Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: json_load_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 20 16.3%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 102 83.6%
All colors 122 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
4 14 loader_log call site: 00014 util_SubmitDebugUtilsMessageEXT
2 8 loader_read_entire_file call site: 00008 create_callback_file
2 23 loader_read_entire_file call site: 00023 loader_log
2 79 ensure call site: 00079 loader_free
2 92 print_number call site: 00092 ensure
1 12 loader_read_entire_file call site: 00012 loader_log
1 21 loader_calloc call site: 00021 loader_log
1 66 parse_array call site: 00066 buffer_skip_whitespace
1 68 loader_cJSON_ParseWithLengthOpts call site: 00068 loader_log
1 72 loader_instance_heap_free call site: 00072 loader_cJSON_Delete
1 82 loader_realloc call site: 00082 loader_free
1 96 print_string call site: 00096 ensure

Runtime coverage analysis

Covered functions
43
Functions that are reachable but not covered
23
Reachable functions
56
Percentage of reachable functions covered
58.93%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
json_load_fuzzer.c 1
vulkan-loader/loader/loader_json.c 2
fuzz_header.h 1
vulkan-loader/loader/log.c 1
vulkan-loader/loader/debug_utils.c 3
vulkan-loader/loader/generated/vk_object_types.h 1
vulkan-loader/loader/allocation.c 6
vulkan-loader/loader/cJSON.c 24

Fuzzer: settings_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 136 25.8%
gold [1:9] 10 1.89%
yellow [10:29] 7 1.32%
greenyellow [30:49] 11 2.08%
lawngreen 50+ 363 68.8%
All colors 527 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
16 289 log_settings call site: 00289 loader_log
12 121 loader_realloc call site: 00121 print_number
9 235 parse_device_configurations call site: 00235 parse_device_configuration
8 138 print_string_ptr call site: 00138 print_array
8 147 update_offset call site: 00147 print_value
8 225 parse_additional_drivers call site: 00225 parse_additional_driver
7 435 loader_read_layer_json call site: 00435 loader_parse_json_string
7 476 loader_read_layer_json call site: 00476 loader_parse_json_string
5 260 check_if_layer_configurations_are_equal call site: 00260 check_if_device_configurations_are_equal
4 42 loader_log call site: 00042 util_SubmitDebugUtilsMessageEXT
4 309 free_loader_settings call site: 00309 free_driver_configuration
3 247 loader_cJSON_PrintPreallocated call site: 00247 loader_parse_json_string_to_existing_str

Runtime coverage analysis

Covered functions
109
Functions that are reachable but not covered
50
Reachable functions
151
Percentage of reachable functions covered
66.89%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
settings_fuzzer.c 3
vulkan-loader/loader/settings.c 28
vulkan-loader/loader/loader_environment.c 1
vulkan-loader/loader/allocation.c 7
vulkan-loader/loader/vk_loader_platform.h 10
vulkan-loader/loader/log.c 4
vulkan-loader/loader/debug_utils.c 3
vulkan-loader/loader/generated/vk_object_types.h 1
vulkan-loader/loader/loader_json.c 5
fuzz_header.h 1
vulkan-loader/loader/cJSON.c 31
vulkan-loader/loader/loader.c 24
vulkan-loader/loader/wsi.c 1

Fuzzer: instance_create_advanced_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 526 44.2%
gold [1:9] 7 0.58%
yellow [10:29] 30 2.52%
greenyellow [30:49] 5 0.42%
lawngreen 50+ 621 52.2%
All colors 1189 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
109 911 vkCreateInstance call site: 00911 loader_validate_instance_extensions
63 845 loader_parse_icd_manifest call site: 00845 loader_scanned_icd_add
58 1021 loader_destroy_pointer_layer_list call site: 01021 loader_enable_instance_layers
35 1113 vkCreateInstance call site: 01113 fill_out_enabled_instance_extensions
32 812 loader_parse_icd_manifest call site: 00812 loader_cJSON_Print
28 1149 vkCreateInstance call site: 01149 vkDestroyInstance
16 302 log_settings call site: 00302 loader_log
13 778 loader_icd_scan call site: 00778 loader_add_direct_driver
12 145 loader_realloc call site: 00145 print_number
12 1098 vkCreateInstance call site: 01098 loader_icd_close_objects
10 337 parse_layers_disable_filter_environment_var call site: 00337 loader_log
10 797 loader_settings_get_additional_driver_files call site: 00797 prepend_if_manifest_file

