Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: json_load_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 21 17.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 102 82.9%
All colors 123 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
4 4 2 :

['fopen', 'create_callback_file']

14 352 loader_read_entire_file call site: 00008 /src/vulkan-loader/loader/loader_json.c:106
4 4 1 :

['loader_alloc']

4 4 loader_realloc call site: 00080 /src/vulkan-loader/loader/allocation.c:88
0 82 1 :

['loader_log']

0 84 loader_initialize call site: 00000 /src/vulkan-loader/loader/loader.c:2002
0 5 1 :

['loader_free']

0 5 loader_realloc call site: 00081 /src/vulkan-loader/loader/allocation.c:90
0 5 1 :

['loader_free']

0 5 ensure call site: 00080 /src/vulkan-loader/loader/cJSON.c:317
0 0 None 67 67 loader_log call site: 00015 /src/vulkan-loader/loader/log.c:145
0 0 None 2 84 loader_read_entire_file call site: 00026 /src/vulkan-loader/loader/loader_json.c:116
0 0 None 2 84 loader_read_entire_file call site: 00026 /src/vulkan-loader/loader/loader_json.c:122
0 0 None 2 2 loader_calloc call site: 00021 /src/vulkan-loader/loader/allocation.c:56
0 0 None 2 2 loader_realloc call site: 00082 /src/vulkan-loader/loader/allocation.c:94
0 0 None 2 2 loader_read_entire_file call site: 00026 /src/vulkan-loader/loader/loader_json.c:127
0 0 None 0 90 loader_get_json call site: 00028 /src/vulkan-loader/loader/loader_json.c:163

Runtime coverage analysis

Covered functions
43
Functions that are reachable but not covered
24
Reachable functions
57
Percentage of reachable functions covered
57.89%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
json_load_fuzzer.c 1
vulkan-loader/loader/loader_json.c 2
fuzz_header.h 1
/usr/include/x86_64-linux-gnu/sys/stat.h 1
vulkan-loader/loader/log.c 1
vulkan-loader/loader/debug_utils.c 3
vulkan-loader/loader/generated/vk_object_types.h 1
vulkan-loader/loader/allocation.c 6
vulkan-loader/loader/cJSON.c 24

Fuzzer: instance_enumerate_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 130 18.3%
gold [1:9] 5 0.70%
yellow [10:29] 3 0.42%
greenyellow [30:49] 8 1.12%
lawngreen 50+ 563 79.4%
All colors 709 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
14 120 8 :

['thread_safe_strtok.775', 'loader_strncpy.754', '__ctype_tolower_loc', 'strlen', 'determine_filter_type', 'strcmp', 'loader_log', 'loader_instance_heap_calloc']

14 128 parse_layers_disable_filter_environment_var call site: 00270 /src/vulkan-loader/loader/loader_environment.c:309
0 103 2 :

['loader_free_layer_properties', 'loader_log']

0 103 loader_append_layer_property call site: 00298 /src/vulkan-loader/loader/loader.c:434
0 82 1 :

['loader_log']

0 95 loader_add_to_dev_ext_list call site: 00434 /src/vulkan-loader/loader/loader.c:872
0 82 1 :

['loader_log']

0 84 loader_initialize call site: 00000 /src/vulkan-loader/loader/loader.c:2002
0 26 1 :

['loader_remove_layer_in_list']

0 108 remove_all_non_valid_override_layers call site: 00620 /src/vulkan-loader/loader/loader.c:2405
0 8 1 :

['loader_instance_heap_free']

0 8 append_str_to_string_list call site: 00171 /src/vulkan-loader/loader/loader.c:314
0 8 1 :

['loader_instance_heap_free']

0 8 append_str_to_string_list call site: 00173 /src/vulkan-loader/loader/loader.c:322
0 5 1 :

['loader_free']

0 5 loader_realloc call site: 00112 /src/vulkan-loader/loader/allocation.c:90
0 5 1 :

['loader_free']

0 5 ensure call site: 00111 /src/vulkan-loader/loader/cJSON.c:317
0 4 1 :

