Fuzz introspector: fuzz_http11_response_parser
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
7 30 websockets.http11.read_body call site: 00030 websockets.http11.parse_line
3 42 websockets.http11.read_body call site: 00042 websockets.streams.StreamReader.read_exact
2 17 websockets.datastructures.Headers.update call site: 00017 .isinstance
2 39 websockets.streams.StreamReader.read_exact call site: 00039 websockets.http11.parse_headers
1 46 websockets.http11.read_body call site: 00046 .len

Fuzzer calltree

0 ...inspector.light.source_files.src.websockets.fuzzing.fuzz_http11_response_parser.test_one_input [function] [call site] 00000
1 websockets.streams.StreamReader.__init__ [function] [call site] 00001
2 <builtin>.bytearray [function] [call site] 00002
1 websockets.streams.StreamReader.feed_data [function] [call site] 00003
1 websockets.streams.StreamReader.feed_eof [function] [call site] 00004
1 websockets.http11.Response.parse [function] [call site] 00005
2 websockets.http11.parse_line [function] [call site] 00006
3 websockets.streams.StreamReader.read_line [function] [call site] 00007
4 <builtin>.len [function] [call site] 00008
3 line.endswith [function] [call site] 00009
2 status_line.split [function] [call site] 00010
2 <builtin>.int [function] [call site] 00011
2 _value_re.fullmatch [function] [call site] 00012
2 raw_reason.decode [function] [call site] 00013
2 websockets.http11.parse_headers [function] [call site] 00014
3 websockets.datastructures.Headers.__init__ [function] [call site] 00015
4 websockets.datastructures.Headers.update [function] [call site] 00016
5 <builtin>.tuple [function] [call site] 00017
5 <builtin>.isinstance [function] [call site] 00018
5 arg.raw_items [function] [call site] 00019
5 <builtin>.super [function] [call site] 00020
3 <builtin>.range [function] [call site] 00021
3 websockets.http11.parse_line [function] [call site] 00022
3 line.split [function] [call site] 00023
3 _token_re.fullmatch [function] [call site] 00024
3 raw_value.strip [function] [call site] 00025
3 _value_re.fullmatch [function] [call site] 00026
3 raw_name.decode [function] [call site] 00027
3 raw_value.decode [function] [call site] 00028
2 websockets.http11.read_body [function] [call site] 00029
3 headers.get [function] [call site] 00030
3 websockets.http11.parse_line [function] [call site] 00031
3 chunk_size_line.split [function] [call site] 00032
3 <builtin>.len [function] [call site] 00033
3 raw_chunk_size.decode [function] [call site] 00034
3 <builtin>.int [function] [call site] 00035
3 <builtin>.len [function] [call site] 00036
3 websockets.streams.StreamReader.read_exact [function] [call site] 00037
4 <builtin>.len [function] [call site] 00038
4 <builtin>.len [function] [call site] 00039
3 websockets.streams.StreamReader.read_exact [function] [call site] 00040
3 websockets.http11.parse_headers [function] [call site] 00041
3 headers.get [function] [call site] 00042
3 <builtin>.len [function] [call site] 00043
3 <builtin>.int [function] [call site] 00044
3 websockets.streams.StreamReader.read_exact [function] [call site] 00045
3 websockets.streams.StreamReader.read_to_eof [function] [call site] 00046
4 <builtin>.len [function] [call site] 00047
1 <builtin>.next [function] [call site] 00048
1 <builtin>.isinstance [function] [call site] 00049