]> xenbits.xensource.com Git - people/sstabellini/xen-unstable.git/.git/commitdiff
docs etc.: https: Fix references to other Xen pages
authorIan Jackson <ian.jackson@eu.citrix.com>
Mon, 30 Mar 2020 13:51:51 +0000 (14:51 +0100)
committerIan Jackson <ian.jackson@eu.citrix.com>
Mon, 30 Mar 2020 14:27:17 +0000 (15:27 +0100)
Change the url scheme to https.  This is all in-tree references to
xenbits and the main website except for those in Config.mk.

We leave Config.mk alone for now because those urls are used by CI
systems and we need to check that nothing breaks when we change the
download method.

Signed-off-by: Ian Jackson <ian.jackson@eu.citrix.com>
Reviewed-by: Julien Grall <jgrall@amazon.com>
19 files changed:
README
SUPPORT.md
configure
configure.ac
docs/configure
docs/configure.ac
docs/misc/9pfs.pandoc
docs/misc/livepatch.pandoc
docs/misc/pvcalls.pandoc
docs/misc/xen-command-line.pandoc
docs/misc/xenstore-paths.pandoc
docs/misc/xsm-flask.txt
docs/process/branching-checklist.txt
stubdom/configure
stubdom/configure.ac
tools/configure
tools/configure.ac
xen/arch/x86/hvm/vmx/vmx.c
xen/include/public/io/blkif.h

diff --git a/README b/README
index 712d05d69dc8218b9e52b777afcade1149c2fa62..555f3415fa4498fe984992bd05f339ca834c1556 100644 (file)
--- a/README
+++ b/README
@@ -7,7 +7,7 @@
 
 #################################
 
-http://www.xen.org/
+https://www.xen.org/
 
 What is Xen?
 ============
@@ -17,10 +17,10 @@ Systems Research Group of the University of Cambridge Computer
 Laboratory, as part of the UK-EPSRC funded XenoServers project.  Xen
 is freely-distributable Open Source software, released under the GNU
 GPL. Since its initial public release, Xen has grown a large
-development community, spearheaded by xen.org (http://www.xen.org).
+development community, spearheaded by xen.org (https://www.xen.org).
 
 This file contains some quick-start instructions to install Xen on
-your system. For more information see http:/www.xen.org/ and
+your system. For more information see https:/www.xen.org/ and
 https://wiki.xen.org/
 
 Quick-Start Guide
@@ -99,7 +99,7 @@ performed with root privileges.]
 1. Download and untar the source tarball file. This will be a
    file named xen-unstable-src.tgz, or xen-$version-src.tgz.
    You can also pull the current version from the git or mercurial
-   repositories at http://xenbits.xen.org/
+   repositories at https://xenbits.xen.org/
 
     # tar xzf xen-unstable-src.tgz
 
index 169b6f8fcfb0b72f1943c8831b0a62ec27cd4c2b..7270c9b0218338998f0dc385e8ba5196607df695 100644 (file)
@@ -627,7 +627,7 @@ Virtual Performance Management Unit for HVM guests
     Status, x86: Supported, Not security supported
 
 Disabled by default (enable with hypervisor command line option).
-This feature is not security supported: see http://xenbits.xen.org/xsa/advisory-163.html
+This feature is not security supported: see https://xenbits.xen.org/xsa/advisory-163.html
 
 ### Argo: Inter-domain message delivery by hypercall
 
index 83f84b049f030d8cc86a04905aa74896d341939a..9da3970cef31427d844d4d560c9057458d919a2f 100755 (executable)
--- a/configure
+++ b/configure
@@ -582,7 +582,7 @@ PACKAGE_TARNAME='xen'
 PACKAGE_VERSION='4.14'
 PACKAGE_STRING='Xen Hypervisor 4.14'
 PACKAGE_BUGREPORT='xen-devel@lists.xen.org'
-PACKAGE_URL='http://www.xen.org/'
+PACKAGE_URL='https://www.xen.org/'
 
 ac_unique_file="./xen/common/kernel.c"
 enable_option_checking=no
@@ -1336,7 +1336,7 @@ Optional Packages:
                           [PREFIX/lib/debug]
 
 Report bugs to <xen-devel@lists.xen.org>.
-Xen Hypervisor home page: <http://www.xen.org/>.
+Xen Hypervisor home page: <https://www.xen.org/>.
 _ACEOF
 ac_status=$?
 fi
@@ -2904,7 +2904,7 @@ Configuration files:
 $config_files
 
 Report bugs to <xen-devel@lists.xen.org>.
-Xen Hypervisor home page: <http://www.xen.org/>."
+Xen Hypervisor home page: <https://www.xen.org/>."
 
