Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues
Report generation date: 2025-10-10

Project overview: sleuthkit

High level conclusions

Reachability and coverage overview

Functions statically reachable by fuzzers
31.0%
436 / 1385
Cyclomatic complexity statically reachable by fuzzers
28.0%
4129 / 14707
Runtime code coverage of functions
43.0%
596 / 1385

Warning: The number of runtime covered functions are larger than the number of reachable functions. This means that Fuzz Introspector found there are more functions covered at runtime than what is considered reachable based on the static analysis. This is a limitation in the analysis as anything covered at runtime is by definition reachable by the fuzzers.
This is likely due to a limitation in the static analysis. In this case, the count of functions covered at runtime is the true value, which means this is what should be considered "achieved" by the fuzzer.

Use the project functions table below to query all functions that were not covered at runtime.

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: mmls_gpt_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 525 66.7%
gold [1:9] 3 0.38%
yellow [10:29] 1 0.12%
greenyellow [30:49] 3 0.38%
lawngreen 50+ 254 32.3%
All colors 786 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
221 98 tsk_vs_part_add call site: 00098 dos_load_ext_table
146 622 tsk_vs_gpt_open call site: 00622 tsk_vs_dos_open
54 324 tsk_vs_part_unused call site: 00324 tsk_vs_gpt_open
29 68 tsk_error_set_errstr2 call site: 00068 tsk_vs_part_add
13 34 tsk_malloc call site: 00034 dos_load_prim_table
10 23 tsk_error_set_errstr call site: 00023 tsk_vs_dos_open
6 48 tsk_vs_read_block call site: 00048 tsk_error_set_errstr
6 60 tsk_img_read call site: 00060 tsk_error_set_errstr
6 773 LLVMFuzzerTestOneInput call site: 00773 tsk_error_set_errstr
3 379 tsk_vs_gpt_open call site: 00379 tsk_error_set_errstr
3 769 tsk_vs_open call site: 00769 tsk_error_set_errstr
2 6 tsk_init_lock call site: 00006 fprintf

Runtime coverage analysis

Covered functions
41
Functions that are reachable but not covered
55
Reachable functions
87
Percentage of reachable functions covered
36.78%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/mmls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 2
/src/sleuthkit/tsk/base/tsk_lock.c 2
/src/sleuthkit/tsk/vs/mm_open.c 1
/src/sleuthkit/tsk/base/tsk_error.c 10
/src/sleuthkit/tsk/vs/dos.c 5
/src/sleuthkit/tsk/base/mymalloc.c 1
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/vs/mm_io.c 1
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/base/tsk_endian.c 3
/src/sleuthkit/tsk/vs/mm_part.c 4
/src/sleuthkit/tsk/vs/bsd.c 4
/src/sleuthkit/tsk/vs/gpt.c 5
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/vs/sun.c 6
/src/sleuthkit/tsk/vs/mac.c 3
/src/sleuthkit/tsk/util/detect_encryption.c 8
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: mmls_mac_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 721 91.7%
gold [1:9] 3 0.38%
yellow [10:29] 2 0.25%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 60 7.63%
All colors 786 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
364 324 tsk_vs_part_unused call site: 00324 tsk_vs_gpt_open
221 98 tsk_vs_part_add call site: 00098 dos_load_ext_table
40 725 tsk_vs_mac_open call site: 00725 tsk_vs_dos_open
29 68 tsk_error_set_errstr2 call site: 00068 tsk_vs_part_add
13 34 tsk_malloc call site: 00034 dos_load_prim_table
10 23 tsk_error_set_errstr call site: 00023 tsk_vs_dos_open
9 48 tsk_vs_read_block call site: 00048 tsk_error_set_errstr
6 60 tsk_img_read call site: 00060 tsk_error_set_errstr
6 766 tsk_vs_open call site: 00766 tsk_vs_gpt_open
6 773 LLVMFuzzerTestOneInput call site: 00773 tsk_error_set_errstr
3 689 tsk_vs_mac_open call site: 00689 tsk_error_set_errstr
2 6 tsk_init_lock call site: 00006 fprintf

