The following nodes represent call sites where fuzz blockers occur.
Amount of callsites blocked | Calltree index | Parent function | Callsite | Largest blocked function |
---|---|---|---|---|
4 | 0 | EP | call site: 00000 |
[WildcardStringParserFuzzer].fuzzerTestOneInput(com.code_intelligence.jazzer.api.FuzzedDataProvider)
[function]
[call site]
00000
[com.code_intelligence.jazzer.api.FuzzedDataProvider].consumeRemainingAsString()
[function]
[call site]
00001
[com.twelvemonkeys.util.regex.WildcardStringParser].<init>(String)
[function]
[call site]
00002
[com.twelvemonkeys.util.regex.WildcardStringParser].<init>(String,boolean)
[function]
[call site]
00003
[com.twelvemonkeys.util.regex.WildcardStringParser].<init>(String,boolean,com.twelvemonkeys.util.regex.WildcardStringParser)
[function]
[call site]
00004