Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: json_load_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 21 17.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 102 82.9%
All colors 123 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
4 4 2 :

['fopen', 'create_callback_file']

14 352 loader_read_entire_file call site: 00008 /src/vulkan-loader/loader/loader_json.c:106
4 4 1 :

['loader_alloc']

4 4 loader_realloc call site: 00080 /src/vulkan-loader/loader/allocation.c:88
0 82 1 :

['loader_log']

0 84 loader_initialize call site: 00000 /src/vulkan-loader/loader/loader.c:2036
0 5 1 :

['loader_free']

0 5 loader_realloc call site: 00081 /src/vulkan-loader/loader/allocation.c:90
0 5 1 :

['loader_free']

0 5 ensure call site: 00080 /src/vulkan-loader/loader/cJSON.c:317
0 0 None 67 67 loader_log call site: 00015 /src/vulkan-loader/loader/log.c:145
0 0 None 2 84 loader_read_entire_file call site: 00026 /src/vulkan-loader/loader/loader_json.c:116
0 0 None 2 84 loader_read_entire_file call site: 00026 /src/vulkan-loader/loader/loader_json.c:122
0 0 None 2 2 loader_calloc call site: 00021 /src/vulkan-loader/loader/allocation.c:56
0 0 None 2 2 loader_realloc call site: 00082 /src/vulkan-loader/loader/allocation.c:94
0 0 None 2 2 loader_read_entire_file call site: 00026 /src/vulkan-loader/loader/loader_json.c:127
0 0 None 0 90 loader_get_json call site: 00028 /src/vulkan-loader/loader/loader_json.c:163

Runtime coverage analysis

Covered functions
43
Functions that are reachable but not covered
24
Reachable functions
57
Percentage of reachable functions covered
57.89%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
json_load_fuzzer.c 1
vulkan-loader/loader/loader_json.c 2
fuzz_header.h 1
/usr/include/x86_64-linux-gnu/sys/stat.h 1
vulkan-loader/loader/log.c 1
vulkan-loader/loader/debug_utils.c 3
vulkan-loader/loader/generated/vk_object_types.h 1
vulkan-loader/loader/allocation.c 6
vulkan-loader/loader/cJSON.c 24

Fuzzer: instance_enumerate_fuzzer_split_input

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 326 43.5%
gold [1:9] 28 3.74%
yellow [10:29] 27 3.60%
greenyellow [30:49] 10 1.33%
lawngreen 50+ 357 47.7%
All colors 748 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
445 3326 15 :

['loader_parse_json_string', 'loader_parse_json_array_of_strings', 'loader_add_to_ext_list', 'loader_cJSON_GetObjectItem', 'loader_combine_version', 'loader_add_to_dev_ext_list', 'strncmp', 'atoi', 'loader_append_layer_property', 'loader_check_version_meets_required', 'loader_cJSON_GetStringValue', 'loader_instance_heap_free', 'wsi_unsupported_instance_extension', 'loader_copy_to_new_str', 'loader_parse_json_string_to_existing_str']

445 4167 loader_read_layer_json call site: 00496 /src/vulkan-loader/loader/loader.c:2607
181 202 5 :

['loader_cJSON_GetArraySize', 'loader_instance_heap_calloc', 'loader_instance_heap_free', 'parse_additional_driver', 'free_driver_configuration']

181 202 parse_additional_drivers call site: 00217 /src/vulkan-loader/loader/settings.c:256
166 187 5 :

['parse_device_configuration', 'loader_cJSON_GetArraySize', 'loader_instance_heap_calloc', 'free_device_configuration', 'loader_instance_heap_free']

166 187 parse_device_configurations call site: 00227 /src/vulkan-loader/loader/settings.c:346
14 120 8 :

['loader_instance_heap_calloc', 'loader_log', 'thread_safe_strtok.775', '__ctype_tolower_loc', 'strlen', 'strcmp', 'determine_filter_type', 'loader_strncpy.754']

14 128 parse_layers_disable_filter_environment_var call site: 00312 /src/vulkan-loader/loader/loader_environment.c:309
0 103 2 :

['loader_log', 'loader_free_layer_properties']

0 103 loader_append_layer_property call site: 00340 /src/vulkan-loader/loader/loader.c:468
0 82 1 :

['loader_log']

0 84 loader_initialize call site: 00000 /src/vulkan-loader/loader/loader.c:2036
0 82 1 :

