help
This feature will cause the VMM to intercept the execution
of software interrupts (i.e. the INTn instruction) and enable
- any INT vector to be hooked
+ any INT vector to be hooked. Extension name is "swintr_intercept"
+
+config DEBUG_EXT_SW_INTERRUPTS
+ bool "Enable debugging of software interrupt interception code"
+ depends on EXT_SW_INTERRUPTS
+ default n
+ help
+ This will enable useful debugging printouts for software
+ intercept code
config EXT_SWINTR_PASSTHROUGH
bool "Hook all unhandled sofware interrupts for passthrough"
config DEBUG_EXT_SYSCALL_HIJACK
bool "Enable Syscall Hijack Debug in Palacios"
+ depends on EXT_SYSCALL_HIJACK
default n
help
Enable Debugging printouts for syscall hijacking code
that are not explicitly hooked to be hooked for
passthrough. This is useful for debugging.
-config EXT_HIJACK_SYSCALL_MSR
- bool "Intercept Syscall-related MSR reads & writes"
- default n
- help
- Allow the VMM to intercept reads and writes to MSRs
- related to SYSCALL and SYSENTER instructions. Specifically,
- it will intercept R/W to STAR, CSTAR, and LSTAR, and SYSENTER_EIP.
-
endmenu