 _ACEOF
 cat >>$CONFIG_STATUS <<_ACEOF || ac_write_fail=1
index 7388b282f9a9eedec45b65c908e3f3b42095d517..3aea4071530761f3a1488e3af5bbee43c3fdddc0 100644 (file)
@@ -3,7 +3,7 @@
 
 AC_PREREQ([2.67])
 AC_INIT([Xen Hypervisor], m4_esyscmd([./version.sh ./xen/Makefile]),
-    [xen-devel@lists.xen.org], [xen], [http://www.xen.org/])
+    [xen-devel@lists.xen.org], [xen], [https://www.xen.org/])
 AC_CONFIG_SRCDIR([./xen/common/kernel.c])
 AC_CONFIG_FILES([
        config/Toplevel.mk
index fdfc110311f17bd9c319fa39a2f99b467167eb3d..9e3ed60462fc8c58cb10398829f7b0e04b27efa8 100755 (executable)
@@ -582,7 +582,7 @@ PACKAGE_TARNAME='xen'
 PACKAGE_VERSION='4.14'
 PACKAGE_STRING='Xen Hypervisor Documentation 4.14'
 PACKAGE_BUGREPORT='xen-devel@lists.xen.org'
-PACKAGE_URL='http://www.xen.org/'
+PACKAGE_URL='https://www.xen.org/'
 
 ac_unique_file="misc/xen-command-line.pandoc"
 ac_subst_vars='LTLIBOBJS
@@ -1320,7 +1320,7 @@ Use these variables to override the choices made by `configure' or to help
 it to find libraries and programs with nonstandard names/locations.
 
 Report bugs to <xen-devel@lists.xen.org>.
-Xen Hypervisor Documentation home page: <http://www.xen.org/>.
+Xen Hypervisor Documentation home page: <https://www.xen.org/>.
 _ACEOF
 ac_status=$?
 fi
@@ -2857,7 +2857,7 @@ Configuration files:
 $config_files
 
 Report bugs to <xen-devel@lists.xen.org>.
-Xen Hypervisor Documentation home page: <http://www.xen.org/>."
+Xen Hypervisor Documentation home page: <https://www.xen.org/>."
 
 _ACEOF
 cat >>$CONFIG_STATUS <<_ACEOF || ac_write_fail=1
index e795bec04c3f30bdf9f7e6acf59bb4d04772eb9c..cb5a6eaa4cecbf04a439bcb144b8241d75dfa435 100644 (file)
@@ -3,7 +3,7 @@
 
 AC_PREREQ([2.67])
 AC_INIT([Xen Hypervisor Documentation], m4_esyscmd([../version.sh ../xen/Makefile]),
-    [xen-devel@lists.xen.org], [xen], [http://www.xen.org/])
+    [xen-devel@lists.xen.org], [xen], [https://www.xen.org/])
 AC_CONFIG_SRCDIR([misc/xen-command-line.pandoc])
 AC_CONFIG_FILES([
 ../config/Docs.mk
index a4dc86f6396e110cfddfbbbf14811e456149c845..b034fb5fa6599bd5f126fd16123f5a078de08d8d 100644 (file)
@@ -415,5 +415,5 @@ the *size* field of the 9pfs header.
 
