Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues
Report generation date: 2026-04-01

Project overview: sleuthkit

High level conclusions

Reachability and coverage overview

Functions statically reachable by fuzzers
32.0%
441 / 1389
Cyclomatic complexity statically reachable by fuzzers
28.0%
4150 / 14695
Runtime code coverage of functions
43.0%
596 / 1389

Warning: The number of runtime covered functions are larger than the number of reachable functions. This means that Fuzz Introspector found there are more functions covered at runtime than what is considered reachable based on the static analysis. This is a limitation in the analysis as anything covered at runtime is by definition reachable by the fuzzers.
This is likely due to a limitation in the static analysis. In this case, the count of functions covered at runtime is the true value, which means this is what should be considered "achieved" by the fuzzer.

Use the project functions table below to query all functions that were not covered at runtime.

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: mmls_gpt_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 516 65.6%
gold [1:9] 3 0.38%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 267 33.9%
All colors 786 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
221 98 tsk_vs_part_add call site: 00098 dos_load_ext_table
146 622 tsk_vs_gpt_open call site: 00622 tsk_vs_dos_open
54 324 tsk_vs_part_unused call site: 00324 tsk_vs_gpt_open
29 68 tsk_error_set_errstr2 call site: 00068 tsk_vs_part_add
13 34 tsk_malloc call site: 00034 dos_load_prim_table
10 23 tsk_error_set_errstr call site: 00023 tsk_vs_dos_open
6 48 tsk_vs_read_block call site: 00048 tsk_error_set_errstr
6 60 tsk_img_read call site: 00060 tsk_error_set_errstr
6 773 LLVMFuzzerTestOneInput call site: 00773 tsk_error_set_errstr
3 379 tsk_vs_gpt_open call site: 00379 tsk_error_set_errstr
3 769 tsk_vs_open call site: 00769 tsk_error_set_errstr
2 6 tsk_init_lock call site: 00006 fprintf

Runtime coverage analysis

Covered functions
41
Functions that are reachable but not covered
55
Reachable functions
87
Percentage of reachable functions covered
36.78%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/mmls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 2
/src/sleuthkit/tsk/base/tsk_lock.c 2
/src/sleuthkit/tsk/vs/mm_open.c 1
/src/sleuthkit/tsk/base/tsk_error.c 10
/src/sleuthkit/tsk/vs/dos.c 5
/src/sleuthkit/tsk/base/mymalloc.c 1
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/vs/mm_io.c 1
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/base/tsk_endian.c 3
/src/sleuthkit/tsk/vs/mm_part.c 4
/src/sleuthkit/tsk/vs/bsd.c 4
/src/sleuthkit/tsk/vs/gpt.c 5
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/vs/sun.c 6
/src/sleuthkit/tsk/vs/mac.c 3
/src/sleuthkit/tsk/util/detect_encryption.c 8
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: mmls_sun_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 711 90.4%
gold [1:9] 4 0.50%
yellow [10:29] 7 0.89%
greenyellow [30:49] 3 0.38%
lawngreen 50+ 61 7.76%
All colors 786 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
309 324 tsk_vs_part_unused call site: 00324 tsk_vs_gpt_open
221 98 tsk_vs_part_add call site: 00098 dos_load_ext_table
85 682 tsk_vs_sun_open call site: 00682 tsk_vs_dos_open
29 68 tsk_error_set_errstr2 call site: 00068 tsk_vs_part_add
13 34 tsk_malloc call site: 00034 dos_load_prim_table
10 23 tsk_error_set_errstr call site: 00023 tsk_vs_dos_open
9 48 tsk_vs_read_block call site: 00048 tsk_error_set_errstr
6 60 tsk_img_read call site: 00060 tsk_error_set_errstr
6 773 LLVMFuzzerTestOneInput call site: 00773 tsk_error_set_errstr
4 639 tsk_vs_sun_open call site: 00639 tsk_error_set_errstr
4 768 tsk_vs_open call site: 00768 tsk_vs_gpt_open
3 634 tsk_vs_sun_open call site: 00634 tsk_error_set_errstr

Runtime coverage analysis

Covered functions
40
Functions that are reachable but not covered
56
Reachable functions
87
Percentage of reachable functions covered
35.63%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/mmls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 2
/src/sleuthkit/tsk/base/tsk_lock.c 2
/src/sleuthkit/tsk/vs/mm_open.c 1
/src/sleuthkit/tsk/base/tsk_error.c 10
/src/sleuthkit/tsk/vs/dos.c 5
/src/sleuthkit/tsk/base/mymalloc.c 1
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/vs/mm_io.c 1
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/base/tsk_endian.c 3
/src/sleuthkit/tsk/vs/mm_part.c 4
/src/sleuthkit/tsk/vs/bsd.c 4
/src/sleuthkit/tsk/vs/gpt.c 5
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/vs/sun.c 6
/src/sleuthkit/tsk/vs/mac.c 3
/src/sleuthkit/tsk/util/detect_encryption.c 8
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: mmls_mac_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 721 91.7%
gold [1:9] 5 0.63%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 60 7.63%
All colors 786 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
364 324 tsk_vs_part_unused call site: 00324 tsk_vs_gpt_open
221 98 tsk_vs_part_add call site: 00098 dos_load_ext_table
40 725 tsk_vs_mac_open call site: 00725 tsk_vs_dos_open
29 68 tsk_error_set_errstr2 call site: 00068 tsk_vs_part_add
13 34 tsk_malloc call site: 00034 dos_load_prim_table
10 23 tsk_error_set_errstr call site: 00023 tsk_vs_dos_open
9 48 tsk_vs_read_block call site: 00048 tsk_error_set_errstr
6 60 tsk_img_read call site: 00060 tsk_error_set_errstr
6 766 tsk_vs_open call site: 00766 tsk_vs_gpt_open
6 773 LLVMFuzzerTestOneInput call site: 00773 tsk_error_set_errstr
3 689 tsk_vs_mac_open call site: 00689 tsk_error_set_errstr
2 6 tsk_init_lock call site: 00006 fprintf