Runtime coverage analysis

Covered functions
37
Functions that are reachable but not covered
59
Reachable functions
87
Percentage of reachable functions covered
32.18%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/mmls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 2
/src/sleuthkit/tsk/base/tsk_lock.c 2
/src/sleuthkit/tsk/vs/mm_open.c 1
/src/sleuthkit/tsk/base/tsk_error.c 10
/src/sleuthkit/tsk/vs/dos.c 5
/src/sleuthkit/tsk/base/mymalloc.c 1
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/vs/mm_io.c 1
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/base/tsk_endian.c 3
/src/sleuthkit/tsk/vs/mm_part.c 4
/src/sleuthkit/tsk/vs/bsd.c 4
/src/sleuthkit/tsk/vs/gpt.c 5
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/vs/sun.c 6
/src/sleuthkit/tsk/vs/mac.c 3
/src/sleuthkit/tsk/util/detect_encryption.c 8
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: mmls_sun_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 711 90.4%
gold [1:9] 6 0.76%
yellow [10:29] 5 0.63%
greenyellow [30:49] 3 0.38%
lawngreen 50+ 61 7.76%
All colors 786 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
309 324 tsk_vs_part_unused call site: 00324 tsk_vs_gpt_open
221 98 tsk_vs_part_add call site: 00098 dos_load_ext_table
85 682 tsk_vs_sun_open call site: 00682 tsk_vs_dos_open
29 68 tsk_error_set_errstr2 call site: 00068 tsk_vs_part_add
13 34 tsk_malloc call site: 00034 dos_load_prim_table
10 23 tsk_error_set_errstr call site: 00023 tsk_vs_dos_open
9 48 tsk_vs_read_block call site: 00048 tsk_error_set_errstr
6 60 tsk_img_read call site: 00060 tsk_error_set_errstr
6 773 LLVMFuzzerTestOneInput call site: 00773 tsk_error_set_errstr
4 639 tsk_vs_sun_open call site: 00639 tsk_error_set_errstr
4 768 tsk_vs_open call site: 00768 tsk_vs_gpt_open
3 634 tsk_vs_sun_open call site: 00634 tsk_error_set_errstr

Runtime coverage analysis

Covered functions
40
Functions that are reachable but not covered
56
Reachable functions
87
Percentage of reachable functions covered
35.63%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/mmls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 2
/src/sleuthkit/tsk/base/tsk_lock.c 2
/src/sleuthkit/tsk/vs/mm_open.c 1
/src/sleuthkit/tsk/base/tsk_error.c 10
/src/sleuthkit/tsk/vs/dos.c 5
/src/sleuthkit/tsk/base/mymalloc.c 1
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/vs/mm_io.c 1
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/base/tsk_endian.c 3
/src/sleuthkit/tsk/vs/mm_part.c 4
/src/sleuthkit/tsk/vs/bsd.c 4
/src/sleuthkit/tsk/vs/gpt.c 5
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/vs/sun.c 6
/src/sleuthkit/tsk/vs/mac.c 3
/src/sleuthkit/tsk/util/detect_encryption.c 8
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: mmls_dos_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 546 69.4%
gold [1:9] 6 0.76%
yellow [10:29] 3 0.38%
greenyellow [30:49] 86 10.9%
lawngreen 50+ 145 18.4%
All colors 786 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
440 324 tsk_vs_part_unused call site: 00324 tsk_vs_gpt_open
27 282 dos_load_ext_table call site: 00282 tsk_error_print
22 72 dos_load_prim_table call site: 00072 tsk_error_set_errstr
9 48 tsk_vs_read_block call site: 00048 tsk_error_set_errstr
7 765 tsk_vs_open call site: 00765 tsk_vs_gpt_open
6 773 LLVMFuzzerTestOneInput call site: 00773 tsk_error_set_errstr
5 23 tsk_error_set_errstr call site: 00023 tsk_vs_dos_open
5 34 tsk_malloc call site: 00034 tsk_error_set_errstr
3 29 tsk_vs_dos_open call site: 00029 tsk_error_set_errstr
3 44 dos_load_prim_table call site: 00044 tsk_error_set_errstr
3 60 tsk_img_read call site: 00060 tsk_error_set_errstr
2 6 tsk_init_lock call site: 00006 fprintf

Runtime coverage analysis

Covered functions
39
Functions that are reachable but not covered
57
Reachable functions
87
Percentage of reachable functions covered
34.48%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/mmls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 2
/src/sleuthkit/tsk/base/tsk_lock.c 2
/src/sleuthkit/tsk/vs/mm_open.c 1
/src/sleuthkit/tsk/base/tsk_error.c 10
/src/sleuthkit/tsk/vs/dos.c 5
/src/sleuthkit/tsk/base/mymalloc.c 1
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/vs/mm_io.c 1
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/base/tsk_endian.c 3
/src/sleuthkit/tsk/vs/mm_part.c 4
/src/sleuthkit/tsk/vs/bsd.c 4
/src/sleuthkit/tsk/vs/gpt.c 5
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/vs/sun.c 6
/src/sleuthkit/tsk/vs/mac.c 3
/src/sleuthkit/tsk/util/detect_encryption.c 8
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_btrfs_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1886 96.6%
gold [1:9] 3 0.15%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 63 3.22%
All colors 1952 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
742 530 tsk_fs_free call site: 00530 hfs_open
640 1307 btrfs_open call site: 01307 apfs_open
232 164 tsk_fs_read_decrypt call site: 00164 tsk_fs_attr_read
115 398 tsk_take_lock call site: 00398 tsk_fs_attr_read
68 69 tsk_img_read call site: 00069 ntfs_open
26 24 tsk_error_set_errstr call site: 00024 detectUnsupportedImageType
19 144 tsk_fs_read call site: 00144 tsk_fs_read_block_decrypt
15 51 tsk_malloc call site: 00051 tsk_img_read
5 514 tsk_release_lock call site: 00514 tsk_release_lock
4 520 tsk_deinit_lock call site: 00520 tsk_fs_free
3 140 tsk_fs_malloc call site: 00140 tsk_fs_read
3 525 tsk_fs_free call site: 00525 tsk_fs_dir_close