['loader_alloc']

0 4 loader_realloc call site: 00111 /src/vulkan-loader/loader/allocation.c:88
0 0 None 1895 3275 terminator_EnumerateInstanceExtensionProperties call site: 00000 /src/vulkan-loader/loader/loader.c:6980
0 0 None 10 1319 read_data_files_in_search_paths call site: 00532 /src/vulkan-loader/loader/loader.c:3275

Runtime coverage analysis

Covered functions
144
Functions that are reachable but not covered
58
Reachable functions
188
Percentage of reachable functions covered
69.15%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
instance_enumerate_fuzzer.c 3
vulkan-loader/loader/trampoline.c 1
vulkan-loader/loader/settings.c 18
vulkan-loader/loader/loader_environment.c 8
vulkan-loader/loader/allocation.c 8
vulkan-loader/loader/vk_loader_platform.h 13
vulkan-loader/loader/log.c 3
vulkan-loader/loader/debug_utils.c 3
vulkan-loader/loader/generated/vk_object_types.h 1
vulkan-loader/loader/loader_json.c 5
fuzz_header.h 1
/usr/include/x86_64-linux-gnu/sys/stat.h 1
vulkan-loader/loader/cJSON.c 31
vulkan-loader/loader/loader.c 49
/usr/include/stdlib.h 1
vulkan-loader/loader/wsi.c 1

Fuzzer: instance_create_advanced_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 481 43.8%
gold [1:9] 39 3.55%
yellow [10:29] 37 3.37%
greenyellow [30:49] 17 1.54%
lawngreen 50+ 523 47.6%
All colors 1097 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
1221 1228 8 :

['loader_remove_instance_only_debug_funcs', 'loader_validate_instance_extensions', 'loader_activate_instance_layer_extensions', 'loader_enable_instance_layers', 'loader_instance_heap_alloc', 'loader_create_instance_chain', 'loader_get_icd_loader_instance_extensions', 'fill_out_enabled_instance_extensions']

1270 1692 vkCreateInstance call site: 00716 /src/vulkan-loader/loader/trampoline.c:625
14 120 8 :

['thread_safe_strtok.775', 'loader_strncpy.754', '__ctype_tolower_loc', 'strlen', 'determine_filter_type', 'strcmp', 'loader_log', 'loader_instance_heap_calloc']

14 128 parse_layers_disable_filter_environment_var call site: 00286 /src/vulkan-loader/loader/loader_environment.c:309
0 103 2 :

['loader_free_layer_properties', 'loader_log']

0 103 loader_append_layer_property call site: 00314 /src/vulkan-loader/loader/loader.c:434
0 82 1 :

['loader_log']

0 84 loader_initialize call site: 00000 /src/vulkan-loader/loader/loader.c:2002
0 26 1 :

['loader_remove_layer_in_list']

0 108 remove_all_non_valid_override_layers call site: 00613 /src/vulkan-loader/loader/loader.c:2405
0 8 1 :

['loader_instance_heap_free']

0 8 append_str_to_string_list call site: 00195 /src/vulkan-loader/loader/loader.c:314
0 5 1 :

['loader_free']

0 5 loader_realloc call site: 00136 /src/vulkan-loader/loader/allocation.c:90
0 5 1 :

['loader_free']

0 5 ensure call site: 00135 /src/vulkan-loader/loader/cJSON.c:317
0 4 1 :

['loader_alloc']

0 4 loader_realloc call site: 00135 /src/vulkan-loader/loader/allocation.c:88
0 2 1 :

['loader_combine_version']

1272 5021 vkCreateInstance call site: 00022 /src/vulkan-loader/loader/trampoline.c:520
0 0 None 1272 5023 vkCreateInstance call site: 00022 /src/vulkan-loader/loader/trampoline.c:514
0 0 None 191 1166 loader_icd_scan call site: 00741 /src/vulkan-loader/loader/loader.c:3791

