On 04/27/2012 06:19 PM, Chris Stratton wrote: > On Friday, April 27, 2012 2:08:45 AM UTC-4, andria wrote: > My suspicion is that as a matter of convenