summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorjfb@chromium.org <jfb@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2014-02-09 03:04:06 +0000
committerjfb@chromium.org <jfb@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2014-02-09 03:04:06 +0000
commit7181490e6efe64c54cd00eae9863a7225a08ca5c (patch)
tree6eb41d87c392fcb9798b3cc43979ed9ab4161999
parent34b0ef121af4fc678535f72a82c268bf22186503 (diff)
downloadchromium_src-7181490e6efe64c54cd00eae9863a7225a08ca5c.zip
chromium_src-7181490e6efe64c54cd00eae9863a7225a08ca5c.tar.gz
chromium_src-7181490e6efe64c54cd00eae9863a7225a08ca5c.tar.bz2
NaCl docs: fix a few more issues with the ARM sandbox documentation.
Fix some comments I had missed in: https://codereview.chromium.org/147803003/ R= binji@chromium.org, sbc@chromium.org, awatson@chromium.org, mackinlay@chromium.org BUG= none TEST= none NOTRY=true (documentation only change) Review URL: https://codereview.chromium.org/144253005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@249972 0039d316-1c4b-4281-b951-d872f2087c98
-rw-r--r--chrome/common/extensions/docs/templates/json/chrome_sidenav.json10
-rw-r--r--native_client_sdk/doc_generated/_static/pygments.css4
-rw-r--r--native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html14
-rw-r--r--native_client_sdk/doc_generated/reference/sandbox_internals/index.html10
-rw-r--r--native_client_sdk/src/doc/reference/sandbox_internals/arm-32-bit-sandbox.rst14
-rw-r--r--native_client_sdk/src/doc/reference/sandbox_internals/index.rst10
6 files changed, 36 insertions, 26 deletions
diff --git a/chrome/common/extensions/docs/templates/json/chrome_sidenav.json b/chrome/common/extensions/docs/templates/json/chrome_sidenav.json
index c00cb77..47aebf1 100644
--- a/chrome/common/extensions/docs/templates/json/chrome_sidenav.json
+++ b/chrome/common/extensions/docs/templates/json/chrome_sidenav.json
@@ -830,6 +830,16 @@
{
"title": "Previous Versions",
"href": "/native-client/version.html"
+ },
+ {
+ "title": "Sandbox Internals",
+ "href": "/native-client/reference/sandbox_internals/index.html",
+ "items": [
+ {
+ "title": "ARM 32-bit Sandbox",
+ "href": "/native-client/reference/sandbox_internals/arm-32-bit-sandbox.html"
+ }
+ ]
}
]
},
diff --git a/native_client_sdk/doc_generated/_static/pygments.css b/native_client_sdk/doc_generated/_static/pygments.css
index 1a14f2a..d79caa1 100644
--- a/native_client_sdk/doc_generated/_static/pygments.css
+++ b/native_client_sdk/doc_generated/_static/pygments.css
@@ -13,11 +13,11 @@
.highlight .gr { color: #FF0000 } /* Generic.Error */
.highlight .gh { color: #000080; font-weight: bold } /* Generic.Heading */
.highlight .gi { color: #00A000 } /* Generic.Inserted */
-.highlight .go { color: #303030 } /* Generic.Output */
+.highlight .go { color: #333333 } /* Generic.Output */
.highlight .gp { color: #c65d09; font-weight: bold } /* Generic.Prompt */
.highlight .gs { font-weight: bold } /* Generic.Strong */
.highlight .gu { color: #800080; font-weight: bold } /* Generic.Subheading */
-.highlight .gt { color: #0040D0 } /* Generic.Traceback */
+.highlight .gt { color: #0044DD } /* Generic.Traceback */
.highlight .kc { color: #007020; font-weight: bold } /* Keyword.Constant */
.highlight .kd { color: #007020; font-weight: bold } /* Keyword.Declaration */
.highlight .kn { color: #007020; font-weight: bold } /* Keyword.Namespace */
diff --git a/native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html b/native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html
index a43d829..1ae4041 100644
--- a/native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html
+++ b/native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html
@@ -2,13 +2,13 @@
<section id="arm-32-bit-sandbox">
<h1 id="arm-32-bit-sandbox">ARM 32-bit Sandbox</h1>
-<p>Native Client for ARM is a method for running programs&#8212;even malicious
-ones&#8212;safely, on computers that use 32-bit ARM processors. It&#8217;s an
-extension of earlier work on Native Client for x86 processors. This
-security is provided with a low performance overhead of about 10% over
-regular ARM code, and as you&#8217;ll see in this document the sandbox model
-is beautifully simple, meaning that the trusted codebase is much easier
-to validate.</p>
+<p>Native Client for ARM is a sandboxing technology for running
+programs&#8212;even malicious ones&#8212;safely, on computers that use 32-bit
+ARM processors. The ARM sandbox is an extension of earlier work on
+Native Client for x86 processors. Security is provided with a low
+performance overhead of about 10% over regular ARM code, and as you&#8217;ll
+see in this document the sandbox model is beautifully simple, meaning
+that the trusted codebase is much easier to validate.</p>
<p>As an implementation detail, the Native Client 32-bit ARM sandbox is
currently used by Portable Native Client to execute code on 32-bit ARM
machines in a safe manner. The portable bitcode contained in a <strong>pexe</strong>
diff --git a/native_client_sdk/doc_generated/reference/sandbox_internals/index.html b/native_client_sdk/doc_generated/reference/sandbox_internals/index.html
index 350449a..efaac94 100644
--- a/native_client_sdk/doc_generated/reference/sandbox_internals/index.html
+++ b/native_client_sdk/doc_generated/reference/sandbox_internals/index.html
@@ -2,11 +2,11 @@
<section id="sandbox-internals">
<span id="sandbox-internals-index"></span><h1 id="sandbox-internals"><span id="sandbox-internals-index"></span>Sandbox Internals</h1>
-<p>The sandbox internals explains implementation details about Native
-Client sandboxing, which is also used by Portable Native Client. These
-details can be useful to reimplement a sandbox, or to write assembly
-code that follows sandboxing rules for Native Client (Portable Native
-Client doesn&#8217;t allow developers to write platform-specific assembly).</p>
+<p>The sandbox internals documentation describes implementation details for
+Native Client sandboxing, which is also used by Portable Native
+Client. These details can be useful to reimplement a sandbox, or to
+write assembly code that follows sandboxing rules for Native Client
+(Portable Native Client does not allow platform-specific assembly code).</p>
</section>
{{/partials.standard_nacl_article}}
diff --git a/native_client_sdk/src/doc/reference/sandbox_internals/arm-32-bit-sandbox.rst b/native_client_sdk/src/doc/reference/sandbox_internals/arm-32-bit-sandbox.rst
index 6e8eb1a..77ff417f 100644
--- a/native_client_sdk/src/doc/reference/sandbox_internals/arm-32-bit-sandbox.rst
+++ b/native_client_sdk/src/doc/reference/sandbox_internals/arm-32-bit-sandbox.rst
@@ -2,13 +2,13 @@
ARM 32-bit Sandbox
==================
-Native Client for ARM is a method for running programs---even malicious
-ones---safely, on computers that use 32-bit ARM processors. It's an
-extension of earlier work on Native Client for x86 processors. This
-security is provided with a low performance overhead of about 10% over
-regular ARM code, and as you'll see in this document the sandbox model
-is beautifully simple, meaning that the trusted codebase is much easier
-to validate.
+Native Client for ARM is a sandboxing technology for running
+programs---even malicious ones---safely, on computers that use 32-bit
+ARM processors. The ARM sandbox is an extension of earlier work on
+Native Client for x86 processors. Security is provided with a low
+performance overhead of about 10% over regular ARM code, and as you'll
+see in this document the sandbox model is beautifully simple, meaning
+that the trusted codebase is much easier to validate.
As an implementation detail, the Native Client 32-bit ARM sandbox is
currently used by Portable Native Client to execute code on 32-bit ARM
diff --git a/native_client_sdk/src/doc/reference/sandbox_internals/index.rst b/native_client_sdk/src/doc/reference/sandbox_internals/index.rst
index 225c4e7..3b5670d 100644
--- a/native_client_sdk/src/doc/reference/sandbox_internals/index.rst
+++ b/native_client_sdk/src/doc/reference/sandbox_internals/index.rst
@@ -4,8 +4,8 @@
Sandbox Internals
#################
-The sandbox internals explains implementation details about Native
-Client sandboxing, which is also used by Portable Native Client. These
-details can be useful to reimplement a sandbox, or to write assembly
-code that follows sandboxing rules for Native Client (Portable Native
-Client doesn't allow developers to write platform-specific assembly).
+The sandbox internals documentation describes implementation details for
+Native Client sandboxing, which is also used by Portable Native
+Client. These details can be useful to reimplement a sandbox, or to
+write assembly code that follows sandboxing rules for Native Client
+(Portable Native Client does not allow platform-specific assembly code).