Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src/doc Add a TODO list for NVMM, just to list some known issues.



details:   https://anonhg.NetBSD.org/src/rev/2d1db9a57e78
branches:  trunk
changeset: 449083:2d1db9a57e78
user:      maxv <maxv%NetBSD.org@localhost>
date:      Thu Feb 21 14:56:23 2019 +0000

description:
Add a TODO list for NVMM, just to list some known issues.

diffstat:

 doc/TODO.nvmm |  27 +++++++++++++++++++++++++++
 1 files changed, 27 insertions(+), 0 deletions(-)

diffs (31 lines):

diff -r 1f582f1d6f92 -r 2d1db9a57e78 doc/TODO.nvmm
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/doc/TODO.nvmm     Thu Feb 21 14:56:23 2019 +0000
@@ -0,0 +1,27 @@
+Known issues in NVMM, low priority in most cases.
+
+====== KERNEL NVMM DRIVER ======
+
+ * Currently you can't modunload NVMM while a VM is running, otherwise you hit
+   a panic. See TODO in nvmm_fini().
+
+ * Maybe we will want a way to return to userland when the guest TPR changes.
+   On Intel that's not complicated, but on old AMD CPUs, we need to disassemble
+   the instruction, and I don't like that.
+
+ * Maybe we shouldn't modify the INT/NMI windows during event injection. The
+   virtualizer is supposed to inject the event only when these windows allow
+   it. (Eg Qemu does.)
+
+ * We need a cleaner way to handle CPUID exits. It is not complicated to solve,
+   but I'm still not sure which design is the cleanest.
+
+ * Same for the MSRs.
+
+====== LIBNVMM ======
+
+ * There are still a few twisted corner cases we don't handle in the instruction
+   emulator. For example if the guest makes an MMIO access relative to RSP, we
+   must base the GVA on %SS and not %DS. This is tiring, and in practice, no
+   guest is dumb enough to perform such accesses.
+



Home | Main Index | Thread Index | Old Index