sleuthkit/tsk/fs/swapfs.c ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] []
/src/sleuthkit/tsk/fs/apfs_open.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/vs/sun.c ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer'] ['mmls_sun_fuzzer']
/src/sleuthkit/tsk/fs/fls_lib.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/base/sha1c.c [] []
/src/sleuthkit/tsk/img/img_open.cpp ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/vs/mm_open.c ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer'] ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer']
/src/sleuthkit/tsk/base/mymalloc.c ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/pool/apfs_pool.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/pool/pool_compat.hpp ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/apfs_fs.hpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] []
/src/sleuthkit/tsk/fs/tsk_xfs.h [] []
/src/sleuthkit/tsk/fs/ext2fs_dent.cpp [] []
/src/sleuthkit/tsk/fs/tsk_apfs.hpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/fatfs_dent.cpp [] []
/src/sleuthkit/tsk/fs/hfs_journal.cpp [] []
/src/sleuthkit/tsk/fs/lzvn.c [] []
/src/sleuthkit/tsk/fs/ffs.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] []
/usr/local/bin/../include/c++/v1/__exception/exception.h [] []
/src/sleuthkit/tsk/fs/apfs_compat.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/vs/mm_io.c ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer'] ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer']
/src/sleuthkit/tsk/util/detect_encryption.c ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] []
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] []
/usr/local/bin/../include/c++/v1/string [] []
/src/sleuthkit/./tsk/fs/apfs_fs.hpp ['fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/ifind_lib.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_hfs_fuzzer']
/src/sleuthkit/tsk/base/tsk_lock.c ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/img/raw.cpp [] []
/src/sleuthkit/tsk/vs/gpt.c ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer'] ['mmls_gpt_fuzzer']
/src/sleuthkit/tsk/fs/ntfs.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_ntfs_fuzzer']
/src/sleuthkit/tsk/fs/xfs_dent.cpp [] []
/src/sleuthkit/tsk/fs/btrfs_csum.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_btrfs_fuzzer']
/src/sleuthkit/tsk/auto/guid.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/fs/apfs_fs.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/pool/tsk_pool.hpp ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/apfs.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/base/tsk_endian.c ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/fs/ntfs_dent.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_ntfs_fuzzer']
/src/sleuthkit/tsk/pool/apfs_pool_compat.cpp ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/img/mult_files.cpp [] []
/src/sleuthkit/tsk/vs/mac.c ['mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'mmls_gpt_fuzzer'] ['mmls_mac_fuzzer']
/src/sleuthkit/tsk/fs/fs_name.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_hfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/fs/hfs.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_hfs_fuzzer']
/src/sleuthkit/tsk/fs/hfs_unicompare.cpp [] []
/src/sleuthkit/tsk/util/file_system_utils.cpp [] []
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/rawfs.c ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] []
/src/sleuthkit/tsk/fs/exfatfs.cpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/nofs_misc.cpp [] []
/src/sleuthkit/tsk/fs/tsk_btrfs.h ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] []
/src/sleuthkit/tsk/fs/hfs_dent.cpp [] []
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/ext2fs_journal.cpp [] []
/src/sleuthkit/./tsk/util/span.hpp ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] []
/src/sleuthkit/tsk/fs/iso9660_dent.cpp [] []
/src/sleuthkit/tsk/pool/pool_open.cpp ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/base/tsk_list.c ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer']
/src/sleuthkit/tsk/fs/fatfs_utils.c ['fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_iso9660_fuzzer'] ['fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/fatxxfs_dent.c [] []

Directories in report

Directory
/src/sleuthkit/tsk/fs/
/usr/local/bin/../include/c++/v1/
/src/sleuthkit/tsk/base/
/src/sleuthkit/tsk/vs/
/src/sleuthkit/ossfuzz/
/src/sleuthkit/./tsk/util/
/src/sleuthkit/./tsk/fs/
/src/sleuthkit/tsk/pool/
/src/sleuthkit/./tsk/auto/
/src/sleuthkit/tsk/auto/
/usr/local/bin/../include/c++/v1/__exception/
/src/sleuthkit/tsk/util/
/src/sleuthkit/tsk/img/
/src/sleuthkit/./tsk/pool/