Runtime coverage analysis

Covered functions
37
Functions that are reachable but not covered
59
Reachable functions
87
Percentage of reachable functions covered
32.18%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/mmls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 2
/src/sleuthkit/tsk/base/tsk_lock.c 2
/src/sleuthkit/tsk/vs/mm_open.c 1
/src/sleuthkit/tsk/base/tsk_error.c 10
/src/sleuthkit/tsk/vs/dos.c 5
/src/sleuthkit/tsk/base/mymalloc.c 1
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/vs/mm_io.c 1
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/base/tsk_endian.c 3
/src/sleuthkit/tsk/vs/mm_part.c 4
/src/sleuthkit/tsk/vs/bsd.c 4
/src/sleuthkit/tsk/vs/gpt.c 5
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/vs/sun.c 6
/src/sleuthkit/tsk/vs/mac.c 3
/src/sleuthkit/tsk/util/detect_encryption.c 8
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: mmls_dos_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 546 69.4%
gold [1:9] 6 0.76%
yellow [10:29] 3 0.38%
greenyellow [30:49] 89 11.3%
lawngreen 50+ 142 18.0%
All colors 786 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
440 324 tsk_vs_part_unused call site: 00324 tsk_vs_gpt_open
27 282 dos_load_ext_table call site: 00282 tsk_error_print
22 72 dos_load_prim_table call site: 00072 tsk_error_set_errstr
9 48 tsk_vs_read_block call site: 00048 tsk_error_set_errstr
7 765 tsk_vs_open call site: 00765 tsk_vs_gpt_open
6 773 LLVMFuzzerTestOneInput call site: 00773 tsk_error_set_errstr
5 23 tsk_error_set_errstr call site: 00023 tsk_vs_dos_open
5 34 tsk_malloc call site: 00034 tsk_error_set_errstr
3 29 tsk_vs_dos_open call site: 00029 tsk_error_set_errstr
3 44 dos_load_prim_table call site: 00044 tsk_error_set_errstr
3 60 tsk_img_read call site: 00060 tsk_error_set_errstr
2 6 tsk_init_lock call site: 00006 fprintf

Runtime coverage analysis

Covered functions
39
Functions that are reachable but not covered
57
Reachable functions
87
Percentage of reachable functions covered
34.48%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/mmls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 2
/src/sleuthkit/tsk/base/tsk_lock.c 2
/src/sleuthkit/tsk/vs/mm_open.c 1
/src/sleuthkit/tsk/base/tsk_error.c 10
/src/sleuthkit/tsk/vs/dos.c 5
/src/sleuthkit/tsk/base/mymalloc.c 1
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/vs/mm_io.c 1
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/base/tsk_endian.c 3
/src/sleuthkit/tsk/vs/mm_part.c 4
/src/sleuthkit/tsk/vs/bsd.c 4
/src/sleuthkit/tsk/vs/gpt.c 5
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/vs/sun.c 6
/src/sleuthkit/tsk/vs/mac.c 3
/src/sleuthkit/tsk/util/detect_encryption.c 8
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_btrfs_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1910 96.6%
gold [1:9] 3 0.15%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 63 3.18%
All colors 1976 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
741 539 tsk_fs_free call site: 00539 hfs_open
655 1316 btrfs_open call site: 01316 apfs_open
241 164 tsk_fs_read_decrypt call site: 00164 tsk_fs_attr_read
115 407 tsk_take_lock call site: 00407 tsk_fs_attr_read
68 69 tsk_img_read call site: 00069 ntfs_open
26 24 tsk_error_set_errstr call site: 00024 detectUnsupportedImageType
19 144 tsk_fs_read call site: 00144 tsk_fs_read_block_decrypt
15 51 tsk_malloc call site: 00051 tsk_img_read
5 523 tsk_release_lock call site: 00523 tsk_release_lock
4 529 tsk_deinit_lock call site: 00529 tsk_fs_free
3 140 tsk_fs_malloc call site: 00140 tsk_fs_read
3 534 tsk_fs_free call site: 00534 tsk_fs_dir_close

Runtime coverage analysis

Covered functions
54
Functions that are reachable but not covered
630
Reachable functions
685
Percentage of reachable functions covered
8.03%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 27
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 61
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/./tsk/auto/guid.h 3
/src/sleuthkit/./tsk/util/span.hpp 5
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_apfs_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1757 84.4%
gold [1:9] 182 8.75%
yellow [10:29] 43 2.06%
greenyellow [30:49] 55 2.64%
lawngreen 50+ 43 2.06%
All colors 2080 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
801 860 tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int) call site: 00860 hfs_open
191 454 tsk_fs_file_close call site: 00454 tsk_fs_attr_read
164 1688 APFSFileSystem::APFSFileSystem(APFSPool const&, unsigned long) call site: 01688 tsk_fprintf
140 306 tsk_malloc call site: 00306 ntfs_open
115 647 tsk_take_lock call site: 00647 tsk_fs_attr_read
96 763 tsk_release_lock call site: 00763 fatfs_open
45 2030 tsk_fs_dir_walk_recursive(TSK_FS_INFO*, DENT_DINFO*, unsigned long, TSK_FS_DIR_WALK_FLAG_ENUM, TSK_WALK_RET_ENUM (*)(TSK_FS_FILE*, char const*, void*), void*, int) call site: 02030 tsk_list_add
40 1973 apfs_open call site: 01973 xfs_open
27 278 LLVMFuzzerTestOneInput call site: 00278 detectUnsupportedImageType
10 1877 APFSBtreeNodeIterator > APFSBtreeNode ::find (unsigned long const&, APFSObjectBtreeNode::find(unsigned long) const::$_0) const call site: 01877
8 1663 apfs_open call site: 01663 tsk_error_set_errstr
7 14 APFSPool::APFSPool(std::__1::vector , std::__1::allocator > >&&, unsigned long) call site: 00014 __clang_call_terminate

