X-Git-Url: http://v3vee.org/palacios/gitweb/gitweb.cgi?a=blobdiff_plain;f=palacios%2Fsrc%2Fextensions%2FKconfig;h=e3b83feca0116779f5c6a622cc506426980ddebf;hb=57d73771eca20238eff66a02c85659287a7d6b89;hp=cc5f7ef88e22bf0bfc723c96b3266a94bd576159;hpb=833883b8268075ac0685c3e920071b1718f414e3;p=palacios-OLD.git diff --git a/palacios/src/extensions/Kconfig b/palacios/src/extensions/Kconfig index cc5f7ef..e3b83fe 100644 --- a/palacios/src/extensions/Kconfig +++ b/palacios/src/extensions/Kconfig @@ -50,7 +50,15 @@ config EXT_SW_INTERRUPTS help This feature will cause the VMM to intercept the execution of software interrupts (i.e. the INTn instruction) and enable - any INT vector to be hooked + any INT vector to be hooked. Extension name is "swintr_intercept" + +config DEBUG_EXT_SW_INTERRUPTS + bool "Enable debugging of software interrupt interception code" + depends on EXT_SW_INTERRUPTS + default n + help + This will enable useful debugging printouts for software + intercept code config EXT_SWINTR_PASSTHROUGH bool "Hook all unhandled sofware interrupts for passthrough" @@ -71,6 +79,7 @@ config EXT_SYSCALL_HIJACK config DEBUG_EXT_SYSCALL_HIJACK bool "Enable Syscall Hijack Debug in Palacios" + depends on EXT_SYSCALL_HIJACK default n help Enable Debugging printouts for syscall hijacking code