['loader_log']

0 82 loader_init_generic_list call site: 00338 /src/vulkan-loader/loader/loader.c:766
0 26 1 :

['loader_remove_layer_in_list']

0 108 remove_all_non_valid_override_layers call site: 00660 /src/vulkan-loader/loader/loader.c:2439
0 22 1 :

['loader_instance_heap_realloc']

0 22 incrase_str_capacity_by_at_least_one call site: 00172 /src/vulkan-loader/loader/loader.c:317
0 8 1 :

['loader_instance_heap_free']

0 8 append_str_to_string_list call site: 00171 /src/vulkan-loader/loader/loader.c:332
0 5 1 :

['loader_free']

0 5 loader_realloc call site: 00112 /src/vulkan-loader/loader/allocation.c:90
0 5 1 :

['loader_free']

0 5 ensure call site: 00111 /src/vulkan-loader/loader/cJSON.c:317

Runtime coverage analysis

Covered functions
130
Functions that are reachable but not covered
81
Reachable functions
199
Percentage of reachable functions covered
59.3%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
instance_enumerate_fuzzer.c 3
vulkan-loader/loader/trampoline.c 1
vulkan-loader/loader/settings.c 28
vulkan-loader/loader/loader_environment.c 8
vulkan-loader/loader/allocation.c 8
vulkan-loader/loader/vk_loader_platform.h 13
vulkan-loader/loader/log.c 3
vulkan-loader/loader/debug_utils.c 3
vulkan-loader/loader/generated/vk_object_types.h 1
vulkan-loader/loader/loader_json.c 5
fuzz_header.h 1
/usr/include/x86_64-linux-gnu/sys/stat.h 1
vulkan-loader/loader/cJSON.c 31
vulkan-loader/loader/loader.c 50
/usr/include/stdlib.h 1
vulkan-loader/loader/wsi.c 1

Fuzzer: instance_enumerate_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 163 21.7%
gold [1:9] 20 2.67%
yellow [10:29] 21 2.80%
greenyellow [30:49] 9 1.20%
lawngreen 50+ 535 71.5%
All colors 748 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
181 202 5 :

['loader_cJSON_GetArraySize', 'loader_instance_heap_calloc', 'loader_instance_heap_free', 'parse_additional_driver', 'free_driver_configuration']

181 202 parse_additional_drivers call site: 00217 /src/vulkan-loader/loader/settings.c:256
166 187 5 :

['parse_device_configuration', 'loader_cJSON_GetArraySize', 'loader_instance_heap_calloc', 'free_device_configuration', 'loader_instance_heap_free']

166 187 parse_device_configurations call site: 00227 /src/vulkan-loader/loader/settings.c:346
14 120 8 :

['loader_instance_heap_calloc', 'loader_log', 'thread_safe_strtok.775', '__ctype_tolower_loc', 'strlen', 'strcmp', 'determine_filter_type', 'loader_strncpy.754']

14 128 parse_layers_disable_filter_environment_var call site: 00312 /src/vulkan-loader/loader/loader_environment.c:309
0 103 2 :

['loader_log', 'loader_free_layer_properties']

0 103 loader_append_layer_property call site: 00340 /src/vulkan-loader/loader/loader.c:468
0 82 1 :

['loader_log']

0 95 loader_add_to_dev_ext_list call site: 00473 /src/vulkan-loader/loader/loader.c:906
0 82 1 :

['loader_log']

0 84 loader_initialize call site: 00000 /src/vulkan-loader/loader/loader.c:2036
0 82 1 :

['loader_log']

0 82 loader_init_generic_list call site: 00338 /src/vulkan-loader/loader/loader.c:766
0 26 1 :

['loader_remove_layer_in_list']

0 108 remove_all_non_valid_override_layers call site: 00660 /src/vulkan-loader/loader/loader.c:2439
0 8 1 :

['loader_instance_heap_free']

0 8 append_str_to_string_list call site: 00171 /src/vulkan-loader/loader/loader.c:332
0 5 1 :

['loader_free']

0 5 loader_realloc call site: 00112 /src/vulkan-loader/loader/allocation.c:90
0 5 1 :

['loader_free']

0 5 ensure call site: 00111 /src/vulkan-loader/loader/cJSON.c:317
0 4 1 :

['loader_alloc']