Runtime coverage analysis

Covered functions
219
Functions that are reachable but not covered
487
Reachable functions
746
Percentage of reachable functions covered
34.72%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_apfs_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/pool/pool_open.cpp 2
/src/sleuthkit/tsk/pool/apfs_pool_compat.hpp 1
/src/sleuthkit/tsk/pool/pool_compat.hpp 6
/src/sleuthkit/tsk/pool/apfs_pool.cpp 5
/src/sleuthkit/tsk/pool/tsk_pool.hpp 7
/src/sleuthkit/tsk/auto/guid.cpp 4
/src/sleuthkit/tsk/fs/apfs.cpp 28
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 45
/src/sleuthkit/./tsk/auto/guid.h 4
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 29
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/pool/apfs_pool_compat.cpp 1
/src/sleuthkit/tsk/img/img_open.cpp 1
/src/sleuthkit/tsk/fs/fs_open.c 3
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 1
/src/sleuthkit/./tsk/util/span.hpp 5
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 2
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5

Fuzzer: fls_iso9660_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1788 90.4%
gold [1:9] 11 0.55%
yellow [10:29] 9 0.45%
greenyellow [30:49] 6 0.30%
lawngreen 50+ 162 8.19%
All colors 1976 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
774 1132 iso9660_open call site: 01132 apfs_open
316 621 tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int) call site: 00621 hfs_open
113 217 tsk_fs_attr_free call site: 00217 ntfs_dinode_lookup
81 539 tsk_fs_free call site: 00539 fatfs_open
76 407 tsk_take_lock call site: 00407 logicalfs_read_block
74 331 tsk_fs_attr_run_alloc call site: 00331 tsk_fs_attr_read
68 69 tsk_img_read call site: 00069 ntfs_open
47 949 tsk_fs_name_copy call site: 00949 tsk_fs_path2inum
37 169 tsk_error_set_errstr2 call site: 00169 tsk_fs_file_open_meta
27 495 tsk_fs_attr_read call site: 00495 tsk_fs_attr_read
26 1084 parse_susp(TSK_FS_INFO*, char*, int, _IO_FILE*, int) call site: 01084 tsk_error_print
15 51 tsk_malloc call site: 00051 tsk_img_read

Runtime coverage analysis

Covered functions
111
Functions that are reachable but not covered
597
Reachable functions
685
Percentage of reachable functions covered
12.85%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 27
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 61
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/./tsk/auto/guid.h 3
/src/sleuthkit/./tsk/util/span.hpp 5
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_ntfs_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1694 85.7%
gold [1:9] 43 2.17%
yellow [10:29] 11 0.55%
greenyellow [30:49] 6 0.30%
lawngreen 50+ 222 11.2%
All colors 1976 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
929 977 tsk_fs_file_attr_get_idx call site: 00977 apfs_open
316 621 tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int) call site: 00621 hfs_open
81 539 tsk_fs_free call site: 00539 fatfs_open
73 407 tsk_take_lock call site: 00407 logicalfs_read_block
59 69 tsk_img_read call site: 00069 detectVolumeEncryption
24 217 tsk_fs_attr_free call site: 00217 tsk_error_get
17 388 ntfs_load_secure(NTFS_INFO*) call site: 00388 logicalfs_read
16 483 tsk_fs_attr_read call site: 00483 tsk_fs_read_decrypt
16 500 ntfs_load_secure(NTFS_INFO*) call site: 00500 tsk_fs_attr_read
14 24 tsk_error_set_errstr call site: 00024 logical_fs_open
11 39 tsk_error_get_errno call site: 00039 detectUnsupportedImageType
9 953 tsk_fs_name_copy call site: 00953 tsk_error_print

Runtime coverage analysis

Covered functions
158
Functions that are reachable but not covered
586
Reachable functions
685
Percentage of reachable functions covered
14.45%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 27
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 61
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/./tsk/auto/guid.h 3
/src/sleuthkit/./tsk/util/span.hpp 5
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_ext_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1823 92.2%
gold [1:9] 11 0.55%
yellow [10:29] 7 0.35%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 135 6.83%
All colors 1976 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
957 949 tsk_fs_name_copy call site: 00949 apfs_open
132 621 tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int) call site: 00621 fatxxfs_open
127 810 ext2fs_open call site: 00810 hfs_open
84 407 tsk_take_lock call site: 00407 logicalfs_read_block
81 539 tsk_fs_free call site: 00539 fatfs_open
79 251 tsk_error_errstr2_concat call site: 00251 ntfs_dinode_lookup
68 69 tsk_img_read call site: 00069 ntfs_open
45 360 tsk_fs_read_block call site: 00360 tsk_fs_attr_read
37 169 tsk_error_set_errstr2 call site: 00169 tsk_fs_file_open_meta
35 774 ext2fs_open call site: 00774 tsk_fs_free
28 331 tsk_fs_attr_run_alloc call site: 00331 tsk_fs_read_block
27 495 tsk_fs_attr_read call site: 00495 tsk_fs_attr_read

Runtime coverage analysis

Covered functions
125
Functions that are reachable but not covered
610
Reachable functions
685
Percentage of reachable functions covered
10.95%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 27
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 61
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/./tsk/auto/guid.h 3
/src/sleuthkit/./tsk/util/span.hpp 5
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_hfs_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1754 88.7%
gold [1:9] 12 0.60%
yellow [10:29] 7 0.35%
greenyellow [30:49] 4 0.20%
lawngreen 50+ 199 10.0%
All colors 1976 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
917 989 hfs_open call site: 00989 apfs_open
189 621 tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int) call site: 00621 ext2fs_open
79 251 tsk_error_errstr2_concat call site: 00251 ntfs_dinode_lookup
78 539 tsk_fs_free call site: 00539 fatfs_open
76 407 tsk_take_lock call site: 00407 logicalfs_read_block
74 331 tsk_fs_attr_run_alloc call site: 00331 tsk_fs_attr_read
68 69 tsk_img_read call site: 00069 ntfs_open
37 169 tsk_error_set_errstr2 call site: 00169 tsk_fs_file_open_meta
30 218 tsk_fs_file_close call site: 00218 tsk_error_get
27 495 tsk_fs_attr_read call site: 00495 tsk_fs_attr_read
22 960 tsk_fs_dir_get2 call site: 00960 tsk_fs_file_attr_get_idx
15 51 tsk_malloc call site: 00051 tsk_img_read

Runtime coverage analysis

Covered functions
138
Functions that are reachable but not covered
593
Reachable functions
685
Percentage of reachable functions covered
13.43%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 27
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 61
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/./tsk/auto/guid.h 3
/src/sleuthkit/./tsk/util/span.hpp 5
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/img/img_open.cpp 1

Fuzzer: fls_fat_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1798 90.9%
gold [1:9] 11 0.55%
yellow [10:29] 33 1.67%
greenyellow [30:49] 31 1.56%
lawngreen 50+ 103 5.21%
All colors 1976 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
953 953 tsk_fs_name_copy call site: 00953 apfs_open
232 705 fatfs_open call site: 00705 hfs_open
115 407 tsk_take_lock call site: 00407 tsk_fs_attr_read
86 51 tsk_malloc call site: 00051 ntfs_open
79 251 tsk_error_errstr2_concat call site: 00251 ntfs_dinode_lookup
48 566 fatxxfs_open call site: 00566 tsk_fs_read
45 360 tsk_fs_read_block call site: 00360 tsk_fs_attr_read
37 169 tsk_error_set_errstr2 call site: 00169 tsk_fs_file_open_meta
31 217 tsk_fs_attr_free call site: 00217 tsk_error_get
28 331 tsk_fs_attr_run_alloc call site: 00331 tsk_fs_read_block
21 648 exfatfs_get_fs_layout(FATFS_INFO*) call site: 00648 tsk_error_set_errstr
14 24 tsk_error_set_errstr call site: 00024 logical_fs_open

Runtime coverage analysis

Covered functions
182
Functions that are reachable but not covered
586
Reachable functions
685
Percentage of reachable functions covered
14.45%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/src/sleuthkit/ossfuzz/fls_fuzzer.cc 1
/src/sleuthkit/ossfuzz/mem_img.h 1
/src/sleuthkit/tsk/img/legacy_cache.cpp 3
/src/sleuthkit/tsk/base/tsk_lock.c 4
/src/sleuthkit/tsk/fs/fs_open.c 4
/src/sleuthkit/tsk/base/tsk_error.c 13
/src/sleuthkit/tsk/fs/logical_fs.cpp 9
/src/sleuthkit/tsk/base/tsk_printf.c 1
/src/sleuthkit/tsk/img/unsupported_types.cpp 4
/src/sleuthkit/tsk/base/mymalloc.c 2
/src/sleuthkit/tsk/img/img_io.cpp 1
/src/sleuthkit/tsk/util/detect_encryption.c 6
/src/sleuthkit/tsk/fs/ntfs.cpp 9
/src/sleuthkit/tsk/fs/encryptionHelper.cpp 2
/src/sleuthkit/tsk/fs/fs_io.c 5
/src/sleuthkit/tsk/base/tsk_endian.c 2
/src/sleuthkit/tsk/fs/fs_file.cpp 7
/src/sleuthkit/tsk/fs/fs_name.cpp 4
/src/sleuthkit/tsk/fs/fs_inode.c 2
/src/sleuthkit/tsk/fs/fs_attrlist.c 5
/src/sleuthkit/tsk/fs/fs_attr.cpp 4
/src/sleuthkit/tsk/img/logical_img.cpp 1
/src/sleuthkit/tsk/fs/ntfs_dent.cpp 2
/src/sleuthkit/tsk/base/tsk_list.c 3
/src/sleuthkit/tsk/fs/fs_dir.cpp 12
/src/sleuthkit/tsk/fs/fatfs.cpp 1
/src/sleuthkit/tsk/fs/fatxxfs.cpp 1
/src/sleuthkit/tsk/fs/exfatfs.cpp 9
/src/sleuthkit/tsk/fs/fatfs_utils.c 1
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp 3
/src/sleuthkit/tsk/fs/ffs.cpp 1
/src/sleuthkit/tsk/fs/ext2fs.cpp 1
/src/sleuthkit/tsk/fs/hfs.cpp 7
/src/sleuthkit/tsk/fs/ifind_lib.cpp 1
/src/sleuthkit/tsk/fs/iso9660.cpp 8
/src/sleuthkit/tsk/base/tsk_unicode.c 1
/src/sleuthkit/tsk/fs/rawfs.c 1
/src/sleuthkit/tsk/fs/swapfs.c 1
/src/sleuthkit/tsk/fs/yaffs.cpp 18
/src/sleuthkit/tsk/fs/btrfs.cpp 43
/src/sleuthkit/tsk/fs/btrfs_csum.cpp 1
/src/sleuthkit/tsk/base/crc.c 6
/src/sleuthkit/tsk/fs/tsk_btrfs.h 2
/src/sleuthkit/tsk/fs/apfs_open.cpp 1
/src/sleuthkit/tsk/fs/apfs_compat.cpp 15
/src/sleuthkit/tsk/fs/apfs.cpp 27
/src/sleuthkit/tsk/fs/tsk_apfs.hpp 61
/src/sleuthkit/tsk/pool/apfs_pool.cpp 2
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp 7
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp 1
/src/sleuthkit/tsk/auto/guid.cpp 3
/src/sleuthkit/./tsk/auto/guid.h 3
/src/sleuthkit/./tsk/util/span.hpp 5
/src/sleuthkit/tsk/fs/apfs_fs.cpp 3
/src/sleuthkit/./tsk/pool/tsk_pool.hpp 5
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp 13
/src/sleuthkit/tsk/fs/apfs_fs.hpp 2
/src/sleuthkit/tsk/fs/apfs_compat.hpp 3
/src/sleuthkit/tsk/fs/xfs.cpp 1
/src/sleuthkit/tsk/fs/fls_lib.cpp 3
/src/sleuthkit/tsk/base/tsk_stack.c 5
/src/sleuthkit/tsk/img/img_open.cpp 1

