diff --git a/en/releases/5.4R/todo.sgml b/en/releases/5.4R/todo.sgml
index b1ee41f20c..90882c45d7 100644
--- a/en/releases/5.4R/todo.sgml
+++ b/en/releases/5.4R/todo.sgml
@@ -1,7 +1,7 @@
-
+
%includes;
%developers;
@@ -59,6 +59,13 @@
Description |
+
+ Update sysinstall to handle separate packages CD |
+ &status.wip; |
+ &a.jhb; |
+ Avoid the need for a disc1-gnome/disc1-kde as was done for 4.11 |
+
+
Entropy harvesting optimizations |
&status.wip; |
@@ -71,51 +78,6 @@
stage to be merged to 5.x until after 5.3.
-
- ACL_MASK override of umask support in UFS |
- &status.new; |
- &a.rwatson; |
- Many systems supporting POSIX.1e ACLs permit a minor violation
- to that specification, in which the ACL_MASK entry overrides the
- umask, rather than being intersected with it. The resulting
- semantics can be useful in group-oriented environments, and as
- such would be very helpful on FreeBSD. |
-
-
-
- busdma in all PCI drivers |
- &status.wip; |
- -- |
- All PCI drivers must use busdma for DMA; no use of vtophys() will
- be permitted for any recent device driver. ISA drivers may be
- exempt. |
-
-
-
- MAC Framework Labeling and Access Control for System V IPC |
- &status.wip; |
- &a.rwatson; |
- Currently, the MAC Framework in the FreeBSD source tree does not
- provide for any additional protections of System V IPC (shm, sem,
- msq). The TrustedBSD MAC development branch contains labeling and
- access control extensions for System V IPC, and this will be merged
- for 5.4-RELEASE. This includes work to separate the kernel and user
- data structures to improve ABI resilience of the IPC implementations.
- |
-
-
-
- KAME IPSEC without the Giant Lock |
- &status.wip; |
- &a.gnn; |
- Currently, the KAME IPSEC implementation contains inadequate locking
- to operate without the Giant lock over the network stack, forcing
- kernels compiled with the KAME IPSEC implementation (not FAST_IPSEC)
- to run the network stack with the Giant lock, reducing parallelism,
- increasing lock contention, and increasing latency by preventing
- preemption. For 5.4-RELEASE, it is desirable to complete the locking
- work for KAME IPSEC so that it can run without the Giant lock. |
-
sparc64: no serial console on fhc(4) based machines |
&status.wip; |
@@ -140,22 +102,27 @@
- Update sysinstall to handle separate packages CD |
- &status.wip; |
- &a.scottl; |
- Avoid the need for a disc1-gnome/disc1-kde as was done for 4.11 |
+ ACL_MASK override of umask support in UFS |
+ &status.new; |
+ &a.rwatson; |
+ Many systems supporting POSIX.1e ACLs permit a minor violation
+ to that specification, in which the ACL_MASK entry overrides the
+ umask, rather than being intersected with it. The resulting
+ semantics can be useful in group-oriented environments, and as
+ such would be very helpful on FreeBSD. |
- MAC support for NFS Server |
- &status.new; |
- &a.rwatson; |
- Currently, MAC protections are enforced only on locally originated
- file system operations (VOPs), and not on RPCs generated via the
- NFS server. Improvements in NFS server credential handling are
- required to correct this problem, as well as the introduction of
- new entry points to properly label NFS credentials and perform
- enforcement properly. |
+ KAME IPSEC without the Giant Lock |
+ &status.wip; |
+ &a.gnn; |
+ Currently, the KAME IPSEC implementation contains inadequate locking
+ to operate without the Giant lock over the network stack, forcing
+ kernels compiled with the KAME IPSEC implementation (not FAST_IPSEC)
+ to run the network stack with the Giant lock, reducing parallelism,
+ increasing lock contention, and increasing latency by preventing
+ preemption. For 5.4-RELEASE, it is desirable to complete the locking
+ work for KAME IPSEC so that it can run without the Giant lock. |