chipsec.modules.tools.vmm.xen.hypercallfuzz moduleΒΆ

Xen hypercall fuzzer

Usage:

chipsec_main.py -i -m tools.vmm.xen.hypercallfuzz -a <mode>[,<vector>,<iterations>]

  • mode : fuzzing mode

    • help : Prints this help

    • info : Hypervisor information

    • fuzzing : Fuzzing specified hypercall

    • fuzzing-all : Fuzzing all hypercalls

    • fuzzing-all-randomly : Fuzzing random hypercalls

  • <vector> : Code or name of a hypercall to be fuzzed (use info)

  • <iterations> : Number of fuzzing iterations

Examples:
>>> chipsec_main.py -i -m tools.vmm.xen.hypercallfuzz -a fuzzing,10 -l log.txt
>>> chipsec_main.py -i -m tools.vmm.xen.hypercallfuzz -a fuzzing-all,50 -l log.txt
>>> chipsec_main.py -i -m tools.vmm.xen.hypercallfuzz -a fuzzing-all-randomly,10,0x10000000 -l log.txt

Note

  • Returns a Warning by default

  • System may be in an unknown state, further evaluation may be needed

Important

  • This module is designed to run in a VM environment

  • Behavior on physical HW is undefined