0

Move Linux documents to a subdir

There were 32 linux documents in docs. It's getting out of hand, so lets
move them to a subdirectory.

R=sky,jorgelo
CC=thestig
BUG=None

Change-Id: Ib7de415c72fe6ec3c51dc2b28f06b34487b5b6d1
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1974901
Commit-Queue: Thomas Anderson <thomasanderson@chromium.org>
Reviewed-by: Scott Violet <sky@chromium.org>
Reviewed-by: Jorge Lucangeli Obes <jorgelo@chromium.org>
Cr-Commit-Position: refs/heads/master@{#726499}
This commit is contained in:
Tom Anderson
2019-12-19 20:54:32 +00:00
committed by Commit Bot
parent 218d152cb1
commit 9f5be07962
63 changed files with 37 additions and 37 deletions
build
chrome
browser
resources
chromeos
zip_archiver
unpacker-test
installer
linux
common
test
components/nacl/loader
content
docs
headless/public
sandbox/linux
services/service_manager
third_party/blink
perf_tests
parser
resources
public
tools
blinkpy
web_tests

@ -200,7 +200,7 @@ declare_args() {
# results independent of the checkout and build directory names, which
# in turn is important for goma compile hit rate.
# Setting this to true may make it harder to debug binaries on Linux, see
# https://chromium.googlesource.com/chromium/src/+/master/docs/linux_debugging.md#Source-level-debug-with-fdebug_compilation_dir
# https://chromium.googlesource.com/chromium/src/+/master/docs/linux/debugging.md#Source-level-debug-with-fdebug_compilation_dir
# It's not clear if the crash server will correctly handle dSYMs with relative
# paths, so we disable this feature for official benefit. The main benefit is
# deterministic builds to reduce compile times, so this is less relevant for

@ -5,7 +5,7 @@
# found in the LICENSE file.
# Script to install everything needed to build chromium (well, ideally, anyway)
# See https://chromium.googlesource.com/chromium/src/+/master/docs/linux_build_instructions.md
# See https://chromium.googlesource.com/chromium/src/+/master/docs/linux/build_instructions.md
usage() {
echo "Usage: $0 [--options]"

@ -71,7 +71,7 @@ $(eval $(call NMF_RULE,$(TARGET),))
# manually.
# -disable-setuid-sandbox is optional, but otherwise it is necessary to set up
# the sandbox for development. See
# https://chromium.googlesource.com/chromium/src/+/master/docs/linux_suid_sandbox_development.md
# https://chromium.googlesource.com/chromium/src/+/master/docs/linux/suid_sandbox_development.md
.PHONY: tests_run
tests_run: check_for_chrome all $(TEST_PAGE)
$(RUN_PY) -C $(CURDIR) -P $(TEST_PAGE_CONFIG) \

@ -32,5 +32,5 @@
<translation/>
<developer_name>The Chromium Authors</developer_name>
<url type="bugtracker">https://www.chromium.org/for-testers/bug-reporting-guidelines</url>
<url type="help">https://chromium.googlesource.com/chromium/src/+/master/docs/linux_debugging.md</url>
<url type="help">https://chromium.googlesource.com/chromium/src/+/master/docs/linux/debugging.md</url>
</component>

@ -23,7 +23,7 @@ SandboxStatusUITest.prototype = {
// - If failures of this test are a problem on a bot under your care,
// the proper way to address such failures is to install the SUID
// sandbox. See:
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_suid_sandbox_development.md
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/suid_sandbox_development.md
// - PLEASE DO NOT GLOBALLY DISABLE THIS TEST.
GEN('#if defined(OS_LINUX)');
GEN('# define MAYBE_testSUIDorNamespaceSandboxEnabled \\');

@ -24,7 +24,7 @@ enum NaClZygoteIPCCommand {
// The next set of constants define global Linux file descriptors.
// For communications between NaCl loader and browser.
// See also content/common/zygote_main_linux.cc and
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_zygote.md
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/zygote.md
// For communications between NaCl loader and zygote.
#define kNaClZygoteDescriptor 3