Runtime coverage analysis

Covered functions
54
Functions that are reachable but not covered
620
Reachable functions
675
Percentage of reachable functions covered
8.15%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 27
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 57
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/./tsk/auto/guid.h 3
/src/sleuthkit/./tsk/util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_iso9660_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1763 90.3%
gold [1:9] 12 0.61%
yellow [10:29] 10 0.51%
greenyellow [30:49] 5 0.25%
lawngreen 50+ 162 8.29%
All colors 1952 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
758 1124 iso9660_open call site: 01124 apfs_open
317 612 tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int) call site: 00612 hfs_open
104 217 tsk_fs_attr_free call site: 00217 ntfs_dinode_lookup
81 530 tsk_fs_free call site: 00530 fatfs_open
76 398 tsk_take_lock call site: 00398 logicalfs_read_block
74 322 tsk_fs_attr_run_alloc call site: 00322 tsk_fs_attr_read
68 69 tsk_img_read call site: 00069 ntfs_open
47 941 tsk_fs_name_copy call site: 00941 tsk_fs_path2inum
37 169 tsk_error_set_errstr2 call site: 00169 tsk_fs_file_open_meta
27 486 tsk_fs_attr_read call site: 00486 tsk_fs_attr_read
26 1076 parse_susp(TSK_FS_INFO*, char*, int, _IO_FILE*, int) call site: 01076 tsk_error_print
15 51 tsk_malloc call site: 00051 tsk_img_read

Runtime coverage analysis

Covered functions
111
Functions that are reachable but not covered
587
Reachable functions
675
Percentage of reachable functions covered
13.04%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 27
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 57
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/./tsk/auto/guid.h 3
/src/sleuthkit/./tsk/util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_hfs_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1729 88.5%
gold [1:9] 10 0.51%
yellow [10:29] 1 0.05%
greenyellow [30:49] 6 0.30%
lawngreen 50+ 206 10.5%
All colors 1952 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
901 981 hfs_open call site: 00981 apfs_open
192 612 tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int) call site: 00612 ext2fs_open
78 530 tsk_fs_free call site: 00530 fatfs_open
76 398 tsk_take_lock call site: 00398 logicalfs_read_block
74 322 tsk_fs_attr_run_alloc call site: 00322 tsk_fs_attr_read
70 251 tsk_error_errstr2_concat call site: 00251 ntfs_dinode_lookup
68 69 tsk_img_read call site: 00069 ntfs_open
37 169 tsk_error_set_errstr2 call site: 00169 tsk_fs_file_open_meta
30 218 tsk_fs_file_close call site: 00218 tsk_error_get
27 486 tsk_fs_attr_read call site: 00486 tsk_fs_attr_read
22 952 tsk_fs_dir_get2 call site: 00952 tsk_fs_file_attr_get_idx
15 51 tsk_malloc call site: 00051 tsk_img_read

Runtime coverage analysis

Covered functions
138
Functions that are reachable but not covered
583
Reachable functions
675
Percentage of reachable functions covered
13.63%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 27
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 57
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/./tsk/auto/guid.h 3
/src/sleuthkit/./tsk/util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_ext_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1771 90.7%
gold [1:9] 19 0.97%
yellow [10:29] 6 0.30%
greenyellow [30:49] 6 0.30%
lawngreen 50+ 150 7.68%
All colors 1952 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
941 941 tsk_fs_name_copy call site: 00941 apfs_open
135 612 tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int) call site: 00612 fatxxfs_open
125 804 ext2fs_open call site: 00804 hfs_open
84 398 tsk_take_lock call site: 00398 logicalfs_read_block
81 530 tsk_fs_free call site: 00530 fatfs_open
70 251 tsk_error_errstr2_concat call site: 00251 ntfs_dinode_lookup
68 69 tsk_img_read call site: 00069 ntfs_open
45 351 tsk_fs_read_block call site: 00351 tsk_fs_attr_read
37 169 tsk_error_set_errstr2 call site: 00169 tsk_fs_file_open_meta
28 322 tsk_fs_attr_run_alloc call site: 00322 tsk_fs_read_block
27 486 tsk_fs_attr_read call site: 00486 tsk_fs_attr_read
25 217 tsk_fs_attr_free call site: 00217 tsk_error_get

