Palacios Public Git Repository

To checkout Palacios execute

  git clone http://v3vee.org/palacios/palacios.web/palacios.git
This will give you the master branch. You probably want the devel branch or one of the release branches. To switch to the devel branch, simply execute
  cd palacios
  git checkout --track -b devel origin/devel
The other branches are similar.


isolated syscall config options to extensions
[palacios.git] / palacios / src / extensions / Kconfig
index 158ed42..fcdf0a3 100644 (file)
@@ -44,4 +44,53 @@ config EXT_INSPECTOR
        help
          Provides the inspection extension
 
+config EXT_SW_INTERRUPTS
+    bool "Enable interception and hooking of software interrupts"
+    default n
+    help
+      This feature will cause the VMM to intercept the execution
+      of software interrupts (i.e. the INTn instruction) and enable
+      any INT vector to be hooked
+
+config EXT_SWINTR_PASSTHROUGH
+    bool "Hook all unhandled sofware interrupts for passthrough"
+    depends on EXT_SW_INTERRUPTS
+    default n
+    help
+      If enabled, this will cause all software interrupts 
+      (INT instruction vectors) to be hooked for passthrough.
+      May reduce performance but useful for debugging.
+
+config EXT_SYSCALL_HIJACK
+    bool "Enable System Call Hijacking"
+    depends on EXT_SW_INTERRUPTS
+    default n
+    help
+      Enable the VMM to hijack system calls executed by the guest.
+      If enabled, the VMM will hook execution of INT 80
+
+config DEBUG_EXT_SYSCALL_HIJACK
+    bool "Enable Syscall Hijack Debug in Palacios"
+    default n
+    help 
+      Enable Debugging printouts for syscall hijacking code
+      in Palacios
+
+config EXT_SYSCALL_PASSTHROUGH
+    bool "Hook all unhandled system calls for passthrough"
+    depends on EXT_SYSCALL_HIJACK
+    default n
+    help
+      If enabled, this option will cause all system calls
+      that are not explicitly hooked to be hooked for 
+      passthrough. This is useful for debugging.
+
+config EXT_HIJACK_SYSCALL_MSR
+    bool "Intercept Syscall-related MSR reads & writes"
+    default n
+    help
+      Allow the VMM to intercept reads and writes to MSRs
+      related to SYSCALL and SYSENTER instructions. Specifically,
+      it will intercept R/W to STAR, CSTAR, and LSTAR, and SYSENTER_EIP.
+
 endmenu