Index: native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html |
diff --git a/native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html b/native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html |
index 1ae40419148da7b3b5b288c2da6ccf378442daf5..a048d17f391ed1c584a570d1f5897f4d1d521aab 100644 |
--- a/native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html |
+++ b/native_client_sdk/doc_generated/reference/sandbox_internals/arm-32-bit-sandbox.html |
@@ -411,9 +411,9 @@ the possible places that any <em>indirect branch</em> can land. On Native |
Client for ARM, <em>indirect branch</em> can target any address that has its |
bottom four bits clear—any address that’s <code>0 mod 16</code>. We call these |
16-byte chunks of code “bundles”. The validator makes sure that no |
-pseudo-instruction straddles a bundle boundary. Compilers must pad with` |
-<cite>nop`</cite>s to ensure that every pseudo-instruction fits entirely inside |
-one bundle.</p> |
+pseudo-instruction straddles a bundle boundary. Compilers must pad with |
+<code>nop</code> to ensure that every pseudo-instruction fits entirely inside one |
+bundle.</p> |
<p>Here is the <em>indirect branch</em> pseudo-instruction. As you can see, it |
clears the top two and bottom four bits of the address:</p> |
<pre> |
@@ -580,6 +580,7 @@ way, if an <em>indirect branch</em> tries to enter the data bundle, the process |
will take a fault and the trusted runtime will intervene (by terminating |
the program). For example:</p> |
<pre> |
+.p2align 4 |
bkpt #0x5BE0 ; Must be aligned 0 mod 16! |
.word 0xDEADBEEF ; Arbitrary constants are A-OK. |
svc #30 ; Trying to make a syscall? OK! |