Analyses and suggestions

Optimal target analysis

Remaining optimal interesting functions

The following table shows a list of functions that are optimal targets. Optimal targets are identified by finding the functions that in combination, yield a high code coverage.

Func name Functions filename Arg count Args Function depth hitcount instr count bb count cyclomatic complexity Reachable functions Incoming references total cyclomatic complexity Unreached complexity
hfs_istat(TSK_FS_INFO*,TSK_FS_ISTAT_FLAG_ENUM,_IO_FILE*,unsignedlong,unsignedlong,int) /src/sleuthkit/tsk/fs/hfs.cpp 6 ['N/A', 'int', 'N/A', 'size_t', 'size_t', 'int'] 12 0 4162 472 462 132 0 1425 866
APFSFSCompat::APFSFSCompat(TSK_IMG_INFO*,_TSK_POOL_INFOconst*,unsignedlong,charconst*)::$_11::__invoke(TSK_FS_FILE*) /src/sleuthkit/tsk/fs/apfs_compat.cpp 1 ['N/A'] 25 0 16 3 2 325 0 1141 657
fatxxfs_inode_lookup /src/sleuthkit/tsk/fs/fatxxfs_meta.cpp 3 ['N/A', 'N/A', 'size_t'] 12 0 185 27 12 66 0 691 505
ntfs_proc_attrseq(NTFS_INFO*,TSK_FS_FILE*,ntfs_attrconst*,unsignedlong,unsignedlong,NTFS_ATTRLIST_MAPconst*,TSK_STACK*) /src/sleuthkit/tsk/fs/ntfs.cpp 7 ['N/A', 'N/A', 'N/A', 'size_t', 'size_t', 'N/A', 'N/A'] 14 0 7177 462 166 98 5 923 444
ext2fs_fsstat(TSK_FS_INFO*,_IO_FILE*) /src/sleuthkit/tsk/fs/ext2fs.cpp 2 ['N/A', 'N/A'] 11 0 10643 567 176 76 0 630 437
APFSPoolCompat::poolstat(_IO_FILE*)const /src/sleuthkit/tsk/pool/apfs_pool_compat.cpp 2 ['N/A', 'N/A'] 23 0 1111 197 123 388 0 1028 391
hfs_inode_walk(TSK_FS_INFO*,unsignedlong,unsignedlong,TSK_FS_META_FLAG_ENUM,TSK_WALK_RET_ENUM(*)(TSK_FS_FILE*,void*),void*) /src/sleuthkit/tsk/fs/hfs.cpp 6 ['N/A', 'size_t', 'size_t', 'int', 'N/A', 'N/A'] 12 0 358 63 16 183 0 1373 386
ntfs_dir_open_meta /src/sleuthkit/tsk/fs/ntfs_dent.cpp 4 ['N/A', 'N/A', 'size_t', 'int'] 13 0 3368 275 102 161 0 896 361
exfatfs_fsstat /src/sleuthkit/tsk/fs/exfatfs.cpp 2 ['N/A', 'N/A'] 15 0 101 21 6 112 0 672 310
APFSFSCompat::APFSFSCompat(TSK_IMG_INFO*,_TSK_POOL_INFOconst*,unsignedlong,charconst*)::$_4::__invoke(TSK_FS_INFO*,TSK_FS_ISTAT_FLAG_ENUM,_IO_FILE*,unsignedlong,unsignedlong,int) /src/sleuthkit/tsk/fs/apfs_compat.cpp 6 ['N/A', 'int', 'N/A', 'size_t', 'size_t', 'int'] 15 0 31 3 2 141 0 816 250

Implementing fuzzers that target the above functions will improve reachability such that it becomes:

Functions statically reachable by fuzzers
52.0%
727 / 1389
Cyclomatic complexity statically reachable by fuzzers
57.9%
8579 / 14695

All functions overview

If you implement fuzzers for these functions, the status of all functions in the project will be:

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

/src/sleuthkit/ossfuzz/mmls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_vs_part_add', 'tsk_vs_gpt_open', 'tsk_vs_part_unused', 'tsk_error_set_errstr2', 'tsk_malloc', 'tsk_error_set_errstr', 'tsk_vs_read_block', 'tsk_img_read', 'LLVMFuzzerTestOneInput']

