diff options
author | jfb@chromium.org <jfb@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-02-09 03:04:06 +0000 |
---|---|---|
committer | jfb@chromium.org <jfb@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-02-09 03:04:06 +0000 |
commit | 7181490e6efe64c54cd00eae9863a7225a08ca5c (patch) | |
tree | 6eb41d87c392fcb9798b3cc43979ed9ab4161999 | |
parent | 34b0ef121af4fc678535f72a82c268bf22186503 (diff) | |
download | chromium_src-7181490e6efe64c54cd00eae9863a7225a08ca5c.zip chromium_src-7181490e6efe64c54cd00eae9863a7225a08ca5c.tar.gz chromium_src-7181490e6efe64c54cd00eae9863a7225a08ca5c.tar.bz2 |
NaCl docs: fix a few more issues with the ARM sandbox documentation.
Fix some comments I had missed in:
https://codereview.chromium.org/147803003/
R= binji@chromium.org, sbc@chromium.org, awatson@chromium.org, mackinlay@chromium.org
BUG= none
TEST= none
NOTRY=true
(documentation only change)
Review URL: https://codereview.chromium.org/144253005
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@249972 0039d316-1c4b-4281-b951-d872f2087c98
6 files changed, 36 insertions, 26 deletions
diff --git a/chrome/common/extensions/docs/templates/json/chrome_sidenav.json b/chrome/common/extensions/docs/templates/json/chrome_sidenav.json index c00cb77..47aebf1 100644 --- a/chrome/common/extensions/docs/templates/json/chrome_sidenav.json +++ b/chrome/common/extensions/docs/templates/json/chrome_sidenav.json @@ -830,6 +830,16 @@ { "title": "Previous Versions", "href": "/native-client/version.html" + }, + { + "title": "Sandbox Internals", + "href": "/native-client/reference/sandbox_internals/index.html", + "items": [ + { + "title": "ARM 32-bit Sandbox", + "href": "/native-client/reference/sandbox_internals/arm-32-bit-sandbox.html" + } + ] } ] }, diff --git a/native_client_sdk/doc_generated/_static/pygments.css b/native_client_sdk/doc_generated/_static/pygments.css index 1a14f2a..d79caa1 100644 --- a/native_client_sdk/doc_generated/_static/pygments.css +++ b/native_client_sdk/doc_generated/_static/pygments.css @@ -13,11 +13,11 @@ .highlight .gr { color: #FF0000 } /* Generic.Error */ .highlight .gh { color: #000080; font-weight: bold } /* Generic.Heading */ .highlight .gi { color: #00A000 } /* Generic.Inserted */ -.highlight .go { color: #303030 } /* Generic.Output */ +.highlight .go { color: #333333 } /* Generic.Output */ .highlight .gp { color: #c65d09; font-weight: bold } /* Generic.Prompt */ .highlight .gs { font-weight: bold } /* Generic.Strong */ .highlight .gu { color: #800080; font-weight: bold } /* Generic.Subheading */ -.highlight .gt { color: #0040D0 } /* Generic.Traceback */ +.highlight .gt { color: #0044DD } /* Generic.Traceback */ .highlight .kc { color: #007020; font-weight: bold } /* Keyword.Constant */ .highlight .kd { color: #007020; font-weight: bold } /* Keyword.Declaration */ .highlight .kn { color: #007020; font-weight: bold } /* Keyword.Namespace */ diff --git a/native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html b/native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html index a43d829..1ae4041 100644 --- a/native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html +++ b/native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html @@ -2,13 +2,13 @@ <section id="arm-32-bit-sandbox"> <h1 id="arm-32-bit-sandbox">ARM 32-bit Sandbox</h1> -<p>Native Client for ARM is a method for running programs—even malicious -ones—safely, on computers that use 32-bit ARM processors. It’s an -extension of earlier work on Native Client for x86 processors. This -security is provided with a low performance overhead of about 10% over -regular ARM code, and as you’ll see in this document the sandbox model -is beautifully simple, meaning that the trusted codebase is much easier -to validate.</p> +<p>Native Client for ARM is a sandboxing technology for running +programs—even malicious ones—safely, on computers that use 32-bit +ARM processors. The ARM sandbox is an extension of earlier work on +Native Client for x86 processors. Security is provided with a low +performance overhead of about 10% over regular ARM code, and as you’ll +see in this document the sandbox model is beautifully simple, meaning +that the trusted codebase is much easier to validate.