From patchwork Mon Mar 30 13:57:33 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ian Jackson X-Patchwork-Id: 11465571 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 99B641805 for ; Mon, 30 Mar 2020 13:59:14 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 80AB2206CC for ; Mon, 30 Mar 2020 13:59:14 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 80AB2206CC Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=eu.citrix.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1jIuvI-0002X7-Rw; Mon, 30 Mar 2020 13:57:52 +0000 Received: from us1-rack-iad1.inumbo.com ([172.99.69.81]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1jIuvH-0002X1-H8 for xen-devel@lists.xenproject.org; Mon, 30 Mar 2020 13:57:51 +0000 X-Inumbo-ID: 6eb784fe-728e-11ea-83d8-bc764e2007e4 Received: from chiark.greenend.org.uk (unknown [2001:ba8:1e3::]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS id 6eb784fe-728e-11ea-83d8-bc764e2007e4; Mon, 30 Mar 2020 13:57:46 +0000 (UTC) Received: from [172.18.45.5] (helo=zealot.relativity.greenend.org.uk) by chiark.greenend.org.uk (Debian Exim 4.84_2 #1) with esmtp (return-path ijackson@chiark.greenend.org.uk) id 1jIuvB-0007Qg-5u; Mon, 30 Mar 2020 14:57:45 +0100 From: Ian Jackson To: xen-devel@lists.xenproject.org Date: Mon, 30 Mar 2020 14:57:33 +0100 Message-Id: <20200330135735.31512-2-ian.jackson@eu.citrix.com> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20200330135735.31512-1-ian.jackson@eu.citrix.com> References: <20200330135735.31512-1-ian.jackson@eu.citrix.com> Subject: [Xen-devel] [PATCH 1/3] docs etc.: https: Fix references to wiki.xen[project.org X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: Stefano Stabellini , Julien Grall , Wei Liu , Andrew Cooper , ian.jackson@eu.citrix.com, George Dunlap , Anthony PERARD , Yang Hongyang , Jan Beulich , Shriram Rajagopalan Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" Change the url scheme to https. This is all in-tree references to the Xen wiki. Signed-off-by: Ian Jackson --- README | 16 ++++++++-------- config/Paths.mk.in | 2 +- docs/README.colo | 2 +- docs/README.remus | 2 +- docs/misc/stubdom.txt | 2 +- docs/misc/vtd.txt | 2 +- docs/misc/xen-command-line.pandoc | 2 +- docs/misc/xenstore.txt | 2 +- tools/libxl/libxlu_cfg.c | 2 +- 9 files changed, 16 insertions(+), 16 deletions(-) diff --git a/README b/README index 92b1de9938..712d05d69d 100644 --- a/README +++ b/README @@ -21,15 +21,15 @@ development community, spearheaded by xen.org (http://www.xen.org). This file contains some quick-start instructions to install Xen on your system. For more information see http:/www.xen.org/ and -http://wiki.xen.org/ +https://wiki.xen.org/ Quick-Start Guide ================= First, this is just a quick-start guide. For more comprehensive information see the INSTALL file and the Xen wiki at -http://wiki.xenproject.org and in particular -http://wiki.xenproject.org/wiki/Getting_Started. +https://wiki.xenproject.org and in particular +https://wiki.xenproject.org/wiki/Getting_Started. Second, there are a number of prerequisites for building a Xen source release. Make sure you have all the following installed, either by @@ -88,10 +88,10 @@ disabled at compile time: Second, you need to acquire a suitable kernel for use in domain 0. If possible you should use a kernel provided by your OS distributor. If no suitable kernel is available from your OS