Fuzz introspector: uri_dissect_query_mallocw_fuzzer
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
30 0 EP call site: 00000 uriComposeQueryW

Fuzzer calltree

0 LLVMFuzzerTestOneInput [function] [call site] 00000
1 consumeRemainingBytesAsString(FuzzedDataProvider&) [function] [call site] 00001
2 tryConsumeBytesAsString(FuzzedDataProvider&, unsigned long) [function] [call site] 00002
1 uriDissectQueryMallocW [function] [call site] 00003
2 uriDissectQueryMallocExW [function] [call site] 00004
3 uriDissectQueryMallocExMmW [function] [call site] 00005
4 uriMemoryManagerIsComplete [function] [call site] 00006
4 uriAppendQueryItemW [function] [call site] 00007
5 uriUnescapeInPlaceExW [function] [call site] 00008
6 uriHexdigToIntW [function] [call site] 00009
6 uriHexdigToIntW [function] [call site] 00010
5 uriUnescapeInPlaceExW [function] [call site] 00011
4 uriAppendQueryItemW [function] [call site] 00012
4 uriFreeQueryListMmW [function] [call site] 00013
5 uriMemoryManagerIsComplete [function] [call site] 00014
1 uriComposeQueryCharsRequiredW [function] [call site] 00015
2 uriComposeQueryCharsRequiredExW [function] [call site] 00016
3 uriComposeQueryEngineW [function] [call site] 00017
4 wcslen [call site] 00018
4 wcslen [call site] 00019
4 uriEscapeExW [function] [call site] 00020
5 uriHexToLetterW [function] [call site] 00021
6 uriHexToLetterExW [function] [call site] 00022
5 uriHexToLetterW [function] [call site] 00023
4 uriEscapeExW [function] [call site] 00024
1 uriFreeQueryListW [function] [call site] 00025
2 uriFreeQueryListMmW [function] [call site] 00026
1 uriComposeQueryW [function] [call site] 00027
2 uriComposeQueryExW [function] [call site] 00028
3 uriComposeQueryEngineW [function] [call site] 00029
1 uriFreeQueryListW [function] [call site] 00030