X-Git-Url: http://v3vee.org/palacios/gitweb/gitweb.cgi?a=blobdiff_plain;f=palacios%2Fsrc%2Fextensions%2FKconfig;h=e3b83feca0116779f5c6a622cc506426980ddebf;hb=7f5af6dae89572f00563cde3165b87b83c3ed7e4;hp=c7b7d698ad6a4c34026fb76a156cdcbe519ca972;hpb=55a97f129cf51e899308ba2d6070c77e4901559e;p=palacios.releases.git diff --git a/palacios/src/extensions/Kconfig b/palacios/src/extensions/Kconfig index c7b7d69..e3b83fe 100644 --- a/palacios/src/extensions/Kconfig +++ b/palacios/src/extensions/Kconfig @@ -26,11 +26,17 @@ config EXT_MTRRS Provides a virtualized set of MTTR registers config EXT_MACH_CHECK - bool "Support Machine Check functionality" + bool "Support machine-check functionality" default n help - Provides a virtualized machine check architecture + Provides a virtualized machine-check architecture +config DEGUB_EXT_MACH_CHECK + bool "Debug machine-check functionality" + default n + depends on EXT_MACH_CHECK + help + Enable virtual machine-check architecture debugging config EXT_INSPECTOR bool "VM Inspector" @@ -38,4 +44,54 @@ config EXT_INSPECTOR help Provides the inspection extension +config EXT_SW_INTERRUPTS + bool "Enable interception and hooking of software interrupts" + default n + help + This feature will cause the VMM to intercept the execution + of software interrupts (i.e. the INTn instruction) and enable + any INT vector to be hooked. Extension name is "swintr_intercept" + +config DEBUG_EXT_SW_INTERRUPTS + bool "Enable debugging of software interrupt interception code" + depends on EXT_SW_INTERRUPTS + default n + help + This will enable useful debugging printouts for software + intercept code + +config EXT_SWINTR_PASSTHROUGH + bool "Hook all unhandled sofware interrupts for passthrough" + depends on EXT_SW_INTERRUPTS + default n + help + If enabled, this will cause all software interrupts + (INT instruction vectors) to be hooked for passthrough. + May reduce performance but useful for debugging. + +config EXT_SYSCALL_HIJACK + bool "Enable System Call Hijacking" + depends on EXT_SW_INTERRUPTS + default n + help + Enable the VMM to hijack system calls executed by the guest. + If enabled, the VMM will hook execution of INT 80 + +config DEBUG_EXT_SYSCALL_HIJACK + bool "Enable Syscall Hijack Debug in Palacios" + depends on EXT_SYSCALL_HIJACK + default n + help + Enable Debugging printouts for syscall hijacking code + in Palacios + +config EXT_SYSCALL_PASSTHROUGH + bool "Hook all unhandled system calls for passthrough" + depends on EXT_SYSCALL_HIJACK + default n + help + If enabled, this option will cause all system calls + that are not explicitly hooked to be hooked for + passthrough. This is useful for debugging. + endmenu