lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CACGkMEuMX2b6pQwaKMQy+OEFoB7BLs0BmxqORYeP-D7oo5irmA@mail.gmail.com>
Date:   Mon, 17 Oct 2022 14:09:45 +0800
From:   Jason Wang <jasowang@...hat.com>
To:     Jonathan Corbet <corbet@....net>
Cc:     mst@...hat.com, linux-kernel@...r.kernel.org,
        linux-doc@...r.kernel.org, mikelley@...rosoft.com,
        vkuznets@...hat.com, liuwe@...rosoft.com, kkashanjat@...rosoft.com,
        cohuck@...hat.com, otubo@...hat.com, andavis@...hat.com,
        aadam@...hat.com, stefanha@...hat.com, sgarzare@...hat.com,
        virtualization@...ts.linux-foundation.org
Subject: Re: [RFC PATCH] virtio: document virtio hardening status and TODO

On Fri, Oct 14, 2022 at 10:02 PM Jonathan Corbet <corbet@....net> wrote:
>
> Jason Wang <jasowang@...hat.com> writes:
>
> > This patch summarizes the status of hardening and TODO of hardening
> > virtio core and drivers.
> >
> > Signed-off-by: Jason Wang <jasowang@...hat.com>
> > ---
> >  Documentation/security/virtio/core.rst | 49 ++++++++++++++++++++++++++
> >  MAINTAINERS                            |  1 +
> >  2 files changed, 50 insertions(+)
> >  create mode 100644 Documentation/security/virtio/core.rst
>
> Do you really need to create a new directory for a single file?
>

Not sure, but I think we can start without a dedicated directory.

> Regardless of where it sits, you'll need to add this file to an
> index.rst file so that it becomes part of the docs build.

Yes, I will fix it.

Thanks

>
> Thanks,
>
> jon
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