 [paper]: https://www.usenix.org/legacy/event/usenix05/tech/freenix/full_papers/hensbergen/hensbergen.pdf
 [website]: https://github.com/chaos/diod/blob/master/protocol.md
-[XenbusStateInitialising]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,xenbus.h.html
-[ring.h]: http://xenbits.xen.org/gitweb/?p=xen.git;a=blob;f=xen/include/public/io/ring.h;hb=HEAD
+[XenbusStateInitialising]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,xenbus.h.html
+[ring.h]: https://xenbits.xen.org/gitweb/?p=xen.git;a=blob;f=xen/include/public/io/ring.h;hb=HEAD
index 9473ad59917d6b404dc34cc7b6a07582a171c066..d38e4ce074b399946aecdaedb4cb6fe5b8043b66 100644 (file)
@@ -88,7 +88,7 @@ mechanism. See `Trampoline (e9 opcode)` section for more details.
 ### Example of trampoline and in-place splicing
 
 As example we will assume the hypervisor does not have XSA-132 (see
-[domctl/sysctl: don't leak hypervisor stack to toolstacks](http://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=4ff3449f0e9d175ceb9551d3f2aecb59273f639d))
+[domctl/sysctl: don't leak hypervisor stack to toolstacks](https://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=4ff3449f0e9d175ceb9551d3f2aecb59273f639d))
 and we would like to binary patch the hypervisor with it. The original code
 looks as so:
 
@@ -157,7 +157,7 @@ CPU branching logic (I-cache, but it is just one unconditional jump).
 
 For this example we will assume that the hypervisor has not been compiled with
 XSA-125 (see
-[pre-fill structures for certain HYPERVISOR_xen_version sub-ops](http://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=fe2e079f642effb3d24a6e1a7096ef26e691d93e))
+[pre-fill structures for certain HYPERVISOR_xen_version sub-ops](https://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=fe2e079f642effb3d24a6e1a7096ef26e691d93e))
 which mem-sets an structure in `xen_version` hypercall. This function is not
 called **anywhere** in the hypervisor (it is called by the guest) but
 referenced in the `compat_hypercall_table` and `hypercall_table` (and
index 729cf97bdff9bb66d7a9be7d185b150391a6d113..665dad556c398be39c409b9577f6525a1930f696 100644 (file)
@@ -1078,8 +1078,8 @@ only as many bytes as available in the buffer up to *[in|out]_prod*.
 reading from the socket.
 
 
-[xenstore]: http://xenbits.xen.org/docs/unstable/misc/xenstore.txt
-[XenbusStateInitialising]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,xenbus.h.html
+[xenstore]: https://xenbits.xen.org/docs/unstable/misc/xenstore.txt
+[XenbusStateInitialising]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,xenbus.h.html
 [address]: http://pubs.opengroup.org/onlinepubs/7908799/xns/syssocket.h.html
 [in]: http://pubs.opengroup.org/onlinepubs/000095399/basedefs/netinet/in.h.html
 [socket]: http://pubs.opengroup.org/onlinepubs/009695399/functions/socket.html
@@ -1089,4 +1089,4 @@ reading from the socket.
 [listen]: http://pubs.opengroup.org/onlinepubs/7908799/xns/listen.html
 [accept]: http://pubs.opengroup.org/onlinepubs/7908799/xns/accept.html
 [poll]: http://pubs.opengroup.org/onlinepubs/7908799/xsh/poll.html
-[ring.h]: http://xenbits.xen.org/gitweb/?p=xen.git;a=blob;f=xen/include/public/io/ring.h;hb=HEAD
+[ring.h]: https://xenbits.xen.org/gitweb/?p=xen.git;a=blob;f=xen/include/public/io/ring.h;hb=HEAD
index 6ff317d15dbfac7b8580125ca580dc874611a580..acd0b3d99446b5583696cb31d2e3e3d10cb7a37d 100644 (file)
@@ -2294,7 +2294,7 @@ provide access to a wealth of low level processor information.
 
 *Warning:*
 As the virtualisation is not 100% safe, don't use the vpmu flag on
-production systems (see http://xenbits.xen.org/xsa/advisory-163.html)!
+production systems (see https://xenbits.xen.org/xsa/advisory-163.html)!
 
 ### vwfi (arm)
 > `= trap | native`
index ff3ca0406946039da55543c3c6590f6c0aad1d54..a152f5ea68771c77d12af9521c94e7f4a0f95ef1 100644 (file)
@@ -636,14 +636,14 @@ for the toolstack to obtain e.g. the domain id of a xenstore domain.
 Domain Id of the xenstore domain in case xenstore is provided via a
 domain instead of a daemon in dom0.
 