Runtime coverage analysis

Covered functions
159
Functions that are reachable but not covered
112
Reachable functions
264
Percentage of reachable functions covered
57.58%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
instance_create_advanced_fuzzer.c 3
fuzz_header.h 3
vulkan-loader/loader/trampoline.c 4
vulkan-loader/loader/log.c 3
vulkan-loader/loader/debug_utils.c 9
vulkan-loader/loader/generated/vk_object_types.h 1
vulkan-loader/loader/allocation.c 11
vulkan-loader/loader/vk_loader_platform.h 13
vulkan-loader/loader/loader.c 94
vulkan-loader/loader/settings.c 26
vulkan-loader/loader/loader_environment.c 9
vulkan-loader/loader/loader_json.c 5
vulkan-loader/loader/cJSON.c 32
vulkan-loader/loader/wsi.c 1
vulkan-loader/loader/generated/vk_loader_extensions.c 3

Fuzzer: instance_enumerate_fuzzer_split_input

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 272 35.1%
gold [1:9] 48 6.20%
yellow [10:29] 17 2.19%
greenyellow [30:49] 21 2.71%
lawngreen 50+ 416 53.7%
All colors 774 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
34 690 loader_scan_for_implicit_layers call site: 00690 update_meta_layer_extensions_from_component_layers
16 289 log_settings call site: 00289 loader_log
14 465 loader_read_layer_json call site: 00465 loader_parse_json_string
14 480 loader_read_layer_json call site: 00480 loader_parse_json_array_of_strings
14 751 loader_scan_for_implicit_layers call site: 00751 loader_open_layer_file
12 121 loader_realloc call site: 00121 print_number
10 331 parse_layers_disable_filter_environment_var call site: 00331 loader_log
9 235 parse_device_configurations call site: 00235 parse_device_configuration
8 138 print_string_ptr call site: 00138 print_array
8 147 update_offset call site: 00147 print_value
8 225 parse_additional_drivers call site: 00225 parse_additional_driver
7 498 loader_read_layer_json call site: 00498 loader_parse_json_string

Runtime coverage analysis

Covered functions
136
Functions that are reachable but not covered
76
Reachable functions
200
Percentage of reachable functions covered
62.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
instance_enumerate_fuzzer.c 3
vulkan-loader/loader/trampoline.c 1
vulkan-loader/loader/settings.c 29
vulkan-loader/loader/loader_environment.c 8
vulkan-loader/loader/allocation.c 8
vulkan-loader/loader/vk_loader_platform.h 13
vulkan-loader/loader/log.c 4
vulkan-loader/loader/debug_utils.c 3
vulkan-loader/loader/generated/vk_object_types.h 1
vulkan-loader/loader/loader_json.c 5
fuzz_header.h 1
vulkan-loader/loader/cJSON.c 31
vulkan-loader/loader/loader.c 51
vulkan-loader/loader/wsi.c 1

Fuzzer: instance_create_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 459 38.9%
gold [1:9] 10 0.84%
yellow [10:29] 4 0.33%
greenyellow [30:49] 13 1.10%
lawngreen 50+ 691 58.7%
All colors 1177 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
109 904 vkCreateInstance call site: 00904 loader_validate_instance_extensions
58 1014 loader_destroy_pointer_layer_list call site: 01014 loader_enable_instance_layers
45 853 loader_handle_load_library_error call site: 00853 fixup_library_binary_path
35 1106 vkCreateInstance call site: 01106 fill_out_enabled_instance_extensions
28 1142 vkCreateInstance call site: 01142 vkDestroyInstance
16 295 log_settings call site: 00295 loader_log
13 771 loader_icd_scan call site: 00771 loader_add_direct_driver
12 1091 vkCreateInstance call site: 01091 loader_icd_close_objects
10 330 parse_layers_disable_filter_environment_var call site: 00330 loader_log
10 790 loader_settings_get_additional_driver_files call site: 00790 prepend_if_manifest_file
9 252 parse_device_configurations call site: 00252 parse_device_configuration
8 242 parse_additional_drivers call site: 00242 parse_additional_driver

Runtime coverage analysis

Covered functions
165
Functions that are reachable but not covered
102
Reachable functions
261
Percentage of reachable functions covered
60.92%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
instance_create_fuzzer.c 3
vulkan-loader/loader/trampoline.c 4
vulkan-loader/loader/log.c 3
vulkan-loader/loader/debug_utils.c 9
vulkan-loader/loader/generated/vk_object_types.h 1
vulkan-loader/loader/allocation.c 11
vulkan-loader/loader/vk_loader_platform.h 13
vulkan-loader/loader/loader.c 94
vulkan-loader/loader/settings.c 26
vulkan-loader/loader/loader_environment.c 9
vulkan-loader/loader/loader_json.c 5
fuzz_header.h 1
vulkan-loader/loader/cJSON.c 32
vulkan-loader/loader/wsi.c 1
vulkan-loader/loader/generated/vk_loader_extensions.c 3