Runtime coverage analysis

Covered functions
153
Functions that are reachable but not covered
100
Reachable functions
246
Percentage of reachable functions covered
59.35%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
instance_create_advanced_fuzzer.c 3
fuzz_header.h 3
vulkan-loader/loader/trampoline.c 4
vulkan-loader/loader/log.c 2
vulkan-loader/loader/debug_utils.c 9
vulkan-loader/loader/generated/vk_object_types.h 1
vulkan-loader/loader/allocation.c 11
vulkan-loader/loader/vk_loader_platform.h 13
vulkan-loader/loader/loader.c 86
vulkan-loader/loader/settings.c 17
vulkan-loader/loader/loader_environment.c 9
vulkan-loader/loader/loader_json.c 5
/usr/include/x86_64-linux-gnu/sys/stat.h 1
vulkan-loader/loader/cJSON.c 32
/usr/include/stdlib.h 1
vulkan-loader/loader/wsi.c 1
vulkan-loader/loader/generated/vk_loader_extensions.c 3

Fuzzer: settings_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 130 27.8%
gold [1:9] 36 7.70%
yellow [10:29] 32 6.85%
greenyellow [30:49] 1 0.21%
lawngreen 50+ 268 57.3%
All colors 467 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
302 2895 15 :

['loader_copy_to_new_str', 'loader_parse_json_array_of_strings', 'loader_check_version_meets_required', 'loader_instance_heap_free', 'atoi', 'loader_cJSON_GetObjectItem', 'loader_parse_json_string_to_existing_str', 'loader_cJSON_GetStringValue', 'loader_append_layer_property', 'loader_parse_json_string', 'loader_combine_version', 'loader_add_to_dev_ext_list', 'strncmp', 'wsi_unsupported_instance_extension', 'loader_add_to_ext_list']

302 3490 loader_read_layer_json call site: 00431 /src/vulkan-loader/loader/loader.c:2611
296 455 4 :

['loader_instance_heap_free', 'loader_parse_json_string_to_existing_str', 'loader_add_to_dev_ext_list', 'atoi']

298 2163 loader_read_layer_json call site: 00431 /src/vulkan-loader/loader/loader.c:2718
4 4 1 :

['loader_alloc']

4 4 loader_realloc call site: 00111 /src/vulkan-loader/loader/allocation.c:88
0 103 2 :

['loader_free_layer_properties', 'loader_log']

0 103 loader_append_layer_property call site: 00271 /src/vulkan-loader/loader/loader.c:434
0 82 1 :

['loader_log']

0 84 loader_initialize call site: 00000 /src/vulkan-loader/loader/loader.c:2002
0 82 1 :

['loader_log']

0 82 loader_add_layer_properties call site: 00438 /src/vulkan-loader/loader/loader.c:2927
0 38 1 :

['loader_copy_to_new_str']

2 1326 loader_read_layer_json call site: 00431 /src/vulkan-loader/loader/loader.c:2753
0 26 1 :

['loader_cJSON_GetObjectItem']

0 108 loader_add_layer_properties call site: 00434 /src/vulkan-loader/loader/loader.c:2905
0 10 1 :

['loader_instance_heap_calloc']

0 18 append_str_to_string_list call site: 00170 /src/vulkan-loader/loader/loader.c:310
0 5 1 :

['loader_free']

0 5 loader_realloc call site: 00112 /src/vulkan-loader/loader/allocation.c:90
0 5 1 :

['loader_free']

0 5 ensure call site: 00111 /src/vulkan-loader/loader/cJSON.c:317
0 0 None 314 5598 loader_read_layer_json call site: 00431 /src/vulkan-loader/loader/loader.c:2450

Runtime coverage analysis

Covered functions
103
Functions that are reachable but not covered
46
Reachable functions
141
Percentage of reachable functions covered
67.38%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
settings_fuzzer.c 3
vulkan-loader/loader/settings.c 18
vulkan-loader/loader/loader_environment.c 1
vulkan-loader/loader/allocation.c 7
vulkan-loader/loader/vk_loader_platform.h 10
vulkan-loader/loader/log.c 3
vulkan-loader/loader/debug_utils.c 3
vulkan-loader/loader/generated/vk_object_types.h 1
vulkan-loader/loader/loader_json.c 5
fuzz_header.h 1
/usr/include/x86_64-linux-gnu/sys/stat.h 1
vulkan-loader/loader/cJSON.c 31
vulkan-loader/loader/loader.c 23
/usr/include/stdlib.h 1
vulkan-loader/loader/wsi.c 1