Runtime coverage analysis

Covered functions
125
Functions that are reachable but not covered
600
Reachable functions
675
Percentage of reachable functions covered
11.11%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 27
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 57
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/./tsk/auto/guid.h 3
/src/sleuthkit/./tsk/util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_fat_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1766 90.4%
gold [1:9] 16 0.81%
yellow [10:29] 32 1.63%
greenyellow [30:49] 31 1.58%
lawngreen 50+ 107 5.48%
All colors 1952 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
937 945 tsk_fs_name_copy call site: 00945 apfs_open
230 699 fatfs_open call site: 00699 hfs_open
115 398 tsk_take_lock call site: 00398 tsk_fs_attr_read
86 51 tsk_malloc call site: 00051 ntfs_open
70 251 tsk_error_errstr2_concat call site: 00251 ntfs_dinode_lookup
48 557 fatxxfs_open call site: 00557 tsk_fs_read
45 351 tsk_fs_read_block call site: 00351 tsk_fs_attr_read
37 169 tsk_error_set_errstr2 call site: 00169 tsk_fs_file_open_meta
31 217 tsk_fs_attr_free call site: 00217 tsk_error_get
28 322 tsk_fs_attr_run_alloc call site: 00322 tsk_fs_read_block
24 639 exfatfs_get_fs_layout(FATFS_INFO*) call site: 00639 tsk_error_set_errstr
14 24 tsk_error_set_errstr call site: 00024 logical_fs_open

Runtime coverage analysis

Covered functions
185
Functions that are reachable but not covered
576
Reachable functions
675
Percentage of reachable functions covered
14.67%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 27
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 57
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/./tsk/auto/guid.h 3
/src/sleuthkit/./tsk/util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_ntfs_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1691 86.6%
gold [1:9] 41 2.10%
yellow [10:29] 4 0.20%
greenyellow [30:49] 6 0.30%
lawngreen 50+ 210 10.7%
All colors 1952 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
913 969 tsk_fs_file_attr_get_idx call site: 00969 apfs_open
317 612 tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int) call site: 00612 hfs_open
81 530 tsk_fs_free call site: 00530 fatfs_open
73 398 tsk_take_lock call site: 00398 logicalfs_read_block
72 56 tsk_malloc call site: 00056 detectVolumeEncryption
24 217 tsk_fs_attr_free call site: 00217 tsk_error_get
21 175 ntfs_open call site: 00175 tsk_error_set_errstr
17 379 ntfs_load_secure(NTFS_INFO*) call site: 00379 logicalfs_read
16 474 tsk_fs_attr_read call site: 00474 tsk_fs_read_decrypt
16 491 ntfs_load_secure(NTFS_INFO*) call site: 00491 tsk_fs_attr_read
14 24 tsk_error_set_errstr call site: 00024 logical_fs_open
11 39 tsk_error_get_errno call site: 00039 detectUnsupportedImageType

Runtime coverage analysis

Covered functions
157
Functions that are reachable but not covered
576
Reachable functions
675
Percentage of reachable functions covered
14.67%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 27
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 57
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/./tsk/auto/guid.h 3
/src/sleuthkit/./tsk/util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_apfs_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1733 84.2%
gold [1:9] 182 8.85%
yellow [10:29] 43 2.09%
greenyellow [30:49] 54 2.62%
lawngreen 50+ 44 2.14%
All colors 2056 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
801 851 tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int) call site: 00851 hfs_open
182 454 tsk_fs_file_close call site: 00454 tsk_fs_attr_read
149 1679 APFSFileSystem::APFSFileSystem(APFSPool const&, unsigned long) call site: 01679 tsk_fprintf
140 306 tsk_malloc call site: 00306 ntfs_open
115 638 tsk_take_lock call site: 00638 tsk_fs_attr_read
96 754 tsk_release_lock call site: 00754 fatfs_open
45 2006 tsk_fs_dir_walk_recursive(TSK_FS_INFO*, DENT_DINFO*, unsigned long, TSK_FS_DIR_WALK_FLAG_ENUM, TSK_WALK_RET_ENUM (*)(TSK_FS_FILE*, char const*, void*), void*, int) call site: 02006 tsk_list_add
40 1949 apfs_open call site: 01949 xfs_open
27 278 LLVMFuzzerTestOneInput call site: 00278 detectUnsupportedImageType
10 1853 APFSBtreeNodeIterator > APFSBtreeNode ::find (unsigned long const&, APFSObjectBtreeNode::find(unsigned long) const::$_0) const call site: 01853
8 1654 apfs_open call site: 01654 tsk_error_set_errstr
7 14 APFSPool::APFSPool(std::__1::vector , std::__1::allocator > >&&, unsigned long) call site: 00014 __clang_call_terminate

