Fuzz introspector: xrow_greeting_decode_fuzzer
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
2 2 1 :

['abort']

2 2 mh_strnptr_resize call site: 00000 /src/tarantool/src/lib/salad/mhash.h:494
0 56 1 :

['mh_strnptr_put']

0 56 mh_strnptr_put call site: 00000 /src/tarantool/src/lib/salad/mhash.h:319
0 0 None 0 0 tt_uuid_from_strl call site: 00031 /src/tarantool/src/lib/core/tt_uuid.c:98
0 0 None 0 0 mh_strnptr_resize call site: 00000 /src/tarantool/src/lib/salad/mhash.h:482
0 0 None 0 0 mh_strnptr_start_resize call site: 00000 /src/tarantool/src/lib/salad/mhash.h:505
0 0 None 0 0 mh_strnptr_start_resize call site: 00000 /src/tarantool/src/lib/salad/mhash.h:509
0 0 None 0 0 mh_strnptr_put call site: 00000 /src/tarantool/src/lib/salad/mhash.h:330

Fuzzer calltree

0 LLVMFuzzerTestOneInput [function] [call site] 00000
1 mp_check [function] [call site] 00001
2 mp_load_u8 [function] [call site] 00002
2 mp_load_u8 [function] [call site] 00003
2 mp_load_u8 [function] [call site] 00004
2 mp_load_u16 [function] [call site] 00005
2 mp_load_u32 [function] [call site] 00006
2 mp_load_u16 [function] [call site] 00007
2 mp_load_u32 [function] [call site] 00008
2 mp_load_u16 [function] [call site] 00009
2 mp_load_u32 [function] [call site] 00010
2 mp_load_u8 [function] [call site] 00011
2 mp_load_u8 [function] [call site] 00012
2 mp_load_u16 [function] [call site] 00013
2 mp_load_u8 [function] [call site] 00014
2 mp_load_u32 [function] [call site] 00015
2 mp_load_u8 [function] [call site] 00016
2 __assert_fail [call site] 00017
2 __assert_fail [call site] 00018
1 calloc [call site] 00019
1 alloc_failure [function] [call site] 00020
2 fprintf [call site] 00021
2 exit [call site] 00022
1 greeting_decode [function] [call site] 00023
2 memcmp [call site] 00024
2 memchr [call site] 00025
2 __isoc99_sscanf [call site] 00026
2 version_id [function] [call site] 00027
2 memchr [call site] 00028
2 strcmp [call site] 00029
2 version_id [function] [call site] 00030
2 tt_uuid_from_strl [function] [call site] 00031
3 snprintf [call site] 00032
3 tt_uuid_from_string [function] [call site] 00033
4 strlen [call site] 00034
4 __isoc99_sscanf [call site] 00035
2 version_id [function] [call site] 00036
2 strlcpy [function] [call site] 00037
3 strlen [call site] 00038
2 base64_decode [function] [call site] 00039
3 base64_decode_value [function] [call site] 00040
3 base64_decode_value [function] [call site] 00041
3 base64_decode_value [function] [call site] 00042
3 base64_decode_value [function] [call site] 00043