0 4 loader_realloc call site: 00111 /src/vulkan-loader/loader/allocation.c:88

Runtime coverage analysis

Covered functions
147
Functions that are reachable but not covered
66
Reachable functions
199
Percentage of reachable functions covered
66.83%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
instance_enumerate_fuzzer.c 3
vulkan-loader/loader/trampoline.c 1
vulkan-loader/loader/settings.c 28
vulkan-loader/loader/loader_environment.c 8
vulkan-loader/loader/allocation.c 8
vulkan-loader/loader/vk_loader_platform.h 13
vulkan-loader/loader/log.c 3
vulkan-loader/loader/debug_utils.c 3
vulkan-loader/loader/generated/vk_object_types.h 1
vulkan-loader/loader/loader_json.c 5
fuzz_header.h 1
/usr/include/x86_64-linux-gnu/sys/stat.h 1
vulkan-loader/loader/cJSON.c 31
vulkan-loader/loader/loader.c 50
/usr/include/stdlib.h 1
vulkan-loader/loader/wsi.c 1

Fuzzer: instance_create_advanced_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 608 53.1%
gold [1:9] 51 4.45%
yellow [10:29] 41 3.58%
greenyellow [30:49] 30 2.62%
lawngreen 50+ 414 36.1%
All colors 1144 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
1224 1231 8 :

['loader_enable_instance_layers', 'loader_activate_instance_layer_extensions', 'loader_validate_instance_extensions', 'fill_out_enabled_instance_extensions', 'loader_get_icd_loader_instance_extensions', 'loader_create_instance_chain', 'loader_instance_heap_alloc', 'loader_remove_instance_only_debug_funcs']

1273 1705 vkCreateInstance call site: 00746 /src/vulkan-loader/loader/trampoline.c:625
181 202 5 :

['loader_cJSON_GetArraySize', 'loader_instance_heap_calloc', 'loader_instance_heap_free', 'parse_additional_driver', 'free_driver_configuration']

181 202 parse_additional_drivers call site: 00241 /src/vulkan-loader/loader/settings.c:256
166 187 5 :

['parse_device_configuration', 'loader_cJSON_GetArraySize', 'loader_instance_heap_calloc', 'free_device_configuration', 'loader_instance_heap_free']

166 187 parse_device_configurations call site: 00251 /src/vulkan-loader/loader/settings.c:346
14 120 8 :

['loader_instance_heap_calloc', 'loader_log', 'thread_safe_strtok.775', '__ctype_tolower_loc', 'strlen', 'strcmp', 'determine_filter_type', 'loader_strncpy.754']

14 128 parse_layers_disable_filter_environment_var call site: 00319 /src/vulkan-loader/loader/loader_environment.c:309
4 414 11 :

['combine_manifest_directory_and_library_path', 'loader_combine_version', 'strncmp', 'loader_cJSON_Print', 'loader_check_version_meets_required', 'loader_make_full_version', 'loader_instance_heap_free', 'loader_cJSON_GetStringValue', 'loader_parse_version_string', 'loader_cJSON_GetObjectItem', 'loader_cJSON_IsTrue']

4 1413 loader_parse_icd_manifest call site: 00787 /src/vulkan-loader/loader/loader.c:3643
4 131 5 :

['verify_meta_layer_component_layers', 'loader_make_version', 'loader_check_version_meets_required', 'loader_find_layer_property', 'strcmp']

4 787 verify_meta_layer_component_layers call site: 00680 /src/vulkan-loader/loader/loader.c:2233
0 103 2 :

['loader_log', 'loader_free_layer_properties']

0 103 loader_append_layer_property call site: 00347 /src/vulkan-loader/loader/loader.c:468
0 82 1 :

['loader_log']

0 84 loader_initialize call site: 00000 /src/vulkan-loader/loader/loader.c:2036
0 82 1 :

['loader_log']

0 82 loader_init_generic_list call site: 00345 /src/vulkan-loader/loader/loader.c:766
0 26 1 :

['loader_remove_layer_in_list']

0 108 remove_all_non_valid_override_layers call site: 00645 /src/vulkan-loader/loader/loader.c:2439
0 26 1 :

['loader_cJSON_GetObjectItem']

0 108 loader_add_layer_properties call site: 00506 /src/vulkan-loader/loader/loader.c:2939
0 22 1 :

['loader_instance_heap_realloc']

