diff options
author | Bjoern Tropf <asymmail@googlemail.com> | 2009-05-27 11:33:40 +0200 |
---|---|---|
committer | Bjoern Tropf <asymmail@googlemail.com> | 2009-05-27 11:33:40 +0200 |
commit | 61de1bf37b3545b448ef9cf78e3de524c752429b (patch) | |
tree | 686569ec98146672bd6ad135fe5c2bb55659f2ee /TODO | |
parent | Code cosmetic changes #3 (diff) | |
download | kernel-check-61de1bf37b3545b448ef9cf78e3de524c752429b.tar.gz kernel-check-61de1bf37b3545b448ef9cf78e3de524c752429b.tar.bz2 kernel-check-61de1bf37b3545b448ef9cf78e3de524c752429b.zip |
Code cosmetic changes #4
Diffstat (limited to 'TODO')
-rw-r--r-- | TODO | 44 |
1 files changed, 25 insertions, 19 deletions
@@ -1,16 +1,17 @@ -TODO -==== +collector.py +============ +- Multicore support & Download threading +- Stability testing / fuzzing (Valgrind (?)) +- Add more logging messages +- Check file integrity (?) +- Use more telling variables +- Clean up code +- Implement DTD +- Function documentation / manpages +- Remove overhead from interval.py (?) -*collector -Multicore support & Download threading -Stability testing / fuzzing (Valgrind (?)) -Add more logging messages -Check file integrity -Use more telling variables -Clean, clean & clean :) -DTD -Function dokumentation / manpages (?) -Remove overhead from interval.py +kernel-check.py output +====================== *kernel-check >>> Checking kernel @@ -41,16 +42,22 @@ Remove overhead from interval.py * Upgrading to the latest version [ 2.6.27-gentoo-r13 ] is recommended! - Intervall Entry + Intervall documentation + ======================= name: String, the name of the vulnerable release. This can either be "linux" to specify the upstream release was vulnerable, "genpatches" (or abbreviated "gp") or a specifc ebuild name such as "hppa-sources" (or abbreviated "hppa"). - lower: String, the lower boundary. - upper: String, the upper boundary. - lower_inclusive: Boolean, whether or not the lower boundary is inclusive. - upper_inclusive: Boolean, whether or not the upper boundary is inclusive. - expand: Boolean, defines whether the entry is shadowing less specific entries + +lower: String, the lower boundary. + +upper: String, the upper boundary. + +lower_inclusive: Boolean, whether or not the lower boundary is inclusive. + +upper_inclusive: Boolean, whether or not the upper boundary is inclusive. + +expand: Boolean, defines whether the entry is shadowing less specific entries of the same version range: linux is less specific than genpatches which is less specific than the name. Example: @@ -62,4 +69,3 @@ name: String, the name of the vulnerable release. This can either be "linux" to and was fixed in 2.6.23-8. A genpatched Kernel 2.6.17 is vulnerable. In (2), a patch fixing the vulnerability has been backported to the genpatches. Kernels 2.6.17 and earlier are not affected. - """ |