Fuzz introspector: uri_dissect_query_malloc_fuzzer
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
30 0 EP call site: 00000 uriComposeQueryA

Fuzzer calltree

0 LLVMFuzzerTestOneInput [function] [call site] 00000
1 consumeRemainingBytesAsString(FuzzedDataProvider&) [function] [call site] 00001
2 tryConsumeBytesAsString(FuzzedDataProvider&, unsigned long) [function] [call site] 00002
1 uriDissectQueryMallocA [function] [call site] 00003
2 uriDissectQueryMallocExA [function] [call site] 00004
3 uriDissectQueryMallocExMmA [function] [call site] 00005
4 uriMemoryManagerIsComplete [function] [call site] 00006
4 uriAppendQueryItemA [function] [call site] 00007
5 uriUnescapeInPlaceExA [function] [call site] 00008
6 uriHexdigToIntA [function] [call site] 00009
6 uriHexdigToIntA [function] [call site] 00010
5 uriUnescapeInPlaceExA [function] [call site] 00011
4 uriAppendQueryItemA [function] [call site] 00012
4 uriFreeQueryListMmA [function] [call site] 00013
5 uriMemoryManagerIsComplete [function] [call site] 00014
1 uriComposeQueryCharsRequiredA [function] [call site] 00015
2 uriComposeQueryCharsRequiredExA [function] [call site] 00016
3 uriComposeQueryEngineA [function] [call site] 00017
4 strlen [call site] 00018
4 strlen [call site] 00019
4 uriEscapeExA [function] [call site] 00020
5 uriHexToLetterA [function] [call site] 00021
6 uriHexToLetterExA [function] [call site] 00022
5 uriHexToLetterA [function] [call site] 00023
4 uriEscapeExA [function] [call site] 00024
1 uriFreeQueryListA [function] [call site] 00025
2 uriFreeQueryListMmA [function] [call site] 00026
1 uriComposeQueryA [function] [call site] 00027
2 uriComposeQueryExA [function] [call site] 00028
3 uriComposeQueryEngineA [function] [call site] 00029
1 uriFreeQueryListA [function] [call site] 00030