@ -7,7 +7,7 @@
void NaClMainPlatformDelegate::EnableSandbox(
const content::MainFunctionParams& parameters) {
// The setuid sandbox is started in the zygote process: zygote_main_linux.cc
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_suid_sandbox.md
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/suid_sandbox.md
//
// The seccomp sandbox is started in the renderer.
// http://code.google.com/p/seccompsandbox/

@ -2,7 +2,7 @@
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_sandbox_ipc.md
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/sandbox_ipc.md
#ifndef CONTENT_BROWSER_SANDBOX_IPC_LINUX_H_
#define CONTENT_BROWSER_SANDBOX_IPC_LINUX_H_

@ -31,7 +31,7 @@ void RendererMainPlatformDelegate::PlatformUninitialize() {
bool RendererMainPlatformDelegate::EnableSandbox() {
// The setuid sandbox is started in the zygote process: zygote_main_linux.cc
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_suid_sandbox.md
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/suid_sandbox.md
//
// Anything else is started in InitializeSandbox().
service_manager::SandboxLinux::Options options;

@ -11,7 +11,7 @@ etc.) are stubbed out. The entire system UI runs in a single X11 window on your
desktop.
First, follow the [normal Linux build
instructions](https://chromium.googlesource.com/chromium/src/+/master/docs/linux_build_instructions.md)
instructions](https://chromium.googlesource.com/chromium/src/+/master/docs/linux/build_instructions.md)
as usual to get a Chromium checkout.
## Updating your gclient config

@ -193,6 +193,6 @@ NextSibling():
## Further reading
https://chromium.googlesource.com/chromium/src/+/master/docs/linux_minidump_to_core.md#Source-debugging
https://chromium.googlesource.com/chromium/src/+/master/docs/linux/minidump_to_core.md#Source-debugging
https://www.chromium.org/developers/how-tos/debugging-on-windows

@ -189,7 +189,7 @@ decoding backend:
### VaAPI on Linux
This configuration is **unsupported** (see [docs/linux_hw_video_decode.md]), the
This configuration is **unsupported** (see [docs/linux/hw_video_decode.md]), the
following instructions are provided only as a reference for developers to test
the code paths on a Linux machine.
@ -223,6 +223,6 @@ non-sandboxed mode.
Refer to the [previous section](#verify-vaapi) to verify support and use of
the VaAPI.
[docs/linux_hw_video_decode.md]: https://chromium.googlesource.com/chromium/src/+/HEAD/docs/linux_hw_video_decode.md
[Linux build setup]: https://chromium.googlesource.com/chromium/src/+/HEAD/docs/linux_build_instructions.md
[Setting up the build]: https://chromium.googlesource.com/chromium/src/+/HEAD/docs/linux_build_instructions.md#setting-up-the-build
[docs/linux/hw_video_decode.md]: https://chromium.googlesource.com/chromium/src/+/HEAD/docs/linux/hw_video_decode.md
[Linux build setup]: https://chromium.googlesource.com/chromium/src/+/HEAD/docs/linux/build_instructions.md
[Setting up the build]: https://chromium.googlesource.com/chromium/src/+/HEAD/docs/linux/build_instructions.md#setting-up-the-build

@ -137,7 +137,7 @@ Ensure you are using GDB on Linux, not LLDB.
Linux :
See
https://chromium.googlesource.com/chromium/src/+/master/docs/linux_debugging.md
https://chromium.googlesource.com/chromium/src/+/master/docs/linux/debugging.md
macOS :
https://dev.chromium.org/developers/how-tos/debugging-on-os-x

@ -70,4 +70,4 @@ in Gerrit.
[clang_code_coverage_wrapper]: clang_code_coverage_wrapper.md
[chromium-coverage Gerrit plugin]: https://chromium.googlesource.com/infra/gerrit-plugins/code-coverage/
[Chromium on Chromium OS]: https://chromium.googlesource.com/chromium/src/+/master/docs/chromeos_build_instructions.md
[Chromium on Linux]: https://chromium.googlesource.com/chromium/src/+/master/docs/linux_build_instructions.md
[Chromium on Linux]: https://chromium.googlesource.com/chromium/src/+/master/docs/linux/build_instructions.md

