Move Linux documents to a subdir
There were 32 linux documents in docs. It's getting out of hand, so lets move them to a subdirectory. R=sky,jorgelo CC=thestig BUG=None Change-Id: Ib7de415c72fe6ec3c51dc2b28f06b34487b5b6d1 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1974901 Commit-Queue: Thomas Anderson <thomasanderson@chromium.org> Reviewed-by: Scott Violet <sky@chromium.org> Reviewed-by: Jorge Lucangeli Obes <jorgelo@chromium.org> Cr-Commit-Position: refs/heads/master@{#726499}
This commit is contained in:
build
chrome
browser
resources
chromeos
zip_archiver
unpacker-test
cpp
installer
linux
common
chromium-browser
test
data
components/nacl/loader
content
docs
chromeos_build_instructions.mddisassemble_code.md
gpu
linux
build_instructions.mdbuilding_debug_gtk.mdcast_build_instructions.mdcert_management.mdchromium_arm.mdchromium_packages.mdcrash_dumping.mddebugging.mddebugging_gtk.mddebugging_ssl.mddependencies.mddev_build_as_default_browser.mddevelopment.mdeclipse_dev.mdgraphics_pipeline.mdgtk_theme_integration.mdhw_video_decode.mdinstrumented_libraries.mdminidump_to_core.mdozone_drm.mdpassword_storage.mdpid_namespace_support.mdplugins.mdprofiling.mdproxy_config.mdsandbox_ipc.mdsandboxing.mdsuid_sandbox.mdsuid_sandbox_development.mdsysroot.mdusing_a_chroot.mdzygote.md
qtcreator.mdtesting
headless/public
sandbox/linux
services/service_manager
embedder
sandbox
linux
zygote
third_party/blink
perf_tests
parser
resources
public
platform
tools
blinkpy
web_tests
port
@ -200,7 +200,7 @@ declare_args() {
|
||||
# results independent of the checkout and build directory names, which
|
||||
# in turn is important for goma compile hit rate.
|
||||
# Setting this to true may make it harder to debug binaries on Linux, see
|
||||
# https://chromium.googlesource.com/chromium/src/+/master/docs/linux_debugging.md#Source-level-debug-with-fdebug_compilation_dir
|
||||
# https://chromium.googlesource.com/chromium/src/+/master/docs/linux/debugging.md#Source-level-debug-with-fdebug_compilation_dir
|
||||
# It's not clear if the crash server will correctly handle dSYMs with relative
|
||||
# paths, so we disable this feature for official benefit. The main benefit is
|
||||
# deterministic builds to reduce compile times, so this is less relevant for
|
||||
|
@ -5,7 +5,7 @@
|
||||
# found in the LICENSE file.
|
||||
|
||||
# Script to install everything needed to build chromium (well, ideally, anyway)
|
||||
# See https://chromium.googlesource.com/chromium/src/+/master/docs/linux_build_instructions.md
|
||||
# See https://chromium.googlesource.com/chromium/src/+/master/docs/linux/build_instructions.md
|
||||
|
||||
usage() {
|
||||
echo "Usage: $0 [--options]"
|
||||
|
@ -71,7 +71,7 @@ $(eval $(call NMF_RULE,$(TARGET),))
|
||||
# manually.
|
||||
# -disable-setuid-sandbox is optional, but otherwise it is necessary to set up
|
||||
# the sandbox for development. See
|
||||
# https://chromium.googlesource.com/chromium/src/+/master/docs/linux_suid_sandbox_development.md
|
||||
# https://chromium.googlesource.com/chromium/src/+/master/docs/linux/suid_sandbox_development.md
|
||||
.PHONY: tests_run
|
||||
tests_run: check_for_chrome all $(TEST_PAGE)
|
||||
$(RUN_PY) -C $(CURDIR) -P $(TEST_PAGE_CONFIG) \
|
||||
|
@ -32,5 +32,5 @@
|
||||
<translation/>
|
||||
<developer_name>The Chromium Authors</developer_name>
|
||||
<url type="bugtracker">https://www.chromium.org/for-testers/bug-reporting-guidelines</url>
|
||||
<url type="help">https://chromium.googlesource.com/chromium/src/+/master/docs/linux_debugging.md</url>
|
||||
<url type="help">https://chromium.googlesource.com/chromium/src/+/master/docs/linux/debugging.md</url>
|
||||
</component>
|
||||
|
@ -23,7 +23,7 @@ SandboxStatusUITest.prototype = {
|
||||
// - If failures of this test are a problem on a bot under your care,
|
||||
// the proper way to address such failures is to install the SUID
|
||||
// sandbox. See:
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_suid_sandbox_development.md
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/suid_sandbox_development.md
|
||||
// - PLEASE DO NOT GLOBALLY DISABLE THIS TEST.