Fuzzer: instance_enumerate_fuzzer

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 165 21.3%
gold [1:9] 1 0.12%
yellow [10:29] 10 1.29%
greenyellow [30:49] 14 1.80%
lawngreen 50+ 584 75.4%
All colors 774 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
16 289 log_settings call site: 00289 loader_log
14 751 loader_scan_for_implicit_layers call site: 00751 loader_open_layer_file
12 121 loader_realloc call site: 00121 print_number
10 331 parse_layers_disable_filter_environment_var call site: 00331 loader_log
9 235 parse_device_configurations call site: 00235 parse_device_configuration
8 138 print_string_ptr call site: 00138 print_array
8 147 update_offset call site: 00147 print_value
8 225 parse_additional_drivers call site: 00225 parse_additional_driver
6 534 check_name_matches_filter_environment_var call site: 00534 strcmp
5 260 check_if_layer_configurations_are_equal call site: 00260 check_if_device_configurations_are_equal
4 42 loader_log call site: 00042 util_SubmitDebugUtilsMessageEXT
4 309 free_loader_settings call site: 00309 free_driver_configuration

Runtime coverage analysis

Covered functions
150
Functions that are reachable but not covered
64
Reachable functions
200
Percentage of reachable functions covered
68.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
instance_enumerate_fuzzer.c 3
vulkan-loader/loader/trampoline.c 1
vulkan-loader/loader/settings.c 29
vulkan-loader/loader/loader_environment.c 8
vulkan-loader/loader/allocation.c 8
vulkan-loader/loader/vk_loader_platform.h 13
vulkan-loader/loader/log.c 4
vulkan-loader/loader/debug_utils.c 3
vulkan-loader/loader/generated/vk_object_types.h 1
vulkan-loader/loader/loader_json.c 5
fuzz_header.h 1
vulkan-loader/loader/cJSON.c 31
vulkan-loader/loader/loader.c 51
vulkan-loader/loader/wsi.c 1

Analyses and suggestions

Optimal target analysis

Remaining optimal interesting functions

The following table shows a list of functions that are optimal targets. Optimal targets are identified by finding the functions that in combination, yield a high code coverage.

Func name Functions filename Arg count Args Function depth hitcount instr count bb count cyclomatic complexity Reachable functions Incoming references total cyclomatic complexity Unreached complexity
vkGetDeviceProcAddr /src/vulkan-loader/loader/trampoline.c 2 ['N/A', 'N/A'] 3 0 166 36 17 8 0 1128 1118
vkGetInstanceProcAddr /src/vulkan-loader/loader/trampoline.c 2 ['N/A', 'N/A'] 7 0 70 19 8 37 0 997 876
terminator_EnumeratePhysicalDeviceGroups /src/vulkan-loader/loader/loader.c 3 ['N/A', 'N/A', 'N/A'] 5 0 1102 221 83 36 0 367 236
vkCreateDevice /src/vulkan-loader/loader/trampoline.c 4 ['N/A', 'N/A', 'N/A', 'N/A'] 7 0 26 5 2 48 0 338 133
loader_gpa_instance_terminator /src/vulkan-loader/loader/loader.c 2 ['N/A', 'N/A'] 6 0 234 48 23 30 0 316 128
vkEnumeratePhysicalDevices /src/vulkan-loader/loader/trampoline.c 3 ['N/A', 'N/A', 'N/A'] 5 0 159 31 12 45 0 309 116
terminator_CreateInstance /src/vulkan-loader/loader/loader.c 3 ['N/A', 'N/A', 'N/A'] 6 0 816 168 65 33 0 319 82

Implementing fuzzers that target the above functions will improve reachability such that it becomes:

Functions statically reachable by fuzzers
24.0%
292 / 1220
Cyclomatic complexity statically reachable by fuzzers
64.0%
4829 / 7546

All functions overview

If you implement fuzzers for these functions, the status of all functions in the project will be:

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

json_load_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['loader_log', 'loader_read_entire_file', 'ensure', 'print_number', 'loader_calloc', 'parse_array', 'loader_cJSON_ParseWithLengthOpts', 'loader_instance_heap_free']

settings_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['log_settings', 'loader_realloc', 'parse_device_configurations', 'print_string_ptr', 'update_offset', 'parse_additional_drivers', 'loader_read_layer_json', 'check_if_layer_configurations_are_equal', 'loader_log']

instance_create_advanced_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['vkCreateInstance', 'loader_parse_icd_manifest', 'loader_destroy_pointer_layer_list', 'log_settings', 'loader_icd_scan', 'loader_realloc']

instance_enumerate_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['loader_scan_for_implicit_layers', 'log_settings', 'loader_read_layer_json', 'loader_realloc', 'parse_layers_disable_filter_environment_var', 'parse_device_configurations', 'print_string_ptr', 'update_offset']

instance_create_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['vkCreateInstance', 'loader_destroy_pointer_layer_list', 'loader_handle_load_library_error', 'log_settings', 'loader_icd_scan', 'parse_layers_disable_filter_environment_var', 'loader_settings_get_additional_driver_files']

instance_enumerate_fuzzer.c

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['log_settings', 'loader_scan_for_implicit_layers', 'loader_realloc', 'parse_layers_disable_filter_environment_var', 'parse_device_configurations', 'print_string_ptr', 'update_offset', 'parse_additional_drivers', 'check_name_matches_filter_environment_var', 'check_if_layer_configurations_are_equal']

Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
print 35 18 51.42% ['json_load_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input']
loader_init_global_debug_level 36 7 19.44% ['json_load_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input']
parse_additional_drivers 46 9 19.56% ['instance_create_fuzzer', 'instance_enumerate_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input']
parse_device_configurations 46 6 13.04% ['instance_create_fuzzer', 'instance_enumerate_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input']
log_settings 60 29 48.33% ['instance_create_fuzzer', 'instance_enumerate_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input']
convertCoreObjectToDebugReportObject 88 7 7.954% ['json_load_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input']
loader_scan_for_direct_drivers 69 11 15.94% ['instance_create_advanced_fuzzer', 'instance_create_fuzzer']
loader_icd_scan 113 62 54.86% ['instance_create_advanced_fuzzer', 'instance_create_fuzzer']
vk_string_validate 36 16 44.44% ['instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']
determine_filter_type 46 18 39.13% ['instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']
parse_layers_disable_filter_environment_var 63 12 19.04% ['instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']
check_name_matches_filter_environment_var 48 25 52.08% ['instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer_split_input']
vkCreateInstance 207 86 41.54% ['instance_create_advanced_fuzzer', 'instance_create_fuzzer']
vkEnumerateInstanceExtensionProperties 67 33 49.25% ['instance_enumerate_fuzzer', 'instance_enumerate_fuzzer_split_input']
loader_scanned_icd_add 159 27 16.98% ['instance_create_advanced_fuzzer', 'instance_create_fuzzer']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
/src/instance_create_advanced_fuzzer.c ['instance_create_advanced_fuzzer'] ['instance_create_advanced_fuzzer']
/src/vulkan-loader/loader/settings.c ['settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer'] ['settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer']
/src/vulkan-loader/loader/loader.c ['settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer'] ['settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer']
/src/vulkan-loader/loader/extension_manual.c [] []
/src/vulkan-loader/loader/unknown_function_handling.c [] []
/src/vulkan-loader/loader/cJSON.c ['json_load_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer'] ['json_load_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer']
/src/vulkan-loader/loader/allocation.c ['json_load_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer'] ['json_load_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer']
/src/vulkan-loader/loader/loader_linux.c [] []
/src/json_load_fuzzer.c ['json_load_fuzzer'] ['json_load_fuzzer']
/src/settings_fuzzer.c ['settings_fuzzer'] ['settings_fuzzer']
/src/vulkan-loader/loader/loader_json.c ['json_load_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer'] ['json_load_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer']
/src/fuzz_header.h ['json_load_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer'] ['settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer']
/src/vulkan-loader/loader/phys_dev_ext.c [] []
/src/vulkan-loader/loader/loader_environment.c ['settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer'] ['settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer']
/src/vulkan-loader/loader/trampoline.c ['instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer'] ['instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer']
/src/vulkan-loader/loader/debug_utils.c ['json_load_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer'] ['instance_create_advanced_fuzzer', 'instance_create_fuzzer']
/src/instance_enumerate_fuzzer.c ['instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer'] ['instance_enumerate_fuzzer_split_input', 'instance_enumerate_fuzzer']
/src/vulkan-loader/loader/generated/vk_object_types.h ['json_load_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer'] ['instance_create_advanced_fuzzer', 'instance_create_fuzzer']
/src/vulkan-loader/loader/dev_ext_trampoline.c [] []
/src/vulkan-loader/loader/vk_loader_platform.h ['settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer'] ['settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer']
/src/vulkan-loader/loader/log.c ['json_load_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer'] ['json_load_fuzzer', 'settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer']
/src/vulkan-loader/loader/wsi.c ['settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_enumerate_fuzzer_split_input', 'instance_create_fuzzer', 'instance_enumerate_fuzzer'] ['settings_fuzzer', 'instance_create_advanced_fuzzer', 'instance_create_fuzzer', 'instance_enumerate_fuzzer']
/src/vulkan-loader/loader/terminator.c [] []
/src/vulkan-loader/loader/gpa_helper.c [] []
/src/instance_create_fuzzer.c ['instance_create_fuzzer'] ['instance_create_fuzzer']
/src/vulkan-loader/loader/loader.h [] []
/src/vulkan-loader/loader/generated/vk_loader_extensions.c ['instance_create_advanced_fuzzer', 'instance_create_fuzzer'] []

Directories in report

Directory
/src/
/src/vulkan-loader/loader/generated/
/src/vulkan-loader/loader/