distributor then refer to -http://wiki.xen.org/wiki/XenDom0Kernels for suggestions for +https://wiki.xen.org/wiki/XenDom0Kernels for suggestions for suitable kernels to use. If you are looking to compile a Dom0 kernel from source, please refer to -http://wiki.xen.org/wiki/XenParavirtOps. +https://wiki.xen.org/wiki/XenParavirtOps. [NB. Unless noted otherwise, all the following steps should be performed with root privileges.] @@ -168,9 +168,9 @@ You can change the preferred xenstored you want to use in the configuration but since we cannot stop the daemon a reboot will be required to make the change take effect. -[0] http://wiki.xen.org/wiki/XenStore -[1] http://wiki.xen.org/wiki/XenStoreReference -[2] http://wiki.xen.org/wiki/Xenstored +[0] https://wiki.xen.org/wiki/XenStore +[1] https://wiki.xen.org/wiki/XenStoreReference +[2] https://wiki.xen.org/wiki/Xenstored Python Runtime Libraries ======================== diff --git a/config/Paths.mk.in b/config/Paths.mk.in index dc9d0c0353..416fc7aab9 100644 --- a/config/Paths.mk.in +++ b/config/Paths.mk.in @@ -10,7 +10,7 @@ # # For more documentation you can refer to the wiki: # -# http://wiki.xen.org/wiki/Category:Host_Configuration#System_wide_xen_configuration +# https://wiki.xen.org/wiki/Category:Host_Configuration#System_wide_xen_configuration PACKAGE_TARNAME := @PACKAGE_TARNAME@ prefix := @prefix@ diff --git a/docs/README.colo b/docs/README.colo index 466eb72152..acb4ee5a0a 100644 --- a/docs/README.colo +++ b/docs/README.colo @@ -5,5 +5,5 @@ response in parallel too. If the response packets from PVM and SVM are identical, they are released immediately. Otherwise, a VM checkpoint (on demand) is conducted. -See the website at http://wiki.xen.org/wiki/COLO_-_Coarse_Grain_Lock_Stepping +See the website at https://wiki.xen.org/wiki/COLO_-_Coarse_Grain_Lock_Stepping for details. diff --git a/docs/README.remus b/docs/README.remus index 20783c93da..e41e045a10 100644 --- a/docs/README.remus +++ b/docs/README.remus @@ -1,7 +1,7 @@ Remus provides fault tolerance for virtual machines by sending continuous checkpoints to a backup, which will activate if the target VM fails. -See the website at http://wiki.xen.org/wiki/Remus for details. +See the website at https://wiki.xen.org/wiki/Remus for details. Using Remus with libxl on Xen 4.5 and higher: To enable network buffering, you need libnl 3.2.8 diff --git a/docs/misc/stubdom.txt b/docs/misc/stubdom.txt index de7b6c7d96..882a18cab4 100644 --- a/docs/misc/stubdom.txt +++ b/docs/misc/stubdom.txt @@ -19,7 +19,7 @@ config: device_model_stubdomain_override = 1 See xl.cfg(5) for more details of the xl domain configuration syntax -and http://wiki.xen.org/wiki/Device_Model_Stub_Domains for more +and https://wiki.xen.org/wiki/Device_Model_Stub_Domains for more information on device model stub domains diff --git a/docs/misc/vtd.txt b/docs/misc/vtd.txt index 88b2102e3e..89076a0776 100644 --- a/docs/misc/vtd.txt +++ b/docs/misc/vtd.txt @@ -208,7 +208,7 @@ http://www.dell.com/content/products/category.aspx/optix?c=us&cs=555&l=en&s=biz - HP Compaq: DC7800 http://h10010.www1.hp.com/wwpc/us/en/en/WF04a/12454-12454-64287-321860-3328898.html -For more information, pls refer to http://wiki.xen.org/wiki/VTdHowTo. +For more information, pls refer to https://wiki.xen.org/wiki/VTdHowTo. Assigning devices to HVM domains diff --git a/docs/misc/xen-command-line.pandoc