|
||||
GEN('#if defined(OS_LINUX)');
|
||||
GEN('# define MAYBE_testSUIDorNamespaceSandboxEnabled \\');
|
||||
|
@ -24,7 +24,7 @@ enum NaClZygoteIPCCommand {
|
||||
// The next set of constants define global Linux file descriptors.
|
||||
// For communications between NaCl loader and browser.
|
||||
// See also content/common/zygote_main_linux.cc and
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_zygote.md
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/zygote.md
|
||||
|
||||
// For communications between NaCl loader and zygote.
|
||||
#define kNaClZygoteDescriptor 3
|
||||
|
@ -7,7 +7,7 @@
|
||||
void NaClMainPlatformDelegate::EnableSandbox(
|
||||
const content::MainFunctionParams& parameters) {
|
||||
// The setuid sandbox is started in the zygote process: zygote_main_linux.cc
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_suid_sandbox.md
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/suid_sandbox.md
|
||||
//
|
||||
// The seccomp sandbox is started in the renderer.
|
||||
// http://code.google.com/p/seccompsandbox/
|
||||
|
@ -2,7 +2,7 @@
|
||||
// Use of this source code is governed by a BSD-style license that can be
|
||||
// found in the LICENSE file.
|
||||
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_sandbox_ipc.md
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/sandbox_ipc.md
|
||||
|
||||
#ifndef CONTENT_BROWSER_SANDBOX_IPC_LINUX_H_
|
||||
#define CONTENT_BROWSER_SANDBOX_IPC_LINUX_H_
|
||||
|
@ -31,7 +31,7 @@ void RendererMainPlatformDelegate::PlatformUninitialize() {
|
||||
|
||||
bool RendererMainPlatformDelegate::EnableSandbox() {
|
||||
// The setuid sandbox is started in the zygote process: zygote_main_linux.cc
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_suid_sandbox.md
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/suid_sandbox.md
|
||||
//
|
||||
// Anything else is started in InitializeSandbox().
|
||||
service_manager::SandboxLinux::Options options;
|
||||
|
@ -11,7 +11,7 @@ etc.) are stubbed out. The entire system UI runs in a single X11 window on your
|
||||
desktop.
|
||||
|
||||
First, follow the [normal Linux build
|
||||
instructions](https://chromium.googlesource.com/chromium/src/+/master/docs/linux_build_instructions.md)
|
||||
instructions](https://chromium.googlesource.com/chromium/src/+/master/docs/linux/build_instructions.md)
|
||||
as usual to get a Chromium checkout.
|
||||
|
||||
## Updating your gclient config
|
||||
|
@ -193,6 +193,6 @@ NextSibling():
|
||||
|
||||
## Further reading
|
||||
|
||||
https://chromium.googlesource.com/chromium/src/+/master/docs/linux_minidump_to_core.md#Source-debugging
|
||||
https://chromium.googlesource.com/chromium/src/+/master/docs/linux/minidump_to_core.md#Source-debugging
|
||||
|
||||
https://www.chromium.org/developers/how-tos/debugging-on-windows
|
||||
|
@ -189,7 +189,7 @@ decoding backend:
|
||||
|
||||
### VaAPI on Linux
|
||||
|
||||
This configuration is **unsupported** (see [docs/linux_hw_video_decode.md]), the
|
||||
This configuration is **unsupported** (see [docs/linux/hw_video_decode.md]), the
|
||||
following instructions are provided only as a reference for developers to test
|
||||
the code paths on a Linux machine.
|
||||
|
||||
@ -223,6 +223,6 @@ non-sandboxed mode.
