lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 26 Jun 2020 11:23:49 -0600
From:   Jonathan Corbet <corbet@....net>
To:     Luc Van Oostenryck <luc.vanoostenryck@...il.com>
Cc:     linux-kernel@...r.kernel.org
Subject: Re: [PATCH] doc: update URL for sparse's tarballs

On Sun, 21 Jun 2020 17:33:30 +0200
Luc Van Oostenryck <luc.vanoostenryck@...il.com> wrote:

> The URL given to get sparse's tarballs is sparse.wiki.kernel.org
> but the wiki will is deprecated in favor of sparse.docs.kernel.org.
> 
> So, update this URL to the one where the tarballs can directly
> be found.
> 
> Signed-off-by: Luc Van Oostenryck <luc.vanoostenryck@...il.com>
> ---
>  Documentation/dev-tools/sparse.rst | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/Documentation/dev-tools/sparse.rst b/Documentation/dev-tools/sparse.rst
> index 6f4870528226..8a7055593c31 100644
> --- a/Documentation/dev-tools/sparse.rst
> +++ b/Documentation/dev-tools/sparse.rst
> @@ -73,8 +73,8 @@ sparse would otherwise report a context imbalance.
>  Getting sparse
>  --------------
>  
> -You can get latest released versions from the Sparse homepage at
> -https://sparse.wiki.kernel.org/index.php/Main_Page
> +You can get tarballs of the latest released versions from:
> +https://www.kernel.org/pub/software/devel/sparse/dist/

I've applied this, but it also seems like we're losing some information by
going from a wiki straight to a directory listing.  It seems maybe we need
a link to the new documentation site in here as well?

Thanks,

jon

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