Runtime coverage analysis

Covered functions
219
Functions that are reachable but not covered
479
Reachable functions
736
Percentage of reachable functions covered
34.92%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_apfs_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/pool/pool_open.cpp 2
/src/sleuthkit/tsk/pool/apfs_pool_compat.hpp 1
/src/sleuthkit/tsk/pool/pool_compat.hpp 6
/src/sleuthkit/tsk/pool/apfs_pool.cpp 5
/src/sleuthkit/tsk/pool/tsk_pool.hpp 7
/src/sleuthkit/tsk/auto/guid.cpp 4
/src/sleuthkit/tsk/fs/apfs.cpp 28
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 45
/src/sleuthkit/./tsk/auto/guid.h 4
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 25
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/pool/apfs_pool_compat.cpp 1
/src/sleuthkit/tsk/img/img_open.cpp 1
/src/sleuthkit/tsk/fs/fs_open.c 3
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 1
/src/sleuthkit/./tsk/util/span.hpp 4
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 2
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5

Analyses and suggestions

Optimal target analysis

Remaining optimal interesting functions

The following table shows a list of functions that are optimal targets. Optimal targets are identified by finding the functions that in combination, yield a high code coverage.

Func name Functions filename Arg count Args Function depth hitcount instr count bb count cyclomatic complexity Reachable functions Incoming references total cyclomatic complexity Unreached complexity
hfs_istat(TSK_FS_INFO*,TSK_FS_ISTAT_FLAG_ENUM,_IO_FILE*,unsignedlong,unsignedlong,int) /src/sleuthkit/tsk/fs/hfs.cpp 6 ['N/A', 'int', 'N/A', 'size_t', 'size_t', 'int'] 12 0 4162 472 462 132 0 1425 866
APFSFSCompat::APFSFSCompat(TSK_IMG_INFO*,_TSK_POOL_INFOconst*,unsignedlong,charconst*)::$_11::__invoke(TSK_FS_FILE*) /src/sleuthkit/tsk/fs/apfs_compat.cpp 1 ['N/A'] 25 0 16 3 2 325 0 1141 657
fatxxfs_inode_lookup /src/sleuthkit/tsk/fs/fatxxfs_meta.cpp 3 ['N/A', 'N/A', 'size_t'] 12 0 185 27 12 66 0 691 505
ntfs_proc_attrseq(NTFS_INFO*,TSK_FS_FILE*,ntfs_attrconst*,unsignedlong,unsignedlong,NTFS_ATTRLIST_MAPconst*,TSK_STACK*) /src/sleuthkit/tsk/fs/ntfs.cpp 7 ['N/A', 'N/A', 'N/A', 'size_t', 'size_t', 'N/A', 'N/A'] 14 0 7182 465 167 98 5 925 446
ext2fs_fsstat(TSK_FS_INFO*,_IO_FILE*) /src/sleuthkit/tsk/fs/ext2fs.cpp 2 ['N/A', 'N/A'] 11 0 10643 567 176 76 0 630 437
APFSPoolCompat::poolstat(_IO_FILE*)const /src/sleuthkit/tsk/pool/apfs_pool_compat.cpp 2 ['N/A', 'N/A'] 23 0 1111 197 123 388 0 1028 391
hfs_inode_walk(TSK_FS_INFO*,unsignedlong,unsignedlong,TSK_FS_META_FLAG_ENUM,TSK_WALK_RET_ENUM(*)(TSK_FS_FILE*,void*),void*) /src/sleuthkit/tsk/fs/hfs.cpp 6 ['N/A', 'size_t', 'size_t', 'int', 'N/A', 'N/A'] 12 0 358 63 16 183 0 1373 386
ntfs_dir_open_meta /src/sleuthkit/tsk/fs/ntfs_dent.cpp 4 ['N/A', 'N/A', 'size_t', 'int'] 13 0 3368 275 102 161 0 896 361
exfatfs_fsstat /src/sleuthkit/tsk/fs/exfatfs.cpp 2 ['N/A', 'N/A'] 15 0 101 21 6 112 0 672 310
APFSFSCompat::APFSFSCompat(TSK_IMG_INFO*,_TSK_POOL_INFOconst*,unsignedlong,charconst*)::$_4::__invoke(TSK_FS_INFO*,TSK_FS_ISTAT_FLAG_ENUM,_IO_FILE*,unsignedlong,unsignedlong,int) /src/sleuthkit/tsk/fs/apfs_compat.cpp 6 ['N/A', 'int', 'N/A', 'size_t', 'size_t', 'int'] 15 0 31 3 2 141 0 816 250

Implementing fuzzers that target the above functions will improve reachability such that it becomes:

Functions statically reachable by fuzzers
52.0%
722 / 1385
Cyclomatic complexity statically reachable by fuzzers
57.9%
8559 / 14707

All functions overview

If you implement fuzzers for these functions, the status of all functions in the project will be:

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

/src/sleuthkit/ossfuzz/mmls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_vs_part_add', 'tsk_vs_gpt_open', 'tsk_vs_part_unused', 'tsk_error_set_errstr2', 'tsk_malloc', 'tsk_error_set_errstr', 'tsk_vs_read_block', 'tsk_img_read', 'LLVMFuzzerTestOneInput']