|
||||
Refer to the [previous section](#verify-vaapi) to verify support and use of
|
||||
the VaAPI.
|
||||
|
||||
[docs/linux_hw_video_decode.md]: https://chromium.googlesource.com/chromium/src/+/HEAD/docs/linux_hw_video_decode.md
|
||||
[Linux build setup]: https://chromium.googlesource.com/chromium/src/+/HEAD/docs/linux_build_instructions.md
|
||||
[Setting up the build]: https://chromium.googlesource.com/chromium/src/+/HEAD/docs/linux_build_instructions.md#setting-up-the-build
|
||||
[docs/linux/hw_video_decode.md]: https://chromium.googlesource.com/chromium/src/+/HEAD/docs/linux/hw_video_decode.md
|
||||
[Linux build setup]: https://chromium.googlesource.com/chromium/src/+/HEAD/docs/linux/build_instructions.md
|
||||
[Setting up the build]: https://chromium.googlesource.com/chromium/src/+/HEAD/docs/linux/build_instructions.md#setting-up-the-build
|
||||
|
@ -137,7 +137,7 @@ Ensure you are using GDB on Linux, not LLDB.
|
||||
|
||||
Linux :
|
||||
See
|
||||
https://chromium.googlesource.com/chromium/src/+/master/docs/linux_debugging.md
|
||||
https://chromium.googlesource.com/chromium/src/+/master/docs/linux/debugging.md
|
||||
|
||||
macOS :
|
||||
https://dev.chromium.org/developers/how-tos/debugging-on-os-x
|
||||
|
@ -70,4 +70,4 @@ in Gerrit.
|
||||
[clang_code_coverage_wrapper]: clang_code_coverage_wrapper.md
|
||||
[chromium-coverage Gerrit plugin]: https://chromium.googlesource.com/infra/gerrit-plugins/code-coverage/
|
||||
[Chromium on Chromium OS]: https://chromium.googlesource.com/chromium/src/+/master/docs/chromeos_build_instructions.md
|
||||
[Chromium on Linux]: https://chromium.googlesource.com/chromium/src/+/master/docs/linux_build_instructions.md
|
||||
[Chromium on Linux]: https://chromium.googlesource.com/chromium/src/+/master/docs/linux/build_instructions.md
|
||||
|
@ -1,6 +1,6 @@
|
||||
# Running web tests on Linux
|
||||
|
||||
1. Build `blink_tests` (see [Linux-specific build instructions](https://chromium.googlesource.com/chromium/src/+/master/docs/linux_build_instructions.md))
|
||||
1. Build `blink_tests` (see [Linux-specific build instructions](https://chromium.googlesource.com/chromium/src/+/master/docs/linux/build_instructions.md))
|
||||
1. Checkout the web tests
|
||||
* If you have an entry in your `.gclient` file that includes
|
||||
"web_tests", you may need to comment it out and sync.
|
||||
|
@ -292,7 +292,7 @@ class HEADLESS_EXPORT HeadlessBrowser::Options::Builder {
|
||||
// }
|
||||
//
|
||||
// [1]
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_zygote.md
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/zygote.md
|
||||
void RunChildProcessIfNeeded(int argc, const char** argv);
|
||||
#else
|
||||
// In Windows, the headless browser may need to create child processes. This is
|
||||
|
@ -114,7 +114,7 @@ void WriteTimeStruct(base::Pickle* pickle, const struct tm& time) {
|
||||
}
|
||||
|
||||
// See
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_zygote.md
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/zygote.md
|
||||
void ProxyLocaltimeCallToBrowser(time_t input,
|
||||
struct tm* output,
|
||||
char* timezone_out,
|
||||
|
@ -32,7 +32,7 @@ namespace sandbox {
|
||||
//
|
||||
// Our replacement functions must handle both cases, and either proxy the call
|
||||
// to the parent over the IPC back-channel (see
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_sandbox_ipc.md)
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/sandbox_ipc.md)
|
||||
// or use dlsym with RTLD_NEXT to resolve the symbol, ignoring any symbols in
|
||||
// the current module. Use SetUseLocaltimeOverride() and SetAmZygoteOrRenderer()
|
||||
// below to control the mode of operation, which defaults using the dlsym
|
||||
|
@ -128,7 +128,7 @@ base::FilePath SetuidSandboxHost::GetSandboxBinaryPath() {
|
||||
|
||||
// In user-managed builds, including development builds, an environment
|
||||
// variable is required to enable the sandbox. See
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_suid_sandbox_development.md
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/suid_sandbox_development.md
|
||||
struct stat st;
|
||||
if (sandbox_binary.empty() && stat(base::kProcSelfExe, &st) == 0 &&
|
||||
st.st_uid == getuid()) {
|
||||
|
@ -2,7 +2,7 @@
|
||||
// Use of this source code is governed by a BSD-style license that can be
|
||||
// found in the LICENSE file.
