X-Git-Url: http://v3vee.org/palacios/gitweb/gitweb.cgi?a=blobdiff_plain;f=palacios%2Fsrc%2Fextensions%2FKconfig;h=e3b83feca0116779f5c6a622cc506426980ddebf;hb=57d73771eca20238eff66a02c85659287a7d6b89;hp=7a04e6bfe54cfcbb09c7a94ff1ea3e60625f1223;hpb=3da6af957c0c6d8b478898278969c0b5efb77365;p=palacios.git diff --git a/palacios/src/extensions/Kconfig b/palacios/src/extensions/Kconfig index 7a04e6b..e3b83fe 100644 --- a/palacios/src/extensions/Kconfig +++ b/palacios/src/extensions/Kconfig @@ -50,7 +50,7 @@ config EXT_SW_INTERRUPTS help This feature will cause the VMM to intercept the execution of software interrupts (i.e. the INTn instruction) and enable - any INT vector to be hooked + any INT vector to be hooked. Extension name is "swintr_intercept" config DEBUG_EXT_SW_INTERRUPTS bool "Enable debugging of software interrupt interception code" @@ -79,6 +79,7 @@ config EXT_SYSCALL_HIJACK config DEBUG_EXT_SYSCALL_HIJACK bool "Enable Syscall Hijack Debug in Palacios" + depends on EXT_SYSCALL_HIJACK default n help Enable Debugging printouts for syscall hijacking code