| Index: native_client_sdk/doc_generated/reference/ideas.html
|
| diff --git a/native_client_sdk/doc_generated/reference/ideas.html b/native_client_sdk/doc_generated/reference/ideas.html
|
| index 69422c76faea5ecb0dc8cbd43af6ba6cb8b8f3b4..c611b5f22067ad8670f2d2af525b370408b2238c 100644
|
| --- a/native_client_sdk/doc_generated/reference/ideas.html
|
| +++ b/native_client_sdk/doc_generated/reference/ideas.html
|
| @@ -33,13 +33,14 @@
|
| <li><a class="reference internal" href="#vector-support" id="id27">Vector Support</a></li>
|
| <li><a class="reference internal" href="#atomics" id="id28">Atomics</a></li>
|
| <li><a class="reference internal" href="#security-enhanced-pnacl" id="id29">Security-enhanced PNaCl</a></li>
|
| +<li><a class="reference internal" href="#sanitizer-support" id="id30">Sanitizer Support</a></li>
|
| </ul>
|
| </li>
|
| -<li><p class="first"><a class="reference internal" href="#nacl" id="id30">NaCl</a></p>
|
| +<li><p class="first"><a class="reference internal" href="#nacl" id="id31">NaCl</a></p>
|
| <ul class="small-gap">
|
| -<li><a class="reference internal" href="#auto-sandboxing" id="id31">Auto-Sandboxing</a></li>
|
| -<li><a class="reference internal" href="#new-sandbox" id="id32">New Sandbox</a></li>
|
| -<li><a class="reference internal" href="#bit-sandbox" id="id33">64-bit Sandbox</a></li>
|
| +<li><a class="reference internal" href="#auto-sandboxing" id="id32">Auto-Sandboxing</a></li>
|
| +<li><a class="reference internal" href="#new-sandbox" id="id33">New Sandbox</a></li>
|
| +<li><a class="reference internal" href="#bit-sandbox" id="id34">64-bit Sandbox</a></li>
|
| </ul>
|
| </li>
|
| </ul>
|
| @@ -287,6 +288,20 @@ a review with the Chrome security team.</li>
|
| <li><strong>Knowledge Prerequisite:</strong> Security.</li>
|
| <li><strong>Mentor:</strong> JF Bastien.</li>
|
| </ul>
|
| +<h4 id="sanitizer-support">Sanitizer Support</h4>
|
| +<ul class="small-gap">
|
| +<li><strong>Project:</strong> Sanitizer support for untrusted code.</li>
|
| +<li><strong>Brief explanation:</strong> LLVM supports many <a class="reference external" href="http://clang.llvm.org/docs/UsersManual.html#controlling-code-generation">sanitizers</a> for C/C++ using the
|
| +<code>-fsanitize=<name></code>. Some of these sanitizers currently work, and some don’t
|
| +because they use clever tricks to perform their work, such as using <code>mmap</code>
|
| +to allocate a special shadow memory region with a specific address. This
|
| +project requires adding full support to all of LLVM’s sanitizers for untrusted
|
| +user code within PNaCl.</li>
|
| +<li><strong>Expected results:</strong> The sanitizer tests successfully run as untrusted code
|
| +within PNaCl.</li>
|
| +<li><strong>Knowledge Prerequisite:</strong> Compilers.</li>
|
| +<li><strong>Mentor:</strong> JF Bastien.</li>
|
| +</ul>
|
| <h3 id="nacl">NaCl</h3>
|
| <h4 id="auto-sandboxing">Auto-Sandboxing</h4>
|
| <ul class="small-gap">
|
|
|