Fuzzer: instance_create_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 390 35.9%
gold [1:9] 9 0.82%
yellow [10:29] 15 1.38%
greenyellow [30:49] 7 0.64%
lawngreen 50+ 664 61.1%
All colors 1085 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
1221 1228 8 :

['loader_remove_instance_only_debug_funcs', 'loader_validate_instance_extensions', 'loader_activate_instance_layer_extensions', 'loader_enable_instance_layers', 'loader_instance_heap_alloc', 'loader_create_instance_chain', 'loader_get_icd_loader_instance_extensions', 'fill_out_enabled_instance_extensions']

1270 1692 vkCreateInstance call site: 00709 /src/vulkan-loader/loader/trampoline.c:625
37 989 9 :

['loader_combine_version', 'loader_platform_get_proc_address', 'loader_copy_to_new_str', 'loader_check_version_meets_required', 'loader_platform_close_library', 'loader_instance_heap_realloc', 'loader_log', 'loader_get_icd_interface_version', 'loader_make_version']

37 989 loader_scanned_icd_add call site: 00778 /src/vulkan-loader/loader/loader.c:1789
14 120 8 :

['thread_safe_strtok.775', 'loader_strncpy.754', '__ctype_tolower_loc', 'strlen', 'determine_filter_type', 'strcmp', 'loader_log', 'loader_instance_heap_calloc']

14 128 parse_layers_disable_filter_environment_var call site: 00279 /src/vulkan-loader/loader/loader_environment.c:309
0 103 2 :

['loader_free_layer_properties', 'loader_log']

0 103 loader_append_layer_property call site: 00307 /src/vulkan-loader/loader/loader.c:434
0 82 1 :

['loader_log']

0 95 loader_add_to_dev_ext_list call site: 00443 /src/vulkan-loader/loader/loader.c:872
0 82 1 :

['loader_log']

0 84 loader_initialize call site: 00000 /src/vulkan-loader/loader/loader.c:2002
0 26 1 :

['loader_remove_layer_in_list']

0 108 remove_all_non_valid_override_layers call site: 00606 /src/vulkan-loader/loader/loader.c:2405
0 8 1 :

['loader_instance_heap_free']

0 8 append_str_to_string_list call site: 00188 /src/vulkan-loader/loader/loader.c:314
0 8 1 :

['loader_instance_heap_free']

0 8 append_str_to_string_list call site: 00190 /src/vulkan-loader/loader/loader.c:322
0 5 1 :

['loader_free']

0 5 loader_realloc call site: 00129 /src/vulkan-loader/loader/allocation.c:90
0 5 1 :

['loader_free']

0 5 ensure call site: 00128 /src/vulkan-loader/loader/cJSON.c:317
0 4 1 :

['loader_alloc']

0 4 loader_realloc call site: 00128 /src/vulkan-loader/loader/allocation.c:88

Runtime coverage analysis

Covered functions
159
Functions that are reachable but not covered
90
Reachable functions
243
Percentage of reachable functions covered
62.96%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
instance_create_fuzzer.c 3
vulkan-loader/loader/trampoline.c 4
vulkan-loader/loader/log.c 2
vulkan-loader/loader/debug_utils.c 9
vulkan-loader/loader/generated/vk_object_types.h 1
vulkan-loader/loader/allocation.c 11
vulkan-loader/loader/vk_loader_platform.h 13
vulkan-loader/loader/loader.c 86
vulkan-loader/loader/settings.c 17
vulkan-loader/loader/loader_environment.c 9
vulkan-loader/loader/loader_json.c 5
fuzz_header.h 1
/usr/include/x86_64-linux-gnu/sys/stat.h 1
vulkan-loader/loader/cJSON.c 32
/usr/include/stdlib.h 1
vulkan-loader/loader/wsi.c 1
vulkan-loader/loader/generated/vk_loader_extensions.c 3