b/docs/misc/xen-command-line.pandoc index 02432bdb25..6ff317d15d 100644 --- a/docs/misc/xen-command-line.pandoc +++ b/docs/misc/xen-command-line.pandoc @@ -843,7 +843,7 @@ So `` being `1G+25%` on a 256 GB host would result in 65 GB. If you use this option then it is highly recommended that you disable any dom0 autoballooning feature present in your toolstack. See the _xl.conf(5)_ man page or [Xen Best -Practices](http://wiki.xen.org/wiki/Xen_Best_Practices#Xen_dom0_dedicated_memory_and_preventing_dom0_memory_ballooning). +Practices](https://wiki.xen.org/wiki/Xen_Best_Practices#Xen_dom0_dedicated_memory_and_preventing_dom0_memory_ballooning). This option doesn't have effect if pv-shim mode is enabled. diff --git a/docs/misc/xenstore.txt b/docs/misc/xenstore.txt index 7f2b388dd5..04ce0ba607 100644 --- a/docs/misc/xenstore.txt +++ b/docs/misc/xenstore.txt @@ -168,7 +168,7 @@ SET_PERMS ||+? r read only b both read and write n no access - See http://wiki.xen.org/wiki/XenBus section + See https://wiki.xen.org/wiki/XenBus section `Permissions' for details of the permissions system. ---------- Watches ---------- diff --git a/tools/libxl/libxlu_cfg.c b/tools/libxl/libxlu_cfg.c index cafc632fc1..f9e8aa2f3a 100644 --- a/tools/libxl/libxlu_cfg.c +++ b/tools/libxl/libxlu_cfg.c @@ -74,7 +74,7 @@ static void parse(CfgParseContext *ctx) { fputs( "warning: Config file looks like it contains Python code.\n" "warning: Arbitrary Python is no longer supported.\n" - "warning: See http://wiki.xen.org/wiki/PythonInXlConfig\n", + "warning: See https://wiki.xen.org/wiki/PythonInXlConfig\n", ctx->cfg->report); } } From patchwork Mon Mar 30 13:57:34 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ian Jackson X-Patchwork-Id: 11465573 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 8FD6217EA for ; Mon, 30 Mar 2020 13:59:40 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 6A429206F5 for ; Mon, 30 Mar 2020 13:59:40 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 6A429206F5 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=eu.citrix.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1jIuvS-0002aQ-JA; Mon, 30 Mar 2020 13:58:02 +0000 Received: from us1-rack-iad1.inumbo.com ([172.99.69.81]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1jIuvR-0002a6-GO for xen-devel@lists.xenproject.org; Mon, 30 Mar 2020 13:58:01 +0000 X-Inumbo-ID: 6f004df6-728e-11ea-83d8-bc764e2007e4 Received: from chiark.greenend.org.uk (unknown [2001:ba8:1e3::]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS id 6f004df6-728e-11ea-83d8-bc764e2007e4; Mon, 30 Mar 2020 13:57:46 +0000 (UTC) Received: from [172.18.45.5] (helo=zealot.relativity.greenend.org.uk) by chiark.greenend.org.uk (Debian Exim 4.84_2 #1) with esmtp (return-path ijackson@chiark.greenend.org.uk) id 1jIuvB-0007Qg-Oo; Mon, 30 Mar 2020 14:57:45 +0100 From: Ian Jackson To: xen-devel@lists.xenproject.org Date: Mon, 30 Mar 2020 14:57:34 +0100 Message-Id: <20200330135735.31512-3-ian.jackson@eu.citrix.com> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20200330135735.31512-1-ian.jackson@eu.citrix.com> References: <20200330135735.31512-1-ian.jackson@eu.citrix.com> Subject: [Xen-devel] [PATCH 2/3] docs etc.: https: Fix references to other Xen pages X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: Juergen Gross , Kevin Tian , Stefano Stabellini , Julien Grall , Jun Nakajima , Wei Liu , Konrad Rzeszutek Wilk , Andrew Cooper , ian.jackson@eu.citrix.com, George Dunlap , Ross Lagerwall , Jan Beulich , Samuel Thibault , Daniel De Graaf , =?utf-8?q?Roger_Pau_Monn=C3=A9?= Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" Change the url scheme to https. This is all in-tree references to xenbits and the main website except for those in Config.mk. We leave Config.mk alone for now because those urls are used by CI systems and we need to check that nothing breaks when we change the download method. Signed-off-by: Ian Jackson Reviewed-by: Julien Grall --- README | 8 ++++---- SUPPORT.md | 2 +- configure | 6 +++--- configure.ac | 2 +- docs/configure | 6 +++--- docs/configure.ac | 2 +- docs/misc/9pfs.pandoc | 4 ++-- docs/misc/livepatch.pandoc | 4 ++-- docs/misc/pvcalls.pandoc | 6 +++--- docs/misc/xen-command-line.pandoc | 2 +- docs/misc/xenstore-paths.pandoc | 22 +++++++++++----------- docs/misc/xsm-flask.txt | 4 ++-- docs/process/branching-checklist.txt | 2 +- stubdom/configure | 6 +++--- stubdom/configure.ac | 2 +- tools/configure | 6 +++--- tools/configure.ac | 2 +- xen/arch/x86/hvm/vmx/vmx.c | 2 +- xen/include/public/io/blkif.h | 2 +- 19 files changed, 45 insertions(+), 45 deletions(-) diff --git a/README b/README index 712d05d69d..555f3415fa 100644 --- a/README +++ b/README @@ -7,7 +7,7 @@ ################################# -http://www.xen.org/ +https://www.xen.org/ What is Xen? ============ @@ -17,10 +17,10 @@ Systems Research Group of the University of Cambridge Computer Laboratory, as part of the UK-EPSRC funded XenoServers project. Xen is freely-distributable Open Source software, released under the GNU GPL. Since its initial public release, Xen has grown a large -development community, spearheaded by xen.org (http://www.xen.org). +development community, spearheaded by xen.org (https://www.xen.org). This file contains some quick-start instructions to install Xen on -your system. For more information see http:/www.xen.org/ and +your system. For more information see https:/www.xen.org/ and https://wiki.xen.org/ Quick-Start Guide @@ -99,7 +99,7 @@ performed with root privileges.] 1. Download and untar the source tarball file. This will be a file named xen-unstable-src.tgz, or xen-$version-src.tgz. You can also pull the current version from the git or mercurial - repositories at http://xenbits.xen.org/ + repositories at https://xenbits.xen.org/ # tar xzf xen-unstable-src.tgz diff --git a/SUPPORT.md b/SUPPORT.md index 169b6f8fcf..7270c9b021 100644 --- a/SUPPORT.md +++ b/SUPPORT.md @@ -627,7 +627,7 @@ Virtual Performance Management Unit for HVM guests Status, x86: Supported, Not security supported Disabled by default (enable with hypervisor command line option). -This feature is not security supported: see http://xenbits.xen.org/xsa/advisory-163.html +This feature is not security supported: see https://xenbits.xen.org/xsa/advisory-163.html ### Argo: Inter-domain message delivery by hypercall diff --git a/configure b/configure index 83f84b049f..9da3970cef 100755 --- a/configure +++ b/configure @@ -582,7 +582,7 @@ PACKAGE_TARNAME='xen' PACKAGE_VERSION='4.14' PACKAGE_STRING='Xen Hypervisor 4.14' PACKAGE_BUGREPORT='xen-devel@lists.xen.org' -PACKAGE_URL='http://www.xen.org/' +PACKAGE_URL='https://www.xen.org/' ac_unique_file="./xen/common/kernel.c" enable_option_checking=no @@ -1336,7 +1336,7 @@ Optional Packages: [PREFIX/lib/debug] Report bugs to . -Xen