On 04/27/2012 06:19 PM, Chris Stratton wrote:
> On Friday, April 27, 2012 2:08:45 AM UTC-4, andria wrote:
> My suspicion is that as a matter of convenience each thread would have it's 
> own VM registers, but I am confident that any thread within a process can 
> discover the values of the DVM registers, at least to the degree they exist 
> in memory (vs. being optimized away by JIT), for any given build of the DVM 
> which an exploit author has chosen to study in detail.  I'd expect an 
> exploit author could also preclude the use of JIT in order to make the task 
> simpler.

Thanks, that clarifies things a bit.

> At any rate (and I missed this too when first replying) the question is off 
> topic for the Kernel group, as Dalvik is not part of the kernel and does 
> not run in kernel mode.  As far as the kernel is concerned, a DVM is just a 
> random user-mode process.

Ok. I suspect 'android-platform' would be a better place, right?

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to