File: arm_sandboxing.md

package info (click to toggle)
chromium-browser 57.0.2987.98-1~deb8u1
  • links: PTS, VCS
  • area: main
  • in suites: jessie
  • size: 2,637,852 kB
  • ctags: 2,544,394
  • sloc: cpp: 12,815,961; ansic: 3,676,222; python: 1,147,112; asm: 526,608; java: 523,212; xml: 286,794; perl: 92,654; sh: 86,408; objc: 73,271; makefile: 27,698; cs: 18,487; yacc: 13,031; tcl: 12,957; pascal: 4,875; ml: 4,716; lex: 3,904; sql: 3,862; ruby: 1,982; lisp: 1,508; php: 1,368; exp: 404; awk: 325; csh: 117; jsp: 39; sed: 37
file content (27 lines) | stat: -rw-r--r-- 494 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
## Function return

C code: `void foo() {}
`

Disassembly fragment: `0: e3cee2ff bic lr, lr, #-268435441 ; 0xf000000f 4:
e12fff1e bx lr
`

## Memory read

C code: `int get_word(int *x) { return *x; }
`

Disassembly fragment: `0: e5900000 ldr r0, [r0]
`

Read sandboxing is off by default, so this is the usual ARM instruction.

## Memory write

C code: `int put_word(int *x) { *x = 0x100; }
`

Disassembly fragment: `4: e3c00103 bic r0, r0, #-1073741824 ; 0xc0000000 8:
e5801000 str r1, [r0]
`