Fuzzer: instance_enumerate_fuzzer_split_input

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 221 31.1%
gold [1:9] 49 6.91%
yellow [10:29] 36 5.07%
greenyellow [30:49] 23 3.24%
lawngreen 50+ 380 53.5%
All colors 709 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
296 455 4 :

['loader_instance_heap_free', 'loader_parse_json_string_to_existing_str', 'loader_add_to_dev_ext_list', 'atoi']

298 2163 loader_read_layer_json call site: 00457 /src/vulkan-loader/loader/loader.c:2718
143 143 2 :

['loader_add_to_ext_list', 'wsi_unsupported_instance_extension']

445 2658 loader_read_layer_json call site: 00457 /src/vulkan-loader/loader/loader.c:2685
14 120 8 :

['thread_safe_strtok.775', 'loader_strncpy.754', '__ctype_tolower_loc', 'strlen', 'determine_filter_type', 'strcmp', 'loader_log', 'loader_instance_heap_calloc']

14 128 parse_layers_disable_filter_environment_var call site: 00270 /src/vulkan-loader/loader/loader_environment.c:309
0 103 2 :

['loader_free_layer_properties', 'loader_log']

0 103 loader_append_layer_property call site: 00298 /src/vulkan-loader/loader/loader.c:434
0 82 1 :

['loader_log']

0 84 loader_initialize call site: 00000 /src/vulkan-loader/loader/loader.c:2002
0 26 1 :

['loader_remove_layer_in_list']

0 108 remove_all_non_valid_override_layers call site: 00620 /src/vulkan-loader/loader/loader.c:2405
0 8 1 :

['loader_instance_heap_free']

0 8 append_str_to_string_list call site: 00171 /src/vulkan-loader/loader/loader.c:314
0 5 1 :

['loader_free']

0 5 loader_realloc call site: 00112 /src/vulkan-loader/loader/allocation.c:90
0 5 1 :

['loader_free']

0 5 ensure call site: 00111 /src/vulkan-loader/loader/cJSON.c:317
0 4 1 :

['loader_alloc']

0 4 loader_realloc call site: 00111 /src/vulkan-loader/loader/allocation.c:88
0 0 None 2032 3275 terminator_EnumerateInstanceExtensionProperties call site: 00000 /src/vulkan-loader/loader/loader.c:6980
0 0 None 445 4556 loader_read_layer_json call site: 00457 /src/vulkan-loader/loader/loader.c:2544

Runtime coverage analysis

Covered functions
135
Functions that are reachable but not covered
65
Reachable functions
188
Percentage of reachable functions covered
65.43%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
instance_enumerate_fuzzer.c 3
vulkan-loader/loader/trampoline.c 1
vulkan-loader/loader/settings.c 18
vulkan-loader/loader/loader_environment.c 8
vulkan-loader/loader/allocation.c 8
vulkan-loader/loader/vk_loader_platform.h 13
vulkan-loader/loader/log.c 3
vulkan-loader/loader/debug_utils.c 3
vulkan-loader/loader/generated/vk_object_types.h 1
vulkan-loader/loader/loader_json.c 5
fuzz_header.h 1
/usr/include/x86_64-linux-gnu/sys/stat.h 1
vulkan-loader/loader/cJSON.c 31
vulkan-loader/loader/loader.c 49
/usr/include/stdlib.h 1
vulkan-loader/loader/wsi.c 1

Analyses and suggestions

Optimal target analysis

Remaining optimal interesting functions

The following table shows a list of functions that are optimal targets. Optimal targets are identified by finding the functions that in combination, yield a high code coverage.