0 22 incrase_str_capacity_by_at_least_one call site: 00196 /src/vulkan-loader/loader/loader.c:317

Runtime coverage analysis

Covered functions
151
Functions that are reachable but not covered
114
Reachable functions
258
Percentage of reachable functions covered
55.81%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
instance_create_advanced_fuzzer.c 3
fuzz_header.h 3
vulkan-loader/loader/trampoline.c 4
vulkan-loader/loader/log.c 2
vulkan-loader/loader/debug_utils.c 9
vulkan-loader/loader/generated/vk_object_types.h 1
vulkan-loader/loader/allocation.c 11
vulkan-loader/loader/vk_loader_platform.h 13
vulkan-loader/loader/loader.c 90
vulkan-loader/loader/settings.c 25
vulkan-loader/loader/loader_environment.c 9
vulkan-loader/loader/loader_json.c 5
/usr/include/x86_64-linux-gnu/sys/stat.h 1
vulkan-loader/loader/cJSON.c 32
/usr/include/stdlib.h 1
vulkan-loader/loader/wsi.c 1
vulkan-loader/loader/generated/vk_loader_extensions.c 3

Fuzzer: instance_create_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 426 37.6%
gold [1:9] 8 0.70%
yellow [10:29] 7 0.61%
greenyellow [30:49] 5 0.44%
lawngreen 50+ 686 60.6%
All colors 1132 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
1224 1231 8 :

['loader_enable_instance_layers', 'loader_activate_instance_layer_extensions', 'loader_validate_instance_extensions', 'fill_out_enabled_instance_extensions', 'loader_get_icd_loader_instance_extensions', 'loader_create_instance_chain', 'loader_instance_heap_alloc', 'loader_remove_instance_only_debug_funcs']

1273 1705 vkCreateInstance call site: 00739 /src/vulkan-loader/loader/trampoline.c:625
181 202 5 :

['loader_cJSON_GetArraySize', 'loader_instance_heap_calloc', 'loader_instance_heap_free', 'parse_additional_driver', 'free_driver_configuration']

181 202 parse_additional_drivers call site: 00234 /src/vulkan-loader/loader/settings.c:256
166 187 5 :

['parse_device_configuration', 'loader_cJSON_GetArraySize', 'loader_instance_heap_calloc', 'free_device_configuration', 'loader_instance_heap_free']

166 187 parse_device_configurations call site: 00244 /src/vulkan-loader/loader/settings.c:346
37 989 9 :

['loader_platform_get_proc_address', 'loader_combine_version', 'loader_make_version', 'loader_log', 'loader_check_version_meets_required', 'loader_get_icd_interface_version', 'loader_copy_to_new_str', 'loader_platform_close_library', 'loader_instance_heap_realloc']

37 989 loader_scanned_icd_add call site: 00822 /src/vulkan-loader/loader/loader.c:1823
14 120 8 :

['loader_instance_heap_calloc', 'loader_log', 'thread_safe_strtok.775', '__ctype_tolower_loc', 'strlen', 'strcmp', 'determine_filter_type', 'loader_strncpy.754']

14 128 parse_layers_disable_filter_environment_var call site: 00312 /src/vulkan-loader/loader/loader_environment.c:309
0 103 2 :

['loader_log', 'loader_free_layer_properties']

0 103 loader_append_layer_property call site: 00340 /src/vulkan-loader/loader/loader.c:468
0 82 1 :

['loader_log']

0 95 loader_add_to_dev_ext_list call site: 00473 /src/vulkan-loader/loader/loader.c:906
0 82 1 :

['loader_log']

0 84 loader_initialize call site: 00000 /src/vulkan-loader/loader/loader.c:2036
0 82 1 :

['loader_log']

0 82 loader_init_generic_list call site: 00338 /src/vulkan-loader/loader/loader.c:766
0 26 1 :

['loader_remove_layer_in_list']

0 108 remove_all_non_valid_override_layers call site: 00638 /src/vulkan-loader/loader/loader.c:2439
0 8 1 :

['loader_instance_heap_free']

0 8 append_str_to_string_list call site: 00188 /src/vulkan-loader/loader/loader.c:332
0 5 1 :

['loader_free']