/src/sleuthkit/ossfuzz/mmls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_vs_part_unused', 'tsk_vs_part_add', 'tsk_vs_mac_open', 'tsk_error_set_errstr2', 'tsk_malloc', 'tsk_error_set_errstr', 'tsk_vs_read_block', 'tsk_img_read', 'tsk_vs_open', 'LLVMFuzzerTestOneInput']

/src/sleuthkit/ossfuzz/mmls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_vs_part_unused', 'tsk_vs_part_add', 'tsk_vs_sun_open', 'tsk_error_set_errstr2', 'tsk_malloc', 'tsk_error_set_errstr', 'tsk_vs_read_block', 'tsk_img_read', 'LLVMFuzzerTestOneInput']

/src/sleuthkit/ossfuzz/mmls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_vs_part_unused', 'dos_load_ext_table', 'dos_load_prim_table', 'tsk_vs_read_block', 'tsk_vs_open', 'LLVMFuzzerTestOneInput', 'tsk_error_set_errstr', 'tsk_malloc', 'tsk_vs_dos_open']

/src/sleuthkit/ossfuzz/fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_fs_free', 'btrfs_open', 'tsk_fs_read_decrypt', 'tsk_take_lock', 'tsk_img_read', 'tsk_error_set_errstr', 'tsk_fs_read', 'tsk_malloc', 'tsk_release_lock', 'tsk_deinit_lock']

/src/sleuthkit/ossfuzz/fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['iso9660_open', 'tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int)', 'tsk_fs_attr_free', 'tsk_fs_free', 'tsk_take_lock', 'tsk_fs_attr_run_alloc', 'tsk_img_read', 'tsk_fs_name_copy', 'tsk_error_set_errstr2', 'tsk_fs_attr_read']

/src/sleuthkit/ossfuzz/fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['hfs_open', 'tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int)', 'tsk_fs_free', 'tsk_take_lock', 'tsk_fs_attr_run_alloc', 'tsk_error_errstr2_concat', 'tsk_img_read', 'tsk_error_set_errstr2', 'tsk_fs_file_close', 'tsk_fs_attr_read']

/src/sleuthkit/ossfuzz/fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_fs_name_copy', 'tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int)', 'ext2fs_open', 'tsk_take_lock', 'tsk_fs_free', 'tsk_error_errstr2_concat', 'tsk_img_read', 'tsk_fs_read_block', 'tsk_error_set_errstr2', 'tsk_fs_attr_run_alloc']

/src/sleuthkit/ossfuzz/fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_fs_name_copy', 'fatfs_open', 'tsk_take_lock', 'tsk_malloc', 'tsk_error_errstr2_concat', 'fatxxfs_open', 'tsk_fs_read_block', 'tsk_error_set_errstr2', 'tsk_fs_attr_free', 'tsk_fs_attr_run_alloc']

/src/sleuthkit/ossfuzz/fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_fs_file_attr_get_idx', 'tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int)', 'tsk_fs_free', 'tsk_take_lock', 'tsk_malloc', 'tsk_fs_attr_free', 'ntfs_open', 'ntfs_load_secure(NTFS_INFO*)', 'tsk_fs_attr_read', 'ntfs_load_secure(NTFS_INFO*)']

/src/sleuthkit/ossfuzz/fls_apfs_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int)', 'tsk_fs_file_close', 'APFSFileSystem::APFSFileSystem(APFSPool const&, unsigned long)', 'tsk_malloc', 'tsk_take_lock', 'tsk_release_lock', 'tsk_fs_dir_walk_recursive(TSK_FS_INFO*, DENT_DINFO*, unsigned long, TSK_FS_DIR_WALK_FLAG_ENUM, TSK_WALK_RET_ENUM (*)(TSK_FS_FILE*, char const*, void*), void*, int)', 'apfs_open', 'LLVMFuzzerTestOneInput', 'APFSBtreeNodeIterator > APFSBtreeNode::find(unsigned long const&, APFSObjectBtreeNode::find(unsigned long) const::$_0) const']

Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
tsk_img_read 33 18 54.54% ['mmls_dos_fuzzer', 'mmls_mac_fuzzer', 'fls_ext_fuzzer', 'fls_apfs_fuzzer', 'fls_fat_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer', 'mmls_gpt_fuzzer', 'mmls_sun_fuzzer']
tsk_vs_open 150 17 11.33% ['mmls_mac_fuzzer', 'mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer']
tsk_vs_part_walk 35 16 45.71% ['mmls_mac_fuzzer', 'mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer']
dos_load_prim_table 158 81 51.26% ['mmls_mac_fuzzer', 'mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer']
btrfs_open 104 41 39.42% ['fls_apfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer']
tsk_fs_open_img_decrypt 157 50 31.84% ['fls_apfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer']
print_dent_act(TSK_FS_FILE*,charconst*,void*) 56 6 10.71% ['fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_hfs_fuzzer']
tsk_fs_attr_alloc 31 16 51.61% ['fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_hfs_fuzzer']
iso9660_inode_walk(TSK_FS_INFO*,unsignedlong,unsignedlong,TSK_FS_META_FLAG_ENUM,TSK_WALK_RET_ENUM(*)(TSK_FS_FILE*,void*),void*) 114 48 42.10% ['fls_iso9660_fuzzer']
hfs_follow_hard_link(HFS_INFO*,hfs_file*,unsignedchar*) 89 27 30.33% ['fls_hfs_fuzzer']
hfs_load_attrs(TSK_FS_FILE*) 233 118 50.64% ['fls_hfs_fuzzer']
ext2fs_make_data_run_extent_index(TSK_FS_INFO*,TSK_FS_ATTR*,TSK_FS_ATTR*,unsignedlong,unsignedlong*) 82 44 53.65% ['fls_ext_fuzzer']
exfatfs_get_fs_layout(FATFS_INFO*) 78 30 38.46% ['fls_apfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer']
exfatfs_inode_lookup 59 28 47.45% ['fls_fat_fuzzer']
fatfs_dentry_load 33 17 51.51% ['fls_fat_fuzzer']
fatfs_make_data_runs 353 186 52.69% ['fls_fat_fuzzer']
fatfs_inode_walk 340 150 44.11% ['fls_fat_fuzzer']
fatxxfs_open 300 160 53.33% ['fls_apfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer']
fatxxfs_inode_lookup 53 25 47.16% ['fls_fat_fuzzer']
tsk_fs_attr_walk 41 21 51.21% ['fls_fat_fuzzer', 'fls_ntfs_fuzzer']
is_clustalloc(NTFS_INFO*,unsignedlong) 76 18 23.68% ['fls_ntfs_fuzzer']
ntfs_load_secure(NTFS_INFO*) 127 51 40.15% ['fls_apfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_btrfs_fuzzer', 'fls_hfs_fuzzer']
APFSFSCompat::dir_open_meta(TSK_FS_DIR**,unsignedlong,int)const 66 17 25.75% ['fls_apfs_fuzzer']
APFSFSCompat::file_add_meta(TSK_FS_FILE*,unsignedlong)const 72 19 26.38% ['fls_apfs_fuzzer']
APFSBtreeNodeIterator APFSJObjBtreeNode::find (unsignedlongconst&,APFSJObjTree::jobjs(unsignedlong)const::{lambda(auto:1const&,auto:2const&)#1})const 43 7 16.27% ['fls_apfs_fuzzer']
tsk_pool_open_img 42 20 47.61% ['fls_apfs_fuzzer']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
/src/sleuthkit/tsk/fs/ext2fs_dent.cpp [] []
/usr/local/bin/../include/c++/v1/stdexcept [] []
/src/sleuthkit/tsk/vs/dos.c ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer'] ['mmls_dos_fuzzer']
/src/sleuthkit/./tsk/util/span.hpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/img/raw.cpp [] []
/src/sleuthkit/tsk/base/sha1c.c [] []
/src/sleuthkit/tsk/fs/tsk_apfs.hpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/ffs.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/vs/mm_part.c ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer']
/src/sleuthkit/tsk/util/file_system_utils.cpp [] []
/src/sleuthkit/./tsk/fs/apfs_fs.hpp ['fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/tsk_btrfs.h ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/img/unsupported_types.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/pool/apfs_pool_compat.hpp ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/ntfs.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_ntfs_fuzzer']
/src/sleuthkit/tsk/fs/fs_open.c ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/apfs.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/encryptionHelper.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer']
/src/sleuthkit/tsk/fs/yaffs.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/ffs_dent.cpp [] []
/src/sleuthkit/tsk/vs/gpt.c ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer'] ['mmls_gpt_fuzzer']
/src/sleuthkit/tsk/vs/mm_open.c ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer']
/src/sleuthkit/tsk/base/tsk_unicode.c ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['mmls_gpt_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer']
/src/sleuthkit/ossfuzz/fls_apfs_fuzzer.cc ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/hfs_unicompare.cpp [] []
/src/sleuthkit/tsk/fs/fls_lib.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer']
/src/sleuthkit/tsk/img/legacy_cache.cpp ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer']
/src/sleuthkit/tsk/vs/sun.c ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer'] ['mmls_sun_fuzzer']
/src/sleuthkit/tsk/fs/unix_misc.cpp [] []
/src/sleuthkit/tsk/fs/nofs_misc.cpp [] []
/src/sleuthkit/tsk/pool/tsk_apfs.hpp ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/vs/mac.c ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer'] ['mmls_mac_fuzzer']
/src/sleuthkit/tsk/fs/fatxxfs.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_fat_fuzzer']
/src/sleuthkit/tsk/vs/bsd.c ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer'] []
/src/sleuthkit/tsk/fs/decmpfs.cpp [] []
/src/sleuthkit/tsk/base/tsk_lock.c ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer']
/src/sleuthkit/tsk/base/tsk_list.c ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/ext2fs_journal.cpp [] []
