From b888f82443733a16f3421798accde83da3912d27 Mon Sep 17 00:00:00 2001 From: Scott Long Date: Fri, 25 Feb 2005 03:22:36 +0000 Subject: [PATCH] Update the present items on the list. Drop off a few things that either are no longer relevant or have little chance of getting addressed and thus little impact on the release. --- en/releases/5.4R/todo.sgml | 85 ++++++++++++-------------------------- 1 file changed, 26 insertions(+), 59 deletions(-) diff --git a/en/releases/5.4R/todo.sgml b/en/releases/5.4R/todo.sgml index b1ee41f20c..90882c45d7 100644 --- a/en/releases/5.4R/todo.sgml +++ b/en/releases/5.4R/todo.sgml @@ -1,7 +1,7 @@ - + %includes; %developers; @@ -59,6 +59,13 @@ Description + + Update sysinstall to handle separate packages CD + &status.wip; + &a.jhb; + Avoid the need for a disc1-gnome/disc1-kde as was done for 4.11 + + Entropy harvesting optimizations &status.wip; @@ -71,51 +78,6 @@ stage to be merged to 5.x until after 5.3. - - ACL_MASK override of umask support in UFS - &status.new; - &a.rwatson; - Many systems supporting POSIX.1e ACLs permit a minor violation - to that specification, in which the ACL_MASK entry overrides the - umask, rather than being intersected with it. The resulting - semantics can be useful in group-oriented environments, and as - such would be very helpful on FreeBSD. - - - - busdma in all PCI drivers - &status.wip; - -- - All PCI drivers must use busdma for DMA; no use of vtophys() will - be permitted for any recent device driver. ISA drivers may be - exempt. - - - - MAC Framework Labeling and Access Control for System V IPC - &status.wip; - &a.rwatson; - Currently, the MAC Framework in the FreeBSD source tree does not - provide for any additional protections of System V IPC (shm, sem, - msq). The TrustedBSD MAC development branch contains labeling and - access control extensions for System V IPC, and this will be merged - for 5.4-RELEASE. This includes work to separate the kernel and user - data structures to improve ABI resilience of the IPC implementations. - - - - - KAME IPSEC without the Giant Lock - &status.wip; - &a.gnn; - Currently, the KAME IPSEC implementation contains inadequate locking - to operate without the Giant lock over the network stack, forcing - kernels compiled with the KAME IPSEC implementation (not FAST_IPSEC) - to run the network stack with the Giant lock, reducing parallelism, - increasing lock contention, and increasing latency by preventing - preemption. For 5.4-RELEASE, it is desirable to complete the locking - work for KAME IPSEC so that it can run without the Giant lock. - sparc64: no serial console on fhc(4) based machines &status.wip; @@ -140,22 +102,27 @@ - Update sysinstall to handle separate packages CD - &status.wip; - &a.scottl; - Avoid the need for a disc1-gnome/disc1-kde as was done for 4.11 + ACL_MASK override of umask support in UFS + &status.new; + &a.rwatson; + Many systems supporting POSIX.1e ACLs permit a minor violation + to that specification, in which the ACL_MASK entry overrides the + umask, rather than being intersected with it. The resulting + semantics can be useful in group-oriented environments, and as + such would be very helpful on FreeBSD. - MAC support for NFS Server - &status.new; - &a.rwatson; - Currently, MAC protections are enforced only on locally originated - file system operations (VOPs), and not on RPCs generated via the - NFS server. Improvements in NFS server credential handling are - required to correct this problem, as well as the introduction of - new entry points to properly label NFS credentials and perform - enforcement properly. + KAME IPSEC without the Giant Lock + &status.wip; + &a.gnn; + Currently, the KAME IPSEC implementation contains inadequate locking + to operate without the Giant lock over the network stack, forcing + kernels compiled with the KAME IPSEC implementation (not FAST_IPSEC) + to run the network stack with the Giant lock, reducing parallelism, + increasing lock contention, and increasing latency by preventing + preemption. For 5.4-RELEASE, it is desirable to complete the locking + work for KAME IPSEC so that it can run without the Giant lock.