Func name Functions filename Arg count Args Function depth hitcount instr count bb count cyclomatic complexity Reachable functions Incoming references total cyclomatic complexity Unreached complexity
vkGetDeviceProcAddr /src/vulkan-loader/loader/trampoline.c 2 ['N/A', 'N/A'] 3 0 187 36 17 8 0 1077 1067
vkGetInstanceProcAddr /src/vulkan-loader/loader/trampoline.c 2 ['N/A', 'N/A'] 7 0 75 19 8 37 0 944 823
terminator_EnumeratePhysicalDeviceGroups /src/vulkan-loader/loader/loader.c 3 ['N/A', 'N/A', 'N/A'] 5 0 1252 210 79 37 0 366 233
vkCreateDevice /src/vulkan-loader/loader/trampoline.c 4 ['N/A', 'N/A', 'N/A', 'N/A'] 7 0 31 5 2 48 0 338 132
loader_gpa_instance_terminator /src/vulkan-loader/loader/loader.c 2 ['N/A', 'N/A'] 6 0 247 48 23 30 0 314 125
terminator_CreateInstance /src/vulkan-loader/loader/loader.c 3 ['N/A', 'N/A', 'N/A'] 6 0 866 156 60 33 0 315 77
terminator_DebugReportMessageEXT /src/vulkan-loader/loader/debug_utils.c 8 ['N/A', 'int', 'int', 'size_t', 'size_t', 'int', 'N/A', 'N/A'] 3 0 66 12 5 8 0 79 71
vkEnumeratePhysicalDeviceGroups /src/vulkan-loader/loader/trampoline.c 3 ['N/A', 'N/A', 'N/A'] 6 0 87 17 7 22 0 196 70
terminator_CreateDisplayPlaneSurfaceKHR /src/vulkan-loader/loader/wsi.c 4 ['N/A', 'N/A', 'N/A', 'N/A'] 7 0 99 8 4 27 0 197 59
terminator_CreateDevice /src/vulkan-loader/loader/loader.c 4 ['N/A', 'N/A', 'N/A', 'N/A'] 6 0 719 120 47 26 0 208 51

Implementing fuzzers that target the above functions will improve reachability such that it becomes:

Functions statically reachable by fuzzers
25.0%
282 / 1137
Cyclomatic complexity statically reachable by fuzzers
66.0%
4649 / 7009

All functions overview

If you implement fuzzers for these functions, the status of all functions in the project will be:

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

json_load_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['loader_log', 'loader_read_entire_file', 'ensure', 'print_number', 'loader_calloc', 'parse_array', 'loader_cJSON_ParseWithLengthOpts', 'loader_instance_heap_free']

instance_enumerate_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['loader_scan_for_implicit_layers', 'loader_realloc', 'parse_layers_disable_filter_environment_var', 'print_string_ptr', 'update_offset', 'check_name_matches_filter_environment_var', 'loader_log', 'combine_settings_layers_with_regular_layers', 'read_data_files_in_search_paths']

instance_create_advanced_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['vkCreateInstance', 'loader_destroy_pointer_layer_list', 'loader_parse_icd_manifest', 'loader_icd_scan', 'loader_realloc', 'parse_layers_disable_filter_environment_var']

settings_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['loader_read_layer_json', 'loader_realloc', 'combine_manifest_directory_and_library_path', 'print_string_ptr', 'update_offset', 'loader_log', 'loader_parse_json_array_of_strings']

instance_create_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['vkCreateInstance', 'loader_destroy_pointer_layer_list', 'loader_handle_load_library_error', 'loader_icd_scan', 'parse_layers_disable_filter_environment_var', 'check_name_matches_filter_environment_var', 'loader_parse_icd_manifest']

instance_enumerate_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['loader_read_layer_json', 'loader_scan_for_implicit_layers', 'loader_realloc', 'parse_layers_disable_filter_environment_var', 'print_string_ptr', 'update_offset']

Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
print 36 18 50.0% ['instance_enumerate_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'json_load_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer']
loader_init_global_debug_level 37 8 21.62% ['instance_enumerate_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'json_load_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer']
loader_remove_layers_not_in_implicit_meta_layers 38 18 47.36% ['instance_enumerate_fuzzer', 'instance_enumerate_fuzzer_split_input']
vk_string_validate 36 16 44.44% ['instance_create_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input']
determine_filter_type 46 18 39.13% ['instance_create_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input']
parse_layers_disable_filter_environment_var 63 12 19.04% ['instance_create_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input']
check_name_matches_filter_environment_var 48 25 52.08% ['instance_create_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input']
vkEnumerateInstanceExtensionProperties 67 33 49.25% ['instance_enumerate_fuzzer', 'instance_enumerate_fuzzer_split_input']
convertCoreObjectToDebugReportObject 88 7 7.954% ['instance_enumerate_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'json_load_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer']
loader_scan_for_direct_drivers 69 11 15.94% ['instance_create_fuzzer', 'instance_create_advanced_fuzzer']
loader_icd_scan 107 58 54.20% ['instance_create_fuzzer', 'instance_create_advanced_fuzzer']
vkCreateInstance 211 88 41.70% ['instance_create_fuzzer', 'instance_create_advanced_fuzzer']
loader_scanned_icd_add 154 27 17.53% ['instance_create_fuzzer', 'instance_create_advanced_fuzzer']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
/src/vulkan-loader/loader/loader.c ['instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input'] ['instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']
/src/vulkan-loader/loader/gpa_helper.c [] []
/src/instance_enumerate_fuzzer.c ['instance_enumerate_fuzzer', 'instance_enumerate_fuzzer_split_input'] ['instance_enumerate_fuzzer', 'instance_enumerate_fuzzer_split_input']
/src/vulkan-loader/loader/phys_dev_ext.c [] []
/src/vulkan-loader/loader/log.c ['json_load_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input'] ['json_load_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']
/src/vulkan-loader/loader/generated/vk_object_types.h ['json_load_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input'] ['instance_create_advanced_fuzzer', 'instance_create_fuzzer']
/src/vulkan-loader/loader/dev_ext_trampoline.c [] []
/src/vulkan-loader/loader/wsi.c ['instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input'] ['instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer']
/usr/include/stdlib.h ['instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input'] []
/src/instance_create_fuzzer.c ['instance_create_fuzzer'] ['instance_create_fuzzer']
/src/vulkan-loader/loader/loader.h [] []
/src/vulkan-loader/loader/vk_loader_platform.h ['instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input'] ['instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']
/src/vulkan-loader/loader/loader_environment.c ['instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input'] ['instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']
/src/json_load_fuzzer.c ['json_load_fuzzer'] ['json_load_fuzzer']
/src/vulkan-loader/loader/terminator.c [] []
/src/vulkan-loader/loader/debug_utils.c ['json_load_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input'] ['instance_create_advanced_fuzzer', 'instance_create_fuzzer']
/src/vulkan-loader/loader/allocation.c ['json_load_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input'] ['json_load_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']
/src/vulkan-loader/loader/generated/vk_loader_extensions.c ['instance_create_advanced_fuzzer', 'instance_create_fuzzer'] []
/src/instance_create_advanced_fuzzer.c ['instance_create_advanced_fuzzer'] ['instance_create_advanced_fuzzer']
/src/vulkan-loader/loader/loader_linux.c [] []
/src/vulkan-loader/loader/cJSON.c ['json_load_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input'] ['json_load_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']
/usr/include/x86_64-linux-gnu/sys/stat.h ['json_load_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input'] []
/src/vulkan-loader/loader/unknown_function_handling.c [] []
/src/vulkan-loader/loader/extension_manual.c [] []
/src/vulkan-loader/loader/trampoline.c ['instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input'] ['instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']
/src/vulkan-loader/loader/loader_json.c ['json_load_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input'] ['json_load_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']
/src/settings_fuzzer.c ['settings_fuzzer'] ['settings_fuzzer']
/src/fuzz_header.h ['json_load_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input'] ['instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']
/src/vulkan-loader/loader/settings.c ['instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input'] ['instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'settings_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']

Directories in report

Directory
/src/
/src/vulkan-loader/loader/generated/
/src/vulkan-loader/loader/
/usr/include/x86_64-linux-gnu/sys/
/usr/include/