Hypervisor home page: . +Xen Hypervisor home page: . _ACEOF ac_status=$? fi @@ -2904,7 +2904,7 @@ Configuration files: $config_files Report bugs to . -Xen Hypervisor home page: ." +Xen Hypervisor home page: ." _ACEOF cat >>$CONFIG_STATUS <<_ACEOF || ac_write_fail=1 diff --git a/configure.ac b/configure.ac index 7388b282f9..3aea407153 100644 --- a/configure.ac +++ b/configure.ac @@ -3,7 +3,7 @@ AC_PREREQ([2.67]) AC_INIT([Xen Hypervisor], m4_esyscmd([./version.sh ./xen/Makefile]), - [xen-devel@lists.xen.org], [xen], [http://www.xen.org/]) + [xen-devel@lists.xen.org], [xen], [https://www.xen.org/]) AC_CONFIG_SRCDIR([./xen/common/kernel.c]) AC_CONFIG_FILES([ config/Toplevel.mk diff --git a/docs/configure b/docs/configure index fdfc110311..9e3ed60462 100755 --- a/docs/configure +++ b/docs/configure @@ -582,7 +582,7 @@ PACKAGE_TARNAME='xen' PACKAGE_VERSION='4.14' PACKAGE_STRING='Xen Hypervisor Documentation 4.14' PACKAGE_BUGREPORT='xen-devel@lists.xen.org' -PACKAGE_URL='http://www.xen.org/' +PACKAGE_URL='https://www.xen.org/' ac_unique_file="misc/xen-command-line.pandoc" ac_subst_vars='LTLIBOBJS @@ -1320,7 +1320,7 @@ Use these variables to override the choices made by `configure' or to help it to find libraries and programs with nonstandard names/locations. Report bugs to . -Xen Hypervisor Documentation home page: . +Xen Hypervisor Documentation home page: . _ACEOF ac_status=$? fi @@ -2857,7 +2857,7 @@ Configuration files: $config_files Report bugs to . -Xen Hypervisor Documentation home page: ." +Xen Hypervisor Documentation home page: ." _ACEOF cat >>$CONFIG_STATUS <<_ACEOF || ac_write_fail=1 diff --git a/docs/configure.ac b/docs/configure.ac index e795bec04c..cb5a6eaa4c 100644 --- a/docs/configure.ac +++ b/docs/configure.ac @@ -3,7 +3,7 @@ AC_PREREQ([2.67]) AC_INIT([Xen Hypervisor Documentation], m4_esyscmd([../version.sh ../xen/Makefile]), - [xen-devel@lists.xen.org], [xen], [http://www.xen.org/]) + [xen-devel@lists.xen.org], [xen], [https://www.xen.org/]) AC_CONFIG_SRCDIR([misc/xen-command-line.pandoc]) AC_CONFIG_FILES([ ../config/Docs.mk diff --git a/docs/misc/9pfs.pandoc b/docs/misc/9pfs.pandoc index a4dc86f639..b034fb5fa6 100644 --- a/docs/misc/9pfs.pandoc +++ b/docs/misc/9pfs.pandoc @@ -415,5 +415,5 @@ the *size* field of the 9pfs header. [paper]: https://www.usenix.org/legacy/event/usenix05/tech/freenix/full_papers/hensbergen/hensbergen.pdf [website]: https://github.com/chaos/diod/blob/master/protocol.md -[XenbusStateInitialising]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,xenbus.h.html -[ring.h]: http://xenbits.xen.org/gitweb/?p=xen.git;a=blob;f=xen/include/public/io/ring.h;hb=HEAD +[XenbusStateInitialising]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,xenbus.h.html +[ring.h]: https://xenbits.xen.org/gitweb/?p=xen.git;a=blob;f=xen/include/public/io/ring.h;hb=HEAD diff --git a/docs/misc/livepatch.pandoc b/docs/misc/livepatch.pandoc index 9473ad5991..d38e4ce074 100644 --- a/docs/misc/livepatch.pandoc +++ b/docs/misc/livepatch.pandoc @@ -88,7 +88,7 @@ mechanism. See `Trampoline (e9 opcode)` section for more details. ### Example of trampoline and in-place splicing As example we will assume the hypervisor does not have XSA-132 (see -[domctl/sysctl: don't leak hypervisor stack to toolstacks](http://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=4ff3449f0e9d175ceb9551d3f2aecb59273f639d)) +[domctl/sysctl: don't leak