X-Git-Url: http://v3vee.org/palacios/gitweb/gitweb.cgi?a=blobdiff_plain;f=palacios%2Fsrc%2Fextensions%2FKconfig;h=e3b83feca0116779f5c6a622cc506426980ddebf;hb=57d73771eca20238eff66a02c85659287a7d6b89;hp=fcdf0a315caa5632a8628932c0934d38310c7668;hpb=4e8393bbded9e1ee77c2280b3ece64a6757c54ee;p=palacios-OLD.git diff --git a/palacios/src/extensions/Kconfig b/palacios/src/extensions/Kconfig index fcdf0a3..e3b83fe 100644 --- a/palacios/src/extensions/Kconfig +++ b/palacios/src/extensions/Kconfig @@ -50,7 +50,15 @@ config EXT_SW_INTERRUPTS help This feature will cause the VMM to intercept the execution of software interrupts (i.e. the INTn instruction) and enable - any INT vector to be hooked + any INT vector to be hooked. Extension name is "swintr_intercept" + +config DEBUG_EXT_SW_INTERRUPTS + bool "Enable debugging of software interrupt interception code" + depends on EXT_SW_INTERRUPTS + default n + help + This will enable useful debugging printouts for software + intercept code config EXT_SWINTR_PASSTHROUGH bool "Hook all unhandled sofware interrupts for passthrough" @@ -71,6 +79,7 @@ config EXT_SYSCALL_HIJACK config DEBUG_EXT_SYSCALL_HIJACK bool "Enable Syscall Hijack Debug in Palacios" + depends on EXT_SYSCALL_HIJACK default n help Enable Debugging printouts for syscall hijacking code @@ -85,12 +94,4 @@ config EXT_SYSCALL_PASSTHROUGH that are not explicitly hooked to be hooked for passthrough. This is useful for debugging. -config EXT_HIJACK_SYSCALL_MSR - bool "Intercept Syscall-related MSR reads & writes" - default n - help - Allow the VMM to intercept reads and writes to MSRs - related to SYSCALL and SYSENTER instructions. Specifically, - it will intercept R/W to STAR, CSTAR, and LSTAR, and SYSENTER_EIP. - endmenu