-[BLKIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,blkif.h.html
-[FBIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,fbif.h.html
-[HVMPARAMS]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,hvm,params.h.html
-[KBDIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,kbdif.h.html
-[LIBXLMEM]: http://xenbits.xen.org/docs/unstable/misc/libxl_memory.txt
-[NETIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,netif.h.html
-[SCSIIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,vscsiif.h.html
-[SI]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,xen.h.html#Struct_start_info
-[USBIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,usbif.h.html
-[VCPU]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,vcpu.h.html
-[XSWIRE]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,xs_wire.h.html
+[BLKIF]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,blkif.h.html
+[FBIF]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,fbif.h.html
+[HVMPARAMS]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,hvm,params.h.html
+[KBDIF]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,kbdif.h.html
+[LIBXLMEM]: https://xenbits.xen.org/docs/unstable/misc/libxl_memory.txt
+[NETIF]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,netif.h.html
+[SCSIIF]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,vscsiif.h.html
+[SI]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,xen.h.html#Struct_start_info
+[USBIF]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,usbif.h.html
+[VCPU]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,vcpu.h.html
+[XSWIRE]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,xs_wire.h.html
index 40e5fc845ea3a01ba70b8dba1fad1600bc802fba..2419c5cf2916de736122be57c7ad88802a9bd0a2 100644 (file)
@@ -49,13 +49,13 @@ driver domains, or stub xenstored - even if those bugs do no worse
 than reduce the security of such a system to one whose device models,
 backend drivers, or xenstore, run in dom0.
 
-For more information see http://xenbits.xen.org/xsa/advisory-77.html.
+For more information see https://xenbits.xen.org/xsa/advisory-77.html.
 
 The following interfaces are covered by this statement.  Interfaces
 not listed here are considered safe for disaggregation, security
 issues found in interfaces not listed here will be handled according
 to the normal security problem response policy
-http://www.xenproject.org/security-policy.html.
+https://www.xenproject.org/security-policy.html.
 
 __HYPERVISOR_domctl (xen/include/public/domctl.h)
 
index 1dfa1a2ec7b4e8e8bc1d12e7ca9406297ba335d4..e286e659623034e123f2003c796800e03482a874 100644 (file)
@@ -25,7 +25,7 @@ ov=4.0
 
 # update xendocs@xenbits docs generator to generate new stable branch
 #  docs too. commit to git.
-* make 13:37 <ijc> http://xenbits.xen.org/docs/4.2-testing/ is now live true
+* make 13:37 <ijc> https://xenbits.xen.org/docs/4.2-testing/ is now live true
 #14:17 <ijc> HOWTO: login to xenbits. become "xendocs" . cd cronjobs . edit
 #            xenbits-docs-all.sh in the obvious way. git commit
        ssh root@xenbits.xen.org
index 8f0bdcf191ad57c199d89cdaa9277539ab313b45..da03da535acf74734081997233ef73e0fa2d1840 100755 (executable)
@@ -582,7 +582,7 @@ PACKAGE_TARNAME='xen'
 PACKAGE_VERSION='4.14'
 PACKAGE_STRING='Xen Hypervisor Stub Domains 4.14'
 PACKAGE_BUGREPORT='xen-devel@lists.xen.org'
-PACKAGE_URL='http://www.xen.org/'
+PACKAGE_URL='https://www.xen.org/'
 
 ac_unique_file="xenstore-minios.cfg"
 ac_subst_vars='LTLIBOBJS
@@ -1376,7 +1376,7 @@ Use these variables to override the choices made by `configure' or to help
 it to find libraries and programs with nonstandard names/locations.
 
 Report bugs to <xen-devel@lists.xen.org>.
-Xen Hypervisor Stub Domains home page: <http://www.xen.org/>.
+Xen Hypervisor Stub Domains home page: <https://www.xen.org/>.
 _ACEOF
 ac_status=$?
 fi
@@ -4296,7 +4296,7 @@ Configuration files:
 $config_files
 
 Report bugs to <xen-devel@lists.xen.org>.
-Xen Hypervisor Stub Domains home page: <http://www.xen.org/>."
+Xen Hypervisor Stub Domains home page: <https://www.xen.org/>."
 