</p> <p>As an implementation detail, the Native Client 32-bit ARM sandbox is currently used by Portable Native Client to execute code on 32-bit ARM machines in a safe manner. The portable bitcode contained in a <strong>pexe</strong> diff --git a/native_client_sdk/doc_generated/reference/sandbox_internals/index.html b/native_client_sdk/doc_generated/reference/sandbox_internals/index.html index 350449a..efaac94 100644 --- a/native_client_sdk/doc_generated/reference/sandbox_internals/index.html +++ b/native_client_sdk/doc_generated/reference/sandbox_internals/index.html @@ -2,11 +2,11 @@ <section id="sandbox-internals"> <span id="sandbox-internals-index"></span><h1 id="sandbox-internals"><span id="sandbox-internals-index"></span>Sandbox Internals</h1> -<p>The sandbox internals explains implementation details about Native -Client sandboxing, which is also used by Portable Native Client. These -details can be useful to reimplement a sandbox, or to write assembly -code that follows sandboxing rules for Native Client (Portable Native -Client doesn’t allow developers to write platform-specific assembly).</p> +<p>The sandbox internals documentation describes implementation details for +Native Client sandboxing, which is also used by Portable Native +Client. These details can be useful to reimplement a sandbox, or to +write assembly code that follows sandboxing rules for Native Client +(Portable Native Client does not allow platform-specific assembly code).</p> </section> {{/partials.standard_nacl_article}} diff --git a/native_client_sdk/src/doc/reference/sandbox_internals/arm-32-bit-sandbox.rst b/native_client_sdk/src/doc/reference/sandbox_internals/arm-32-bit-sandbox.rst index 6e8eb1a..77ff417f 100644 --- a/native_client_sdk/src/doc/reference/sandbox_internals/arm-32-bit-sandbox.rst +++ b/native_client_sdk/src/doc/reference/sandbox_internals/arm-32-bit-sandbox.rst @@ -2,13 +2,13 @@ ARM 32-bit Sandbox ================== -Native Client for ARM is a method for running programs---even malicious -ones---safely, on computers that use 32-bit ARM processors. It's an -extension of earlier work on Native Client for x86 processors. This -security is provided with a low performance overhead of about 10% over -regular ARM code, and as you'll see in this document the sandbox model -is beautifully simple, meaning that the trusted codebase is much easier -to validate. +Native Client for ARM is a sandboxing technology for running +programs---even malicious ones---safely, on computers that use 32-bit +ARM processors. The ARM sandbox is an extension of earlier work on +Native Client for x86 processors. Security is provided with a low +performance overhead of about 10% over regular ARM code, and as you'll +see in this document the sandbox model is beautifully simple, meaning +that the trusted codebase is much easier to validate. As an implementation detail, the Native Client 32-bit ARM sandbox is currently used by Portable Native Client to execute code on 32-bit ARM diff --git a/native_client_sdk/src/doc/reference/sandbox_internals/index.rst b/native_client_sdk/src/doc/reference/sandbox_internals/index.rst index 225c4e7..3b5670d 100644 --- a/native_client_sdk/src/doc/reference/sandbox_internals/index.rst +++ b/native_client_sdk/src/doc/reference/sandbox_internals/index.rst @@ -4,8 +4,8 @@ Sandbox Internals ################# -The sandbox internals explains implementation details about Native -Client sandboxing, which is also used by Portable Native Client. These -details can be useful to reimplement a sandbox, or to write assembly -code that follows sandboxing rules for Native Client (Portable Native -Client doesn't allow developers to write platform-specific assembly). +The sandbox internals documentation describes implementation details for +Native Client sandboxing, which is also used by Portable Native +Client. These details can be useful to reimplement a sandbox, or to +write assembly code that follows sandboxing rules for Native Client +(Portable Native Client does not allow platform-specific assembly code). |