/src/sleuthkit/tsk/pool/pool_open.cpp ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/./tsk/pool/tsk_pool.hpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/pool/tsk_pool.hpp ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/exfatfs.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_fat_fuzzer']
/src/sleuthkit/tsk/base/tsk_error.c ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer']
/usr/local/bin/../include/c++/v1/string [] []
/src/sleuthkit/tsk/pool/pool_compat.hpp ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/xfs_dent.cpp [] []
/src/sleuthkit/tsk/fs/fs_types.c [] []
/src/sleuthkit/tsk/fs/rawfs.c ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/hfs_dent.cpp [] []
/src/sleuthkit/tsk/fs/btrfs_csum.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_btrfs_fuzzer']
/src/sleuthkit/tsk/base/crc.c ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_btrfs_fuzzer']
/src/sleuthkit/tsk/img/img_open.cpp ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/fatfs_meta.cpp [] []
/src/sleuthkit/tsk/base/mymalloc.c ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer']
/src/sleuthkit/tsk/img/mult_files.cpp [] []
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/fs_name.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer']
/src/sleuthkit/tsk/img/img_open.h [] []
/src/sleuthkit/ossfuzz/mem_img.h ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/btrfs.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_btrfs_fuzzer']
/src/sleuthkit/tsk/fs/xfs.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/apfs_fs.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/iso9660_dent.cpp [] []
/src/sleuthkit/tsk/fs/ntfs_dent.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_ntfs_fuzzer']
/src/sleuthkit/tsk/base/tsk_stack.c ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/fs_load.cpp [] []
/src/sleuthkit/tsk/base/tsk_endian.c ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer']
/src/sleuthkit/tsk/fs/tsk_xfs.h [] []
/src/sleuthkit/tsk/img/logical_img.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/logical_fs.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/swapfs.c ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/apfs_compat.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/apfs_fs.hpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer'] []
/src/sleuthkit/tsk/fs/fatfs_dent.cpp [] []
/usr/local/bin/../include/c++/v1/__exception/exception.h [] []
/src/sleuthkit/tsk/util/detect_encryption.c ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/fs_dir.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer']
/usr/local/bin/../include/c++/v1/sstream [] []
/src/sleuthkit/tsk/fs/ifind_lib.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_hfs_fuzzer']
/src/sleuthkit/tsk/fs/fs_attrlist.c ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer']
/src/sleuthkit/tsk/fs/exfatfs_dent.cpp [] []
/src/sleuthkit/ossfuzz/fls_fuzzer.cc ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer'] ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer']
/src/sleuthkit/tsk/base/md5c.c [] []
/src/sleuthkit/ossfuzz/mmls_fuzzer.cc ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer']
/src/sleuthkit/tsk/fs/fatfs_utils.c ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_fat_fuzzer']
/src/sleuthkit/tsk/img/img_io.cpp ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/apfs_compat.hpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/fs_io.c ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer']
/src/sleuthkit/tsk/fs/lzvn.c [] []
/src/sleuthkit/tsk/fs/fatfs.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/fs_attr.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer']
/src/sleuthkit/tsk/auto/guid.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/fs_file.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/hfs.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_hfs_fuzzer']
/src/sleuthkit/tsk/fs/fatxxfs_meta.cpp [] []
/src/sleuthkit/tsk/pool/apfs_pool.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/fatxxfs_dent.c [] []
/src/sleuthkit/tsk/fs/apfs_open.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/base/tsk_printf.c ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] []
/src/sleuthkit/./tsk/auto/guid.h ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/fs/iso9660.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_iso9660_fuzzer']
/src/sleuthkit/tsk/fs/fs_block.c [] []
/src/sleuthkit/tsk/fs/ext2fs.cpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_ext_fuzzer']
/src/sleuthkit/tsk/fs/fs_inode.c ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] ['fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer']
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer', 'fls_fat_fuzzer', 'fls_ntfs_fuzzer', 'fls_apfs_fuzzer'] []
/src/sleuthkit/tsk/pool/apfs_pool_compat.cpp ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/vs/mm_io.c ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_mac_fuzzer', 'mmls_sun_fuzzer', 'mmls_dos_fuzzer']
/src/sleuthkit/tsk/fs/hfs_journal.cpp [] []

Directories in report

Directory
/src/sleuthkit/tsk/fs/
/src/sleuthkit/./tsk/fs/
/src/sleuthkit/ossfuzz/
/src/sleuthkit/tsk/img/
/src/sleuthkit/tsk/auto/
/src/sleuthkit/tsk/util/
/usr/local/bin/../include/c++/v1/__exception/
/src/sleuthkit/./tsk/auto/
/usr/local/bin/../include/c++/v1/
/src/sleuthkit/tsk/base/
/src/sleuthkit/./tsk/pool/
/src/sleuthkit/tsk/vs/
/src/sleuthkit/./tsk/util/
/src/sleuthkit/tsk/pool/