chipsec.modules.tools.vmm.xen.hypercallfuzz moduleΒΆ
Xen hypercall fuzzer
- Usage:
chipsec_main.py -i -m tools.vmm.xen.hypercallfuzz -a <mode>[,<vector>,<iterations>]
mode
: fuzzing modehelp
: Prints this helpinfo
: Hypervisor informationfuzzing
: Fuzzing specified hypercallfuzzing-all
: Fuzzing all hypercallsfuzzing-all-randomly
: Fuzzing random hypercalls
<vector>
: Code or name of a hypercall to be fuzzed (use info)<iterations>
: Number of fuzzing iterations
- Examples:
>>> chipsec_main.py -i -m tools.vmm.xen.hypercallfuzz -a fuzzing,10 -l log.txt >>> chipsec_main.py -i -m tools.vmm.xen.hypercallfuzz -a fuzzing-all,50 -l log.txt >>> chipsec_main.py -i -m tools.vmm.xen.hypercallfuzz -a fuzzing-all-randomly,10,0x10000000 -l log.txt
Note
Returns a Warning by default
System may be in an unknown state, further evaluation may be needed
Important
This module is designed to run in a VM environment
Behavior on physical HW is undefined