|
||||
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_suid_sandbox.md
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/suid_sandbox.md
|
||||
|
||||
#include "sandbox/linux/suid/common/sandbox.h"
|
||||
|
||||
@ -403,7 +403,7 @@ bool CheckAndExportApiVersion() {
|
||||
"The setuid sandbox provides API version %d, "
|
||||
"but you need %d\n"
|
||||
"Please read "
|
||||
"https://chromium.googlesource.com/chromium/src/+/master/docs/linux_suid_sandbox_development.md."
|
||||
"https://chromium.googlesource.com/chromium/src/+/master/docs/linux/suid_sandbox_development.md."
|
||||
"\n\n",
|
||||
kSUIDSandboxApiNumber,
|
||||
api_number);
|
||||
|
@ -11,7 +11,7 @@ namespace service_manager {
|
||||
// base::GlobalDescriptors object (see base/posix/global_descriptors.h)
|
||||
enum {
|
||||
kCrashDumpSignal = 0,
|
||||
kSandboxIPCChannel, // https://chromium.googlesource.com/chromium/src/+/master/docs/linux_sandbox_ipc.md
|
||||
kSandboxIPCChannel, // https://chromium.googlesource.com/chromium/src/+/master/docs/linux/sandbox_ipc.md
|
||||
kMojoIPCChannel,
|
||||
kFieldTrialDescriptor,
|
||||
|
||||
|
@ -52,7 +52,7 @@ class SERVICE_MANAGER_SANDBOX_EXPORT SandboxLinux {
|
||||
public:
|
||||
// This is a list of sandbox IPC methods which the renderer may send to the
|
||||
// sandbox host. See
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_sandbox_ipc.md
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/sandbox_ipc.md
|
||||
// This isn't the full list, values < 32 are reserved for methods called from
|
||||
// Skia, and values < 64 are reserved for libc_interceptor.cc.
|
||||
enum LinuxSandboxIPCMethods {
|
||||
|
@ -28,7 +28,7 @@ namespace service_manager {
|
||||
|
||||
// Handles interprocess communication with the Linux zygote process. The zygote
|
||||
// does not use standard Chrome IPC or mojo, see:
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_sandbox_ipc.md
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/sandbox_ipc.md
|
||||
class COMPONENT_EXPORT(SERVICE_MANAGER_ZYGOTE) ZygoteCommunication {
|
||||
public:
|
||||
ZygoteCommunication();
|
||||
|
@ -116,7 +116,7 @@ void ZygoteHostImpl::Init(const base::CommandLine& command_line) {
|
||||
LOG(FATAL)
|
||||
<< "No usable sandbox! Update your kernel or see "
|
||||
"https://chromium.googlesource.com/chromium/src/+/master/"
|
||||
"docs/linux_suid_sandbox_development.md for more information on "
|
||||
"docs/linux/suid_sandbox_development.md for more information on "
|
||||
"developing with the SUID sandbox. "
|
||||
"If you want to live dangerously and need an immediate workaround, "
|
||||
"you can try using --"
|
||||
|
@ -12,7 +12,7 @@
|
||||
|
||||
namespace service_manager {
|
||||
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_zygote.md
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/zygote.md
|
||||
|
||||
// The zygote host is an interface, in the browser process, to the zygote
|
||||
// process.
