summaryrefslogtreecommitdiff
path: root/TODO
diff options
context:
space:
mode:
authorBjoern Tropf <asymmail@googlemail.com>2009-05-27 11:33:40 +0200
committerBjoern Tropf <asymmail@googlemail.com>2009-05-27 11:33:40 +0200
commit61de1bf37b3545b448ef9cf78e3de524c752429b (patch)
tree686569ec98146672bd6ad135fe5c2bb55659f2ee /TODO
parentCode cosmetic changes #3 (diff)
downloadkernel-check-61de1bf37b3545b448ef9cf78e3de524c752429b.tar.gz
kernel-check-61de1bf37b3545b448ef9cf78e3de524c752429b.tar.bz2
kernel-check-61de1bf37b3545b448ef9cf78e3de524c752429b.zip
Code cosmetic changes #4
Diffstat (limited to 'TODO')
-rw-r--r--TODO44
1 files changed, 25 insertions, 19 deletions
diff --git a/TODO b/TODO
index fecf1c8..5b82190 100644
--- a/TODO
+++ b/TODO
@@ -1,16 +1,17 @@
-TODO
-====
+collector.py
+============
+- Multicore support & Download threading
+- Stability testing / fuzzing (Valgrind (?))
+- Add more logging messages
+- Check file integrity (?)
+- Use more telling variables
+- Clean up code
+- Implement DTD
+- Function documentation / manpages
+- Remove overhead from interval.py (?)
-*collector
-Multicore support & Download threading
-Stability testing / fuzzing (Valgrind (?))
-Add more logging messages
-Check file integrity
-Use more telling variables
-Clean, clean & clean :)
-DTD
-Function dokumentation / manpages (?)
-Remove overhead from interval.py
+kernel-check.py output
+======================
*kernel-check
>>> Checking kernel
@@ -41,16 +42,22 @@ Remove overhead from interval.py
* Upgrading to the latest version [ 2.6.27-gentoo-r13 ] is recommended!
- Intervall Entry
+ Intervall documentation
+ =======================
name: String, the name of the vulnerable release. This can either be "linux" to
specify the upstream release was vulnerable, "genpatches" (or abbreviated "gp")
or a specifc ebuild name such as "hppa-sources" (or abbreviated "hppa").
- lower: String, the lower boundary.
- upper: String, the upper boundary.
- lower_inclusive: Boolean, whether or not the lower boundary is inclusive.
- upper_inclusive: Boolean, whether or not the upper boundary is inclusive.
- expand: Boolean, defines whether the entry is shadowing less specific entries
+
+lower: String, the lower boundary.
+
+upper: String, the upper boundary.
+
+lower_inclusive: Boolean, whether or not the lower boundary is inclusive.
+
+upper_inclusive: Boolean, whether or not the upper boundary is inclusive.
+
+expand: Boolean, defines whether the entry is shadowing less specific entries
of the same version range:
linux is less specific than genpatches which is less specific than the name.
Example:
@@ -62,4 +69,3 @@ name: String, the name of the vulnerable release. This can either be "linux" to
and was fixed in 2.6.23-8. A genpatched Kernel 2.6.17 is vulnerable. In (2),
a patch fixing the vulnerability has been backported to the genpatches.
Kernels 2.6.17 and earlier are not affected.
- """