0 5 loader_realloc call site: 00129 /src/vulkan-loader/loader/allocation.c:90

Runtime coverage analysis

Covered functions
164
Functions that are reachable but not covered
97
Reachable functions
255
Percentage of reachable functions covered
61.96%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
instance_create_fuzzer.c 3
vulkan-loader/loader/trampoline.c 4
vulkan-loader/loader/log.c 2
vulkan-loader/loader/debug_utils.c 9
vulkan-loader/loader/generated/vk_object_types.h 1
vulkan-loader/loader/allocation.c 11
vulkan-loader/loader/vk_loader_platform.h 13
vulkan-loader/loader/loader.c 90
vulkan-loader/loader/settings.c 25
vulkan-loader/loader/loader_environment.c 9
vulkan-loader/loader/loader_json.c 5
fuzz_header.h 1
/usr/include/x86_64-linux-gnu/sys/stat.h 1
vulkan-loader/loader/cJSON.c 32
/usr/include/stdlib.h 1
vulkan-loader/loader/wsi.c 1
vulkan-loader/loader/generated/vk_loader_extensions.c 3

Fuzzer: settings_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 243 48.1%
gold [1:9] 1 0.19%
yellow [10:29] 2 0.39%
greenyellow [30:49] 10 1.98%
lawngreen 50+ 249 49.3%
All colors 505 100

Fuzz blockers

The followings are the branches where fuzzer fails to bypass.

Unique non-covered Complexity Unique Reachable Complexities Unique Reachable Functions All non-covered Complexity All Reachable Complexity Function Name Function Callsite Blocked Branch
181 202 5 :

['loader_cJSON_GetArraySize', 'loader_instance_heap_calloc', 'loader_instance_heap_free', 'parse_additional_driver', 'free_driver_configuration']

181 202 parse_additional_drivers call site: 00217 /src/vulkan-loader/loader/settings.c:256
166 187 5 :

['parse_device_configuration', 'loader_cJSON_GetArraySize', 'loader_instance_heap_calloc', 'free_device_configuration', 'loader_instance_heap_free']

166 187 parse_device_configurations call site: 00227 /src/vulkan-loader/loader/settings.c:346
4 4 1 :

['loader_alloc']

4 4 loader_realloc call site: 00111 /src/vulkan-loader/loader/allocation.c:88
0 103 2 :

['loader_log', 'loader_free_layer_properties']

0 103 loader_append_layer_property call site: 00313 /src/vulkan-loader/loader/loader.c:468
0 82 1 :

['loader_log']

0 84 loader_initialize call site: 00000 /src/vulkan-loader/loader/loader.c:2036
0 82 1 :

['loader_log']

0 82 loader_init_generic_list call site: 00311 /src/vulkan-loader/loader/loader.c:766
0 22 1 :

['loader_instance_heap_realloc']

0 22 incrase_str_capacity_by_at_least_one call site: 00172 /src/vulkan-loader/loader/loader.c:317
0 10 1 :

['loader_instance_heap_calloc']

0 10 incrase_str_capacity_by_at_least_one call site: 00171 /src/vulkan-loader/loader/loader.c:310
0 8 1 :

['loader_instance_heap_free']

0 8 append_str_to_string_list call site: 00171 /src/vulkan-loader/loader/loader.c:332
0 5 1 :

['loader_free']

0 5 loader_realloc call site: 00112 /src/vulkan-loader/loader/allocation.c:90
0 5 1 :

['loader_free']

0 5 ensure call site: 00111 /src/vulkan-loader/loader/cJSON.c:317
0 0 None 577 1219 get_settings_layers call site: 00337 /src/vulkan-loader/loader/settings.c:828

Runtime coverage analysis

Covered functions
90
Functions that are reachable but not covered
69
Reachable functions
151
Percentage of reachable functions covered
54.3%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
settings_fuzzer.c 3
vulkan-loader/loader/settings.c 27
vulkan-loader/loader/loader_environment.c 1
vulkan-loader/loader/allocation.c 7
vulkan-loader/loader/vk_loader_platform.h 10
vulkan-loader/loader/log.c 3
vulkan-loader/loader/debug_utils.c 3
vulkan-loader/loader/generated/vk_object_types.h 1
vulkan-loader/loader/loader_json.c 5
fuzz_header.h 1
/usr/include/x86_64-linux-gnu/sys/stat.h 1
vulkan-loader/loader/cJSON.c 31
vulkan-loader/loader/loader.c 24
/usr/include/stdlib.h 1
vulkan-loader/loader/wsi.c 1

Analyses and suggestions

Optimal target analysis

Remaining optimal interesting functions

The following table shows a list of functions that are optimal targets. Optimal targets are identified by finding the functions that in combination, yield a high code coverage.