 _ACEOF
 cat >>$CONFIG_STATUS <<_ACEOF || ac_write_fail=1
index 9066dfaaa7fea4456b594294918fafa3345ec23d..a2d514c0216451151fea8aac59e7080a3392bd2b 100644 (file)
@@ -3,7 +3,7 @@
 
 AC_PREREQ([2.67])
 AC_INIT([Xen Hypervisor Stub Domains], m4_esyscmd([../version.sh ../xen/Makefile]),
-    [xen-devel@lists.xen.org], [xen], [http://www.xen.org/])
+    [xen-devel@lists.xen.org], [xen], [https://www.xen.org/])
 AC_CONFIG_SRCDIR([xenstore-minios.cfg])
 AC_CONFIG_FILES([../config/Stubdom.mk])
 AC_CONFIG_AUX_DIR([../])
index 13ee7f135c69166607dcea3b25909efcaa58e592..4fa5f7b93732fc45ccbbf4a8b722ffc302678bb1 100755 (executable)
@@ -583,7 +583,7 @@ PACKAGE_TARNAME='xen'
 PACKAGE_VERSION='4.14'
 PACKAGE_STRING='Xen Hypervisor Tools 4.14'
 PACKAGE_BUGREPORT='xen-devel@lists.xen.org'
-PACKAGE_URL='http://www.xen.org/'
+PACKAGE_URL='https://www.xen.org/'
 
 ac_unique_file="libxl/libxl.c"
 # Factoring default headers for most tests.
@@ -1611,7 +1611,7 @@ Use these variables to override the choices made by `configure' or to help
 it to find libraries and programs with nonstandard names/locations.
 
 Report bugs to <xen-devel@lists.xen.org>.
-Xen Hypervisor Tools home page: <http://www.xen.org/>.
+Xen Hypervisor Tools home page: <https://www.xen.org/>.
 _ACEOF
 ac_status=$?
 fi
@@ -10373,7 +10373,7 @@ Configuration headers:
 $config_headers
 
 Report bugs to <xen-devel@lists.xen.org>.
-Xen Hypervisor Tools home page: <http://www.xen.org/>."
+Xen Hypervisor Tools home page: <https://www.xen.org/>."
 
 _ACEOF
 cat >>$CONFIG_STATUS <<_ACEOF || ac_write_fail=1
index f288d2cc3fddfc9c4f0139899cec433636e483d3..ea0272766f4f80f543e8b19ac9f8fe83cde90fd1 100644 (file)
@@ -3,7 +3,7 @@
 
 AC_PREREQ([2.67])
 AC_INIT([Xen Hypervisor Tools], m4_esyscmd([../version.sh ../xen/Makefile]),
-    [xen-devel@lists.xen.org], [xen], [http://www.xen.org/])
+    [xen-devel@lists.xen.org], [xen], [https://www.xen.org/])
 AC_CONFIG_SRCDIR([libxl/libxl.c])
 AC_CONFIG_FILES([
 ../config/Tools.mk
index d265ed46ad737ee3fec6558c26d3e82edb01f0f1..1c398fdb6e7cdee197b9a8675dbb96944a3b3fc7 100644 (file)
@@ -2490,7 +2490,7 @@ const struct hvm_function_table * __init start_vmx(void)
 
     /*
      * Do not enable EPT when (!cpu_has_vmx_pat), to prevent security hole
-     * (refer to http://xenbits.xen.org/xsa/advisory-60.html).
+     * (refer to https://xenbits.xen.org/xsa/advisory-60.html).
      */
     if ( cpu_has_vmx_ept && (cpu_has_vmx_pat || opt_force_ept) )
     {
index d4a34de94c10af15626622e6ab8dd9b368b58e84..4cdba79abaeb4244ffefe9f457359af9f8c9c7b0 100644 (file)
  *
  *      The underlying storage is not affected by the direct IO memory
  *      lifetime bug.  See:
- *        http://lists.xen.org/archives/html/xen-devel/2012-12/msg01154.html
+ *        https://lists.xen.org/archives/html/xen-devel/2012-12/msg01154.html
  *
  *      Therefore this option gives the backend permission to use
  *      O_DIRECT, notwithstanding that bug.