@ -1,6 +1,6 @@
# Running web tests on Linux
1. Build `blink_tests` (see [Linux-specific build instructions](https://chromium.googlesource.com/chromium/src/+/master/docs/linux_build_instructions.md))
1. Build `blink_tests` (see [Linux-specific build instructions](https://chromium.googlesource.com/chromium/src/+/master/docs/linux/build_instructions.md))
1. Checkout the web tests
* If you have an entry in your `.gclient` file that includes
"web_tests", you may need to comment it out and sync.

@ -292,7 +292,7 @@ class HEADLESS_EXPORT HeadlessBrowser::Options::Builder {
// }
//
// [1]
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_zygote.md
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/zygote.md
void RunChildProcessIfNeeded(int argc, const char** argv);
#else
// In Windows, the headless browser may need to create child processes. This is

@ -114,7 +114,7 @@ void WriteTimeStruct(base::Pickle* pickle, const struct tm& time) {
}
// See
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_zygote.md
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/zygote.md
void ProxyLocaltimeCallToBrowser(time_t input,
struct tm* output,
char* timezone_out,

@ -32,7 +32,7 @@ namespace sandbox {
//
// Our replacement functions must handle both cases, and either proxy the call
// to the parent over the IPC back-channel (see
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_sandbox_ipc.md)
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/sandbox_ipc.md)
// or use dlsym with RTLD_NEXT to resolve the symbol, ignoring any symbols in
// the current module. Use SetUseLocaltimeOverride() and SetAmZygoteOrRenderer()
// below to control the mode of operation, which defaults using the dlsym

@ -128,7 +128,7 @@ base::FilePath SetuidSandboxHost::GetSandboxBinaryPath() {
// In user-managed builds, including development builds, an environment
// variable is required to enable the sandbox. See
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_suid_sandbox_development.md
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/suid_sandbox_development.md
struct stat st;
if (sandbox_binary.empty() && stat(base::kProcSelfExe, &st) == 0 &&
st.st_uid == getuid()) {

@ -2,7 +2,7 @@
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_suid_sandbox.md
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/suid_sandbox.md
#include "sandbox/linux/suid/common/sandbox.h"
@ -403,7 +403,7 @@ bool CheckAndExportApiVersion() {
"The setuid sandbox provides API version %d, "
"but you need %d\n"
"Please read "
"https://chromium.googlesource.com/chromium/src/+/master/docs/linux_suid_sandbox_development.md."
"https://chromium.googlesource.com/chromium/src/+/master/docs/linux/suid_sandbox_development.md."
"\n\n",
kSUIDSandboxApiNumber,
api_number);

@ -11,7 +11,7 @@ namespace service_manager {
// base::GlobalDescriptors object (see base/posix/global_descriptors.h)
enum {
kCrashDumpSignal = 0,
kSandboxIPCChannel, // https://chromium.googlesource.com/chromium/src/+/master/docs/linux_sandbox_ipc.md
kSandboxIPCChannel, // https://chromium.googlesource.com/chromium/src/+/master/docs/linux/sandbox_ipc.md
kMojoIPCChannel,
kFieldTrialDescriptor,

@ -52,7 +52,7 @@ class SERVICE_MANAGER_SANDBOX_EXPORT SandboxLinux {
public:
// This is a list of sandbox IPC methods which the renderer may send to the
// sandbox host. See
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_sandbox_ipc.md
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/sandbox_ipc.md
// This isn't the full list, values < 32 are reserved for methods called from
// Skia, and values < 64 are reserved for libc_interceptor.cc.
enum LinuxSandboxIPCMethods {

@ -28,7 +28,7 @@ namespace service_manager {
// Handles interprocess communication with the Linux zygote process. The zygote
// does not use standard Chrome IPC or mojo, see:
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_sandbox_ipc.md
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/sandbox_ipc.md
class COMPONENT_EXPORT(SERVICE_MANAGER_ZYGOTE) ZygoteCommunication {
public:
ZygoteCommunication();