/src/sleuthkit/ossfuzz/mmls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_vs_part_unused', 'tsk_vs_part_add', 'tsk_vs_sun_open', 'tsk_error_set_errstr2', 'tsk_malloc', 'tsk_error_set_errstr', 'tsk_vs_read_block', 'tsk_img_read', 'LLVMFuzzerTestOneInput']

/src/sleuthkit/ossfuzz/mmls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_vs_part_unused', 'tsk_vs_part_add', 'tsk_vs_mac_open', 'tsk_error_set_errstr2', 'tsk_malloc', 'tsk_error_set_errstr', 'tsk_vs_read_block', 'tsk_img_read', 'tsk_vs_open', 'LLVMFuzzerTestOneInput']

/src/sleuthkit/ossfuzz/mmls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_vs_part_unused', 'dos_load_ext_table', 'dos_load_prim_table', 'tsk_vs_read_block', 'tsk_vs_open', 'LLVMFuzzerTestOneInput', 'tsk_error_set_errstr', 'tsk_malloc', 'tsk_vs_dos_open']

/src/sleuthkit/ossfuzz/fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_fs_free', 'btrfs_open', 'tsk_fs_read_decrypt', 'tsk_take_lock', 'tsk_img_read', 'tsk_error_set_errstr', 'tsk_fs_read', 'tsk_malloc', 'tsk_release_lock', 'tsk_deinit_lock']

/src/sleuthkit/ossfuzz/fls_apfs_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int)', 'tsk_fs_file_close', 'APFSFileSystem::APFSFileSystem(APFSPool const&, unsigned long)', 'tsk_malloc', 'tsk_take_lock', 'tsk_release_lock', 'tsk_fs_dir_walk_recursive(TSK_FS_INFO*, DENT_DINFO*, unsigned long, TSK_FS_DIR_WALK_FLAG_ENUM, TSK_WALK_RET_ENUM (*)(TSK_FS_FILE*, char const*, void*), void*, int)', 'apfs_open', 'LLVMFuzzerTestOneInput', 'APFSBtreeNodeIterator > APFSBtreeNode::find(unsigned long const&, APFSObjectBtreeNode::find(unsigned long) const::$_0) const']

/src/sleuthkit/ossfuzz/fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['iso9660_open', 'tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int)', 'tsk_fs_attr_free', 'tsk_fs_free', 'tsk_take_lock', 'tsk_fs_attr_run_alloc', 'tsk_img_read', 'tsk_fs_name_copy', 'tsk_error_set_errstr2', 'tsk_fs_attr_read']

/src/sleuthkit/ossfuzz/fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_fs_file_attr_get_idx', 'tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int)', 'tsk_fs_free', 'tsk_take_lock', 'tsk_img_read', 'tsk_fs_attr_free', 'ntfs_load_secure(NTFS_INFO*)', 'tsk_fs_attr_read', 'ntfs_load_secure(NTFS_INFO*)', 'tsk_error_set_errstr']

/src/sleuthkit/ossfuzz/fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_fs_name_copy', 'tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int)', 'ext2fs_open', 'tsk_take_lock', 'tsk_fs_free', 'tsk_error_errstr2_concat', 'tsk_img_read', 'tsk_fs_read_block', 'tsk_error_set_errstr2']

/src/sleuthkit/ossfuzz/fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['hfs_open', 'tsk_fs_dir_open_meta_internal(TSK_FS_INFO*, unsigned long, int)', 'tsk_error_errstr2_concat', 'tsk_fs_free', 'tsk_take_lock', 'tsk_fs_attr_run_alloc', 'tsk_img_read', 'tsk_error_set_errstr2', 'tsk_fs_file_close', 'tsk_fs_attr_read']

/src/sleuthkit/ossfuzz/fls_fuzzer.cc

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['tsk_fs_name_copy', 'fatfs_open', 'tsk_take_lock', 'tsk_malloc', 'tsk_error_errstr2_concat', 'fatxxfs_open', 'tsk_fs_read_block', 'tsk_error_set_errstr2', 'tsk_fs_attr_free', 'tsk_fs_attr_run_alloc']

Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
tsk_img_read 33 18 54.54% ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'fls_iso9660_fuzzer', 'fls_apfs_fuzzer', 'mmls_dos_fuzzer', 'fls_ntfs_fuzzer', 'fls_btrfs_fuzzer', 'fls_fat_fuzzer', 'mmls_mac_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer']
tsk_vs_open 150 17 11.33% ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer']
tsk_vs_part_walk 35 16 45.71% ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer']
dos_load_prim_table 158 81 51.26% ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer']
btrfs_open 104 41 39.42% ['fls_iso9660_fuzzer', 'fls_apfs_fuzzer', 'fls_ntfs_fuzzer', 'fls_btrfs_fuzzer', 'fls_fat_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer']
tsk_fs_open_img_decrypt 157 50 31.84% ['fls_iso9660_fuzzer', 'fls_apfs_fuzzer', 'fls_ntfs_fuzzer', 'fls_btrfs_fuzzer', 'fls_fat_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer']
APFSFSCompat::dir_open_meta(TSK_FS_DIR**,unsignedlong,int)const 66 17 25.75% ['fls_apfs_fuzzer']
APFSFSCompat::file_add_meta(TSK_FS_FILE*,unsignedlong)const 72 19 26.38% ['fls_apfs_fuzzer']
APFSBtreeNodeIterator APFSJObjBtreeNode::find (unsignedlongconst&,APFSJObjTree::jobjs(unsignedlong)const::{lambda(auto:1const&,auto:2const&)#1})const 43 7 16.27% ['fls_apfs_fuzzer']
tsk_pool_open_img 42 20 47.61% ['fls_apfs_fuzzer']
print_dent_act(TSK_FS_FILE*,charconst*,void*) 56 6 10.71% ['fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_fat_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer']
tsk_fs_attr_alloc 31 16 51.61% ['fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_fat_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer']
iso9660_inode_walk(TSK_FS_INFO*,unsignedlong,unsignedlong,TSK_FS_META_FLAG_ENUM,TSK_WALK_RET_ENUM(*)(TSK_FS_FILE*,void*),void*) 114 45 39.47% ['fls_iso9660_fuzzer']
iso9660_inode_lookup(TSK_FS_INFO*,TSK_FS_FILE*,unsignedlong) 46 24 52.17% ['fls_iso9660_fuzzer']
iso9660_dir_open_meta(TSK_FS_INFO*,TSK_FS_DIR**,unsignedlong,int) 83 44 53.01% ['fls_iso9660_fuzzer']
tsk_fs_attr_walk 41 21 51.21% ['fls_fat_fuzzer', 'fls_ntfs_fuzzer']
is_clustalloc(NTFS_INFO*,unsignedlong) 76 24 31.57% ['fls_ntfs_fuzzer']
ntfs_load_secure(NTFS_INFO*) 127 51 40.15% ['fls_iso9660_fuzzer', 'fls_apfs_fuzzer', 'fls_ntfs_fuzzer', 'fls_btrfs_fuzzer', 'fls_fat_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer']
ext2fs_make_data_run_extent_index(TSK_FS_INFO*,TSK_FS_ATTR*,TSK_FS_ATTR*,unsignedlong,unsignedlong*) 82 35 42.68% ['fls_ext_fuzzer']
hfs_cat_read_file_folder_record(HFS_INFO*,long,hfs_file_folder*) 55 28 50.90% ['fls_hfs_fuzzer']
hfs_follow_hard_link(HFS_INFO*,hfs_file*,unsignedchar*) 89 25 28.08% ['fls_hfs_fuzzer']
hfs_load_attrs(TSK_FS_FILE*) 233 118 50.64% ['fls_hfs_fuzzer']
exfatfs_get_fs_size_params(FATFS_INFO*) 40 15 37.5% ['fls_iso9660_fuzzer', 'fls_apfs_fuzzer', 'fls_ntfs_fuzzer', 'fls_btrfs_fuzzer', 'fls_fat_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer']
exfatfs_get_fs_layout(FATFS_INFO*) 78 30 38.46% ['fls_iso9660_fuzzer', 'fls_apfs_fuzzer', 'fls_ntfs_fuzzer', 'fls_btrfs_fuzzer', 'fls_fat_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer']
exfatfs_inode_lookup 59 28 47.45% ['fls_fat_fuzzer']
fatfs_getFAT 126 68 53.96% ['fls_fat_fuzzer']
fatfs_dentry_load 33 17 51.51% ['fls_fat_fuzzer']
fatfs_make_data_runs 353 194 54.95% ['fls_fat_fuzzer']
fatfs_inode_walk 340 146 42.94% ['fls_fat_fuzzer']
fatxxfs_open 300 151 50.33% ['fls_iso9660_fuzzer', 'fls_apfs_fuzzer', 'fls_ntfs_fuzzer', 'fls_btrfs_fuzzer', 'fls_fat_fuzzer', 'fls_hfs_fuzzer', 'fls_ext_fuzzer']
fatxxfs_inode_lookup 53 25 47.16% ['fls_fat_fuzzer']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
/src/sleuthkit/tsk/img/img_open.h [] []
/src/sleuthkit/tsk/fs/apfs_compat.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/pool/apfs_pool.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/fs_inode.c ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/base/tsk_list.c ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/util/detect_encryption.c ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] []
/src/sleuthkit/tsk/fs/fs_file.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/btrfs.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_btrfs_fuzzer']
/src/sleuthkit/tsk/fs/fs_block.c [] []
/src/sleuthkit/ossfuzz/mmls_fuzzer.cc ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer']
/src/sleuthkit/tsk/vs/mm_open.c ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer']
/src/sleuthkit/tsk/fs/fs_name.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/decmpfs.cpp [] []
/src/sleuthkit/tsk/base/mymalloc.c ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/exfatfs.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/fatfs.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_fat_fuzzer']
/src/sleuthkit/tsk/base/tsk_error.c ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/apfs_open.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/vs/sun.c ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer'] ['mmls_sun_fuzzer']
/src/sleuthkit/tsk/fs/hfs_dent.cpp [] []
/src/sleuthkit/tsk/fs/apfs_compat.hpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/tsk_xfs.h [] []
/src/sleuthkit/tsk/fs/hfs.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_hfs_fuzzer']
/usr/local/bin/../include/c++/v1/string [] []
/src/sleuthkit/tsk/fs/tsk_apfs.hpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/ffs.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] []
/src/sleuthkit/tsk/base/tsk_endian.c ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/base/md5c.c [] []
/src/sleuthkit/tsk/base/crc.c ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_btrfs_fuzzer']
/src/sleuthkit/tsk/img/img_io.cpp ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/fatxxfs.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_fat_fuzzer']
/src/sleuthkit/./tsk/auto/guid.h ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] []
/src/sleuthkit/tsk/vs/dos.c ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer'] ['mmls_dos_fuzzer']
/src/sleuthkit/tsk/fs/hfs_unicompare.cpp [] []