|
||||
|
@ -47,7 +47,7 @@
|
||||
#include "third_party/icu/source/i18n/unicode/timezone.h"
|
||||
|
||||
// See
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_zygote.md
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/zygote.md
|
||||
|
||||
namespace service_manager {
|
||||
|
||||
@ -99,7 +99,7 @@ bool Zygote::ProcessRequests() {
|
||||
// browser on it.
|
||||
// A SOCK_DGRAM is installed in fd 5. This is the sandbox IPC channel.
|
||||
// See
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_sandbox_ipc.md
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/sandbox_ipc.md
|
||||
|
||||
// We need to accept SIGCHLD, even though our handler is a no-op because
|
||||
// otherwise we cannot wait on children. (According to POSIX 2001.)
|
||||
|
@ -143,7 +143,7 @@ class Zygote {
|
||||
std::vector<ZygoteProcessInfo> to_reap_;
|
||||
|
||||
// Sandbox IPC channel for renderers to invoke services from the browser. See
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_sandbox_ipc.md
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/sandbox_ipc.md
|
||||
base::GlobalDescriptors::Descriptor ipc_backchannel_;
|
||||
};
|
||||
|
||||
|
@ -109,7 +109,7 @@ static bool EnterSuidSandbox(sandbox::SetuidSandboxClient* setuid_sandbox,
|
||||
LOG(WARNING) << "You are using a wrong version of the setuid binary!\n"
|
||||
"Please read "
|
||||
"https://chromium.googlesource.com/chromium/src/+/master/"
|
||||
"docs/linux_suid_sandbox_development.md."
|
||||
"docs/linux/suid_sandbox_development.md."
|
||||
"\n\n";
|
||||
}
|
||||
|
||||
|
@ -41259,7 +41259,7 @@ http://www.faqs.org/docs/electric/DC/DC_6.html
|
||||
http://www.faqs.org/docs/electric/Digital/DIGI_3.html
|
||||
http://www.faqs.org/docs/electric/Semi/SEMI_9.html
|
||||
http://www.faqs.org/docs/factbook/fields/2032.html
|
||||
http://www.faqs.org/docs/linux_network/x-087-2-resolv.library.html
|
||||
http://www.faqs.org/docs/linux/network/x-087-2-resolv.library.html
|
||||
http://www.faqs.org/docs/think_java/TIJ307.htm
|
||||
http://www.faqs.org/docs/thinkjava/chap02.htm
|
||||
http://www.faqs.org/docs/thinkjava/chap04.htm
|
||||
|
@ -44,7 +44,7 @@ struct WebFontRenderStyle;
|
||||
|
||||
// Put methods here that are required due to sandbox restrictions.
|
||||
// These are currently only implemented only on Linux:
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux_sandbox_ipc.md
|
||||
// https://chromium.googlesource.com/chromium/src/+/master/docs/linux/sandbox_ipc.md
|
||||
class WebSandboxSupport {
|
||||
public:
|
||||
virtual ~WebSandboxSupport() {}
|
||||
|
@ -46,7 +46,7 @@ class LinuxPort(base.Port):
|
||||
FALLBACK_PATHS = {}
|
||||
FALLBACK_PATHS['trusty'] = ['linux'] + win.WinPort.latest_platform_fallback_path()
|
||||
|
||||
BUILD_REQUIREMENTS_URL = 'https://chromium.googlesource.com/chromium/src/+/master/docs/linux_build_instructions.md'
|
||||
BUILD_REQUIREMENTS_URL = 'https://chromium.googlesource.com/chromium/src/+/master/docs/linux/build_instructions.md'
|
||||
|
||||
XVFB_START_STOP_TIMEOUT = 5.0 # Wait up to 5 seconds for Xvfb to start or stop.
|
||||
|
||||
@ -84,7 +84,7 @@ class LinuxPort(base.Port):
|
||||
if result:
|
||||
_log.error('For complete Linux build requirements, please see:')
|
||||
_log.error('')
|
||||
_log.error(' https://chromium.googlesource.com/chromium/src/+/master/docs/linux_build_instructions.md')
|
||||
_log.error(' https://chromium.googlesource.com/chromium/src/+/master/docs/linux/build_instructions.md')
|
||||
return result
|
||||
|
||||
def look_for_new_crash_logs(self, crashed_processes, start_time):
|
||||
|
Reference in New Issue
Block a user