4 bool "Support virtualized MTTRs"
7 Provides a virtualized set of MTTR registers
10 bool "Support machine-check functionality"
13 Provides a virtualized machine-check architecture
15 config DEGUB_EXT_MACH_CHECK
16 bool "Debug machine-check functionality"
18 depends on EXT_MACH_CHECK
20 Enable virtual machine-check architecture debugging
26 Provides the inspection extension
28 config EXT_SW_INTERRUPTS
29 bool "Enable interception and hooking of software interrupts"
32 This feature will cause the VMM to intercept the execution
33 of software interrupts (i.e. the INTn instruction) and enable
34 any INT vector to be hooked. Extension name is "swintr_intercept"
36 config DEBUG_EXT_SW_INTERRUPTS
37 bool "Enable debugging of software interrupt interception code"
38 depends on EXT_SW_INTERRUPTS
41 This will enable useful debugging printouts for software
44 config EXT_SWINTR_PASSTHROUGH
45 bool "Hook all unhandled sofware interrupts for passthrough"
46 depends on EXT_SW_INTERRUPTS
49 If enabled, this will cause all software interrupts
50 (INT instruction vectors) to be hooked for passthrough.
51 May reduce performance but useful for debugging.
53 config EXT_SYSCALL_HIJACK
54 bool "Enable System Call Hijacking"
55 depends on EXT_SW_INTERRUPTS
58 Enable the VMM to hijack system calls executed by the guest.
59 If enabled, the VMM will hook execution of INT 80
61 config DEBUG_EXT_SYSCALL_HIJACK
62 bool "Enable Syscall Hijack Debug in Palacios"
63 depends on EXT_SYSCALL_HIJACK
66 Enable Debugging printouts for syscall hijacking code
69 config EXT_SYSCALL_PASSTHROUGH
70 bool "Hook all unhandled system calls for passthrough"
71 depends on EXT_SYSCALL_HIJACK
74 If enabled, this option will cause all system calls
75 that are not explicitly hooked to be hooked for
76 passthrough. This is useful for debugging.