/src/sleuthkit/tsk/fs/fs_attrlist.c ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/apfs.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/pool/apfs_pool_compat.cpp ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/vs/mm_part.c ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer']
/usr/local/bin/../include/c++/v1/__exception/exception.h [] []
/src/sleuthkit/tsk/fs/fatfs_meta.cpp [] []
/src/sleuthkit/ossfuzz/mem_img.h ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/rawfs.c ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] []
/src/sleuthkit/tsk/fs/fatxxfs_dent.c [] []
/src/sleuthkit/ossfuzz/fls_apfs_fuzzer.cc ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/pool/tsk_pool.hpp ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/fs_io.c ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/pool/pool_open.cpp ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/ntfs.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_ntfs_fuzzer']
/src/sleuthkit/tsk/fs/fs_open.c ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/ntfs_dent.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_ntfs_fuzzer']
/src/sleuthkit/tsk/fs/encryptionHelper.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/xfs.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] []
/src/sleuthkit/tsk/base/sha1c.c [] []
/src/sleuthkit/tsk/fs/apfs_fs.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/ext2fs_journal.cpp [] []
/src/sleuthkit/tsk/fs/iso9660_dent.cpp [] []
/src/sleuthkit/tsk/fs/lzvn.c [] []
/src/sleuthkit/tsk/img/img_open.cpp ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/img/unsupported_types.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] []
/src/sleuthkit/tsk/img/raw.cpp [] []
/src/sleuthkit/tsk/img/logical_img.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] []
/src/sleuthkit/tsk/fs/fs_attr.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/vs/mm_io.c ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer']
/src/sleuthkit/tsk/fs/xfs_dent.cpp [] []
/src/sleuthkit/tsk/fs/swapfs.c ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] []
/src/sleuthkit/tsk/util/file_system_utils.cpp [] []
/src/sleuthkit/tsk/base/tsk_lock.c ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/img/legacy_cache.cpp ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/vs/gpt.c ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer'] ['mmls_gpt_fuzzer']
/src/sleuthkit/tsk/base/tsk_stack.c ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/ossfuzz/fls_fuzzer.cc ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/apfs_fs.hpp ['fls_btrfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] []
/src/sleuthkit/tsk/fs/ifind_lib.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_hfs_fuzzer']
/src/sleuthkit/tsk/fs/fs_types.c [] []
/src/sleuthkit/tsk/fs/fatfs_dent.cpp [] []
/src/sleuthkit/tsk/fs/btrfs_csum.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_btrfs_fuzzer']
/src/sleuthkit/tsk/fs/ffs_dent.cpp [] []
/usr/local/bin/../include/c++/v1/stdexcept [] []
/src/sleuthkit/tsk/fs/fatxxfs_meta.cpp [] []
/src/sleuthkit/tsk/vs/mac.c ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer'] ['mmls_mac_fuzzer']
/src/sleuthkit/./tsk/pool/tsk_pool.hpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/./tsk/util/span.hpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] []
/src/sleuthkit/tsk/fs/hfs_journal.cpp [] []
/src/sleuthkit/tsk/pool/tsk_apfs.hpp ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/ext2fs.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_ext_fuzzer']
/src/sleuthkit/tsk/img/mult_files.cpp [] []
/src/sleuthkit/tsk/vs/bsd.c ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer'] []
/src/sleuthkit/tsk/fs/exfatfs_dent.cpp [] []
/src/sleuthkit/tsk/pool/pool_compat.hpp ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/fs_dir.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/ext2fs_dent.cpp [] []
/src/sleuthkit/tsk/fs/yaffs.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] []
/src/sleuthkit/tsk/fs/nofs_misc.cpp [] []
/src/sleuthkit/./tsk/util/lw_shared_ptr.hpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] []
/src/sleuthkit/tsk/fs/tsk_btrfs.h ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] []
/src/sleuthkit/tsk/base/tsk_printf.c ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] []
/src/sleuthkit/tsk/pool/apfs_pool_compat.hpp ['fls_apfs_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/fs/unix_misc.cpp [] []
/src/sleuthkit/tsk/fs/exfatfs_meta.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_fat_fuzzer']
/src/sleuthkit/./tsk/pool/tsk_apfs.hpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/auto/guid.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/./tsk/fs/tsk_apfs.hpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_apfs_fuzzer']
/src/sleuthkit/tsk/base/tsk_unicode.c ['mmls_gpt_fuzzer', 'mmls_sun_fuzzer', 'mmls_mac_fuzzer', 'mmls_dos_fuzzer', 'fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['mmls_gpt_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/fs_load.cpp [] []
/src/sleuthkit/tsk/fs/iso9660.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_iso9660_fuzzer']
/usr/local/bin/../include/c++/v1/sstream [] []
/src/sleuthkit/tsk/fs/logical_fs.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/fatfs_utils.c ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_fat_fuzzer']
/src/sleuthkit/tsk/fs/fls_lib.cpp ['fls_btrfs_fuzzer', 'fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer'] ['fls_apfs_fuzzer', 'fls_iso9660_fuzzer', 'fls_ntfs_fuzzer', 'fls_ext_fuzzer', 'fls_hfs_fuzzer', 'fls_fat_fuzzer']
/src/sleuthkit/./tsk/fs/apfs_fs.hpp ['fls_apfs_fuzzer'] []

Directories in report

Directory
/usr/local/bin/../include/c++/v1/__exception/
/src/sleuthkit/tsk/fs/
/src/sleuthkit/tsk/util/
/src/sleuthkit/tsk/img/
/src/sleuthkit/./tsk/pool/
/usr/local/bin/../include/c++/v1/
/src/sleuthkit/tsk/pool/
/src/sleuthkit/./tsk/fs/
/src/sleuthkit/./tsk/util/
/src/sleuthkit/tsk/auto/
/src/sleuthkit/./tsk/auto/
/src/sleuthkit/tsk/vs/
/src/sleuthkit/tsk/base/
/src/sleuthkit/ossfuzz/