hypervisor stack to toolstacks](https://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=4ff3449f0e9d175ceb9551d3f2aecb59273f639d)) and we would like to binary patch the hypervisor with it. The original code looks as so: @@ -157,7 +157,7 @@ CPU branching logic (I-cache, but it is just one unconditional jump). For this example we will assume that the hypervisor has not been compiled with XSA-125 (see -[pre-fill structures for certain HYPERVISOR_xen_version sub-ops](http://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=fe2e079f642effb3d24a6e1a7096ef26e691d93e)) +[pre-fill structures for certain HYPERVISOR_xen_version sub-ops](https://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=fe2e079f642effb3d24a6e1a7096ef26e691d93e)) which mem-sets an structure in `xen_version` hypercall. This function is not called **anywhere** in the hypervisor (it is called by the guest) but referenced in the `compat_hypercall_table` and `hypercall_table` (and diff --git a/docs/misc/pvcalls.pandoc b/docs/misc/pvcalls.pandoc index 729cf97bdf..665dad556c 100644 --- a/docs/misc/pvcalls.pandoc +++ b/docs/misc/pvcalls.pandoc @@ -1078,8 +1078,8 @@ only as many bytes as available in the buffer up to *[in|out]_prod*. reading from the socket. -[xenstore]: http://xenbits.xen.org/docs/unstable/misc/xenstore.txt -[XenbusStateInitialising]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,xenbus.h.html +[xenstore]: https://xenbits.xen.org/docs/unstable/misc/xenstore.txt +[XenbusStateInitialising]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,xenbus.h.html [address]: http://pubs.opengroup.org/onlinepubs/7908799/xns/syssocket.h.html [in]: http://pubs.opengroup.org/onlinepubs/000095399/basedefs/netinet/in.h.html [socket]: http://pubs.opengroup.org/onlinepubs/009695399/functions/socket.html @@ -1089,4 +1089,4 @@ reading from the socket. [listen]: http://pubs.opengroup.org/onlinepubs/7908799/xns/listen.html [accept]: http://pubs.opengroup.org/onlinepubs/7908799/xns/accept.html [poll]: http://pubs.opengroup.org/onlinepubs/7908799/xsh/poll.html -[ring.h]: http://xenbits.xen.org/gitweb/?p=xen.git;a=blob;f=xen/include/public/io/ring.h;hb=HEAD +[ring.h]: https://xenbits.xen.org/gitweb/?p=xen.git;a=blob;f=xen/include/public/io/ring.h;hb=HEAD diff --git a/docs/misc/xen-command-line.pandoc b/docs/misc/xen-command-line.pandoc index 6ff317d15d..acd0b3d994 100644 --- a/docs/misc/xen-command-line.pandoc +++ b/docs/misc/xen-command-line.pandoc @@ -2294,7 +2294,7 @@ provide access to a wealth of low level processor information. *Warning:* As the virtualisation is not 100% safe, don't use the vpmu flag on -production systems (see http://xenbits.xen.org/xsa/advisory-163.html)! +production systems (see https://xenbits.xen.org/xsa/advisory-163.html)! ### vwfi (arm) > `= trap | native` diff --git a/docs/misc/xenstore-paths.pandoc b/docs/misc/xenstore-paths.pandoc index ff3ca04069..a152f5ea68 100644 --- a/docs/misc/xenstore-paths.pandoc +++ b/docs/misc/xenstore-paths.pandoc @@ -636,14 +636,14 @@ for the toolstack to obtain e.g. the domain id of a xenstore domain. Domain Id of the xenstore domain in case xenstore is provided via a domain instead of a daemon in dom0. -[BLKIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,blkif.h.html -[FBIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,fbif.h.html -[HVMPARAMS]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,hvm,params.h.html -[KBDIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,kbdif.h.html -[LIBXLMEM]: http://xenbits.xen.org/docs/unstable/misc/libxl_memory.txt -[NETIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,netif.h.html -[SCSIIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,vscsiif.h.html -[SI]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,xen.h.html#Struct_start_info -[USBIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,usbif.h.html -[VCPU]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,vcpu.h.html -[XSWIRE]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,xs_wire.h.html +[BLKIF]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,blkif.h.html +[FBIF]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,fbif.h.html +[HVMPARAMS]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,hvm,params.h.html +[KBDIF]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,kbdif.h.html +[LIBXLMEM]: https://xenbits.xen.org/docs/unstable/misc/libxl_memory.txt +[NETIF]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,netif.h.html +[SCSIIF]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,vscsiif.h.html +[SI]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,xen.h.html#Struct_start_info +[USBIF]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,usbif.h.html +[VCPU]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,vcpu.h.html +[XSWIRE]: https://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,xs_wire.h.html diff --git a/docs/misc/xsm-flask.txt b/docs/misc/xsm-flask.txt index 40e5fc845e..2419c5cf29 100644 --- a/docs/misc/xsm-flask.txt +++ b/docs/misc/xsm-flask.txt @@ -49,13 +49,13 @@ driver domains, or stub xenstored - even if those bugs do no worse than reduce the security of such a system to one whose device models, backend drivers, or xenstore, run in dom0. -For more information see http://xenbits.xen.org/xsa/advisory-77.html. +For more information see https://xenbits.xen.org/xsa/advisory-77.html. The following interfaces are covered by this statement. Interfaces not listed here are considered safe for disaggregation, security issues found in interfaces not listed here will be handled according to the normal security problem response policy -http://www.xenproject.org/security-policy.html. +https://www.xenproject.org/security-policy.html. __HYPERVISOR_domctl (xen/include/public/domctl.h) diff --git a/docs/process/branching-checklist.txt b/docs/process/branching-checklist.txt index 1dfa1a2ec7..e286e65962 100644 --- a/docs/process/branching-checklist.txt +++ b/docs/process/branching-checklist.txt @@ -25,7 +25,7 @@ ov=4.0 # update xendocs@xenbits docs generator to generate new stable branch # docs too. commit to git. -* make 13:37 http://xenbits.xen.org/docs/4.2-testing/ is now live true +* make 13:37 https://xenbits.xen.org/docs/4.2-testing/ is now live true #14:17 HOWTO: login to xenbits. become "xendocs" . cd cronjobs . edit # xenbits-docs-all.sh in the obvious way. git commit ssh root@xenbits.xen.org diff --git a/stubdom/configure b/stubdom/configure index 8f0bdcf191..da03da535a 100755 --- a/stubdom/configure +++ b/stubdom/configure @@ -582,7 +582,7 @@ PACKAGE_TARNAME='xen' PACKAGE_VERSION='4.14' PACKAGE_STRING='Xen Hypervisor Stub Domains 4.14' PACKAGE_BUGREPORT='xen-devel@lists.xen.org' -PACKAGE_URL='http://www.xen.org/' +PACKAGE_URL='https://www.xen.org/' ac_unique_file="xenstore-minios.cfg" ac_subst_vars='LTLIBOBJS @@ -1376,7 +1376,7 @@ Use these variables to override the choices made by `configure' or to help it to find libraries and programs with nonstandard names/locations. Report bugs to . -Xen Hypervisor Stub Domains home page: . +Xen Hypervisor Stub Domains home page: . _ACEOF ac_status=$? fi @@ -4296,7 +4296,7 @@ Configuration files: $config_files Report bugs to . -Xen Hypervisor Stub Domains home page: ." +Xen Hypervisor Stub Domains home page: ." _ACEOF cat >>$CONFIG_STATUS <<_ACEOF || ac_write_fail=1 diff --git a/stubdom/configure.ac b/stubdom/configure.ac index 9066dfaaa7..a2d514c021 100644 --- a/stubdom/configure.ac +++ b/stubdom/configure.ac @@ -3,7 +3,7 @@ AC_PREREQ([2.67]) AC_INIT([Xen Hypervisor Stub Domains], m4_esyscmd([../version.sh ../xen/Makefile]), - [xen-devel@lists.xen.org], [xen], [http://www.xen.org/]) + [xen-devel@lists.xen.org], [xen], [https://www.xen.org/]) AC_CONFIG_SRCDIR([xenstore-minios.cfg]) AC_CONFIG_FILES([../config/Stubdom.mk]) AC_CONFIG_AUX_DIR([../]) diff --git a/tools/configure b/tools/configure index 13ee7f135c..4fa5f7b937 100755 --- a/tools/configure +++ b/tools/configure @@ -583,7 +583,7 @@ PACKAGE_TARNAME='xen' PACKAGE_VERSION='4.14' PACKAGE_STRING='Xen Hypervisor Tools 4.14' PACKAGE_BUGREPORT='xen-devel@lists.xen.org' -PACKAGE_URL='http://www.xen.org/' +PACKAGE_URL='https://www.xen.org/' ac_unique_file="libxl/libxl.c" # Factoring default headers for most tests. @@ -1611,7 +1611,7 @@ Use these variables to override the choices made by `configure' or to help it to find libraries and programs with nonstandard names/locations. Report bugs to . -Xen Hypervisor Tools home page: . +Xen Hypervisor Tools home page: . _ACEOF ac_status=$? fi @@ -10373,7 +10373,7 @@ Configuration headers: $config_headers Report bugs to . -Xen Hypervisor Tools home page: ." +Xen Hypervisor Tools home page: ." _ACEOF cat >>$CONFIG_STATUS <<_ACEOF || ac_write_fail=1 diff --git a/tools/configure.ac b/tools/configure.ac index f288d2cc3f..ea0272766f 100644 --- a/tools/configure.ac +++ b/tools/configure.ac @@ -3,7 +3,7 @@ AC_PREREQ([2.67]) AC_INIT([Xen Hypervisor Tools], m4_esyscmd([../version.sh ../xen/Makefile]), - [xen-devel@lists.xen.org], [xen], [http://www.xen.org/]) + [xen-devel@lists.xen.org], [xen], [https://www.xen.org/]) AC_CONFIG_SRCDIR([libxl/libxl.c]) AC_CONFIG_FILES([ ../config/Tools.mk diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c index d265ed46ad..1c398fdb6e 100644 --- a/xen/arch/x86/hvm/vmx/vmx.c +++ b/xen/arch/x86/hvm/vmx/vmx.c @@ -2490,7 +2490,7 @@ const struct hvm_function_table * __init start_vmx(void) /* * Do not enable EPT when (!cpu_has_vmx_pat), to prevent security hole - * (refer to http://xenbits.xen.org/xsa/advisory-60.html). + * (refer to https://xenbits.xen.org/xsa/advisory-60.html). */ if ( cpu_has_vmx_ept && (cpu_has_vmx_pat || opt_force_ept) ) { diff --git a/xen/include/public/io/blkif.h b/xen/include/public/io/blkif.h index d4a34de94c..4cdba79aba 100644 --- a/xen/include/public/io/blkif.h +++ b/xen/include/public/io/blkif.h @@ -118,7 +118,7 @@ * * The underlying storage is not affected by the direct IO memory * lifetime bug. See: - * http://lists.xen.org/archives/html/xen-devel/2012-12/msg01154.html + * https://lists.xen.org/archives/html/xen-devel/2012-12/msg01154.html * * Therefore this option gives the backend permission to use * O_DIRECT, notwithstanding that bug.