Func name Functions filename Arg count Args Function depth hitcount instr count bb count cyclomatic complexity Reachable functions Incoming references total cyclomatic complexity Unreached complexity
vkGetDeviceProcAddr /src/vulkan-loader/loader/trampoline.c 2 ['N/A', 'N/A'] 3 0 187 36 17 8 0 1077 1067
vkGetInstanceProcAddr /src/vulkan-loader/loader/trampoline.c 2 ['N/A', 'N/A'] 7 0 75 19 8 37 0 944 823
terminator_EnumeratePhysicalDeviceGroups /src/vulkan-loader/loader/loader.c 3 ['N/A', 'N/A', 'N/A'] 5 0 1252 210 79 37 0 366 233
vkCreateDevice /src/vulkan-loader/loader/trampoline.c 4 ['N/A', 'N/A', 'N/A', 'N/A'] 7 0 31 5 2 48 0 338 132
loader_gpa_instance_terminator /src/vulkan-loader/loader/loader.c 2 ['N/A', 'N/A'] 6 0 247 48 23 30 0 314 125
terminator_CreateInstance /src/vulkan-loader/loader/loader.c 3 ['N/A', 'N/A', 'N/A'] 6 0 924 168 65 33 0 320 82
terminator_DebugReportMessageEXT /src/vulkan-loader/loader/debug_utils.c 8 ['N/A', 'int', 'int', 'size_t', 'size_t', 'int', 'N/A', 'N/A'] 3 0 66 12 5 8 0 79 71
vkEnumeratePhysicalDeviceGroups /src/vulkan-loader/loader/trampoline.c 3 ['N/A', 'N/A', 'N/A'] 6 0 87 17 7 22 0 196 70
terminator_CreateDisplayPlaneSurfaceKHR /src/vulkan-loader/loader/wsi.c 4 ['N/A', 'N/A', 'N/A', 'N/A'] 7 0 99 8 4 27 0 197 59
terminator_CreateDevice /src/vulkan-loader/loader/loader.c 4 ['N/A', 'N/A', 'N/A', 'N/A'] 6 0 719 120 47 26 0 208 51

Implementing fuzzers that target the above functions will improve reachability such that it becomes:

Functions statically reachable by fuzzers
26.0%
297 / 1153
Cyclomatic complexity statically reachable by fuzzers
67.0%
4770 / 7148

All functions overview

If you implement fuzzers for these functions, the status of all functions in the project will be:

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

json_load_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['loader_log', 'loader_read_entire_file', 'ensure', 'print_number', 'loader_calloc', 'parse_array', 'loader_cJSON_ParseWithLengthOpts', 'loader_instance_heap_free']

instance_enumerate_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['loader_read_layer_json', 'loader_scan_for_implicit_layers', 'log_settings', 'loader_realloc', 'parse_layers_disable_filter_environment_var', 'print_string_ptr', 'update_offset']

instance_enumerate_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['loader_scan_for_implicit_layers', 'loader_realloc', 'parse_layers_disable_filter_environment_var', 'log_settings', 'print_string_ptr', 'update_offset', 'parse_additional_drivers', 'parse_device_configurations', 'update_global_loader_settings', 'loader_implicit_layer_is_enabled']

instance_create_advanced_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['vkCreateInstance', 'loader_destroy_pointer_layer_list', 'loader_parse_icd_manifest', 'verify_meta_layer_component_layers', 'loader_getenv', 'loader_read_layer_json', 'loader_icd_scan']

instance_create_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['vkCreateInstance', 'loader_destroy_pointer_layer_list', 'loader_handle_load_library_error', 'loader_icd_scan', 'parse_layers_disable_filter_environment_var', 'loader_settings_get_additional_driver_files', 'log_settings']

settings_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['get_settings_layers', 'loader_realloc', 'parse_device_configurations', 'log_settings', 'print_string_ptr', 'update_offset', 'parse_additional_drivers', 'update_global_loader_settings', 'loader_log', 'free_loader_settings']

Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
print 36 18 50.0% ['instance_enumerate_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'json_load_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']
loader_init_global_debug_level 37 8 21.62% ['instance_enumerate_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'json_load_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']
vk_string_validate 36 16 44.44% ['instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer']
terminator_EnumerateInstanceExtensionProperties 76 40 52.63% ['instance_enumerate_fuzzer', 'instance_enumerate_fuzzer_split_input']
determine_filter_type 46 18 39.13% ['instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer']
parse_layers_disable_filter_environment_var 63 12 19.04% ['instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer']
check_name_matches_filter_environment_var 48 25 52.08% ['instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer']
parse_additional_drivers 47 9 19.14% ['settings_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']
parse_device_configurations 42 6 14.28% ['settings_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']
vkEnumerateInstanceExtensionProperties 67 33 49.25% ['instance_enumerate_fuzzer', 'instance_enumerate_fuzzer_split_input']
loader_remove_layers_not_in_implicit_meta_layers 38 18 47.36% ['instance_enumerate_fuzzer', 'instance_enumerate_fuzzer_split_input']
convertCoreObjectToDebugReportObject 88 7 7.954% ['instance_enumerate_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'json_load_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']
loader_scan_for_direct_drivers 69 11 15.94% ['instance_create_advanced_fuzzer', 'instance_create_fuzzer']
loader_icd_scan 113 62 54.86% ['instance_create_advanced_fuzzer', 'instance_create_fuzzer']
vkCreateInstance 211 88 41.70% ['instance_create_advanced_fuzzer', 'instance_create_fuzzer']
loader_scanned_icd_add 154 27 17.53% ['instance_create_advanced_fuzzer', 'instance_create_fuzzer']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
/src/vulkan-loader/loader/log.c ['json_load_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer'] ['json_load_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer']
/src/vulkan-loader/loader/cJSON.c ['json_load_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer'] ['json_load_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer']
/src/vulkan-loader/loader/loader.h [] []
/src/vulkan-loader/loader/extension_manual.c [] []
/src/vulkan-loader/loader/dev_ext_trampoline.c [] []
/src/json_load_fuzzer.c ['json_load_fuzzer'] ['json_load_fuzzer']
/usr/include/x86_64-linux-gnu/sys/stat.h ['json_load_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer'] []
/src/vulkan-loader/loader/generated/vk_object_types.h ['json_load_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer'] ['instance_create_advanced_fuzzer', 'instance_create_fuzzer']
/src/vulkan-loader/loader/loader.c ['instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer'] ['instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer']
/src/vulkan-loader/loader/loader_environment.c ['instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer'] ['instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer']
/src/vulkan-loader/loader/allocation.c ['json_load_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer'] ['json_load_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer']
/src/instance_create_fuzzer.c ['instance_create_fuzzer'] ['instance_create_fuzzer']
/src/vulkan-loader/loader/vk_loader_platform.h ['instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer'] ['instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer']
/src/fuzz_header.h ['json_load_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer'] ['instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer']
/src/vulkan-loader/loader/terminator.c [] []
/src/instance_enumerate_fuzzer.c ['instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer'] ['instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer']
/usr/include/stdlib.h ['instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer'] []
/src/settings_fuzzer.c ['settings_fuzzer'] ['settings_fuzzer']
/src/vulkan-loader/loader/generated/vk_loader_extensions.c ['instance_create_advanced_fuzzer', 'instance_create_fuzzer'] []
/src/vulkan-loader/loader/unknown_function_handling.c [] []
/src/vulkan-loader/loader/gpa_helper.c [] []
/src/vulkan-loader/loader/loader_json.c ['json_load_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer'] ['json_load_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer']
/src/vulkan-loader/loader/phys_dev_ext.c [] []
/src/vulkan-loader/loader/debug_utils.c ['json_load_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer'] ['instance_create_advanced_fuzzer', 'instance_create_fuzzer']
/src/vulkan-loader/loader/wsi.c ['instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer'] ['instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer']
/src/instance_create_advanced_fuzzer.c ['instance_create_advanced_fuzzer'] ['instance_create_advanced_fuzzer']
/src/vulkan-loader/loader/trampoline.c ['instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer'] ['instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer']
/src/vulkan-loader/loader/settings.c ['instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer'] ['instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'settings_fuzzer']
/src/vulkan-loader/loader/loader_linux.c [] []

Directories in report

Directory
/src/vulkan-loader/loader/
/usr/include/
/usr/include/x86_64-linux-gnu/sys/
/src/
/src/vulkan-loader/loader/generated/