@ -116,7 +116,7 @@ void ZygoteHostImpl::Init(const base::CommandLine& command_line) {
LOG(FATAL)
<< "No usable sandbox! Update your kernel or see "
"https://chromium.googlesource.com/chromium/src/+/master/"
"docs/linux_suid_sandbox_development.md for more information on "
"docs/linux/suid_sandbox_development.md for more information on "
"developing with the SUID sandbox. "
"If you want to live dangerously and need an immediate workaround, "
"you can try using --"

@ -12,7 +12,7 @@
namespace service_manager {
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_zygote.md
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/zygote.md
// The zygote host is an interface, in the browser process, to the zygote
// process.

@ -47,7 +47,7 @@
#include "third_party/icu/source/i18n/unicode/timezone.h"
// See
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_zygote.md
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/zygote.md
namespace service_manager {
@ -99,7 +99,7 @@ bool Zygote::ProcessRequests() {
// browser on it.
// A SOCK_DGRAM is installed in fd 5. This is the sandbox IPC channel.
// See
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_sandbox_ipc.md
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/sandbox_ipc.md
// We need to accept SIGCHLD, even though our handler is a no-op because
// otherwise we cannot wait on children. (According to POSIX 2001.)

@ -143,7 +143,7 @@ class Zygote {
std::vector<ZygoteProcessInfo> to_reap_;
// Sandbox IPC channel for renderers to invoke services from the browser. See
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_sandbox_ipc.md
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/sandbox_ipc.md
base::GlobalDescriptors::Descriptor ipc_backchannel_;
};

@ -109,7 +109,7 @@ static bool EnterSuidSandbox(sandbox::SetuidSandboxClient* setuid_sandbox,
LOG(WARNING) << "You are using a wrong version of the setuid binary!\n"
"Please read "
"https://chromium.googlesource.com/chromium/src/+/master/"
"docs/linux_suid_sandbox_development.md."
"docs/linux/suid_sandbox_development.md."
"\n\n";
}

@ -41259,7 +41259,7 @@ http://www.faqs.org/docs/electric/DC/DC_6.html
http://www.faqs.org/docs/electric/Digital/DIGI_3.html
http://www.faqs.org/docs/electric/Semi/SEMI_9.html
http://www.faqs.org/docs/factbook/fields/2032.html
http://www.faqs.org/docs/linux_network/x-087-2-resolv.library.html
http://www.faqs.org/docs/linux/network/x-087-2-resolv.library.html
http://www.faqs.org/docs/think_java/TIJ307.htm
http://www.faqs.org/docs/thinkjava/chap02.htm
http://www.faqs.org/docs/thinkjava/chap04.htm

@ -44,7 +44,7 @@ struct WebFontRenderStyle;
// Put methods here that are required due to sandbox restrictions.
// These are currently only implemented only on Linux:
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_sandbox_ipc.md
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/sandbox_ipc.md
class WebSandboxSupport {
public:
virtual ~WebSandboxSupport() {}

@ -46,7 +46,7 @@ class LinuxPort(base.Port):
FALLBACK_PATHS = {}
FALLBACK_PATHS['trusty'] = ['linux'] + win.WinPort.latest_platform_fallback_path()
BUILD_REQUIREMENTS_URL = 'https://chromium.googlesource.com/chromium/src/+/master/docs/linux_build_instructions.md'
BUILD_REQUIREMENTS_URL = 'https://chromium.googlesource.com/chromium/src/+/master/docs/linux/build_instructions.md'
XVFB_START_STOP_TIMEOUT = 5.0 # Wait up to 5 seconds for Xvfb to start or stop.
@ -84,7 +84,7 @@ class LinuxPort(base.Port):
if result:
_log.error('For complete Linux build requirements, please see:')
_log.error('')
_log.error(' https://chromium.googlesource.com/chromium/src/+/master/docs/linux_build_instructions.md')
_log.error(' https://chromium.googlesource.com/chromium/src/+/master/docs/linux/build_instructions.md')
return result
def look_for_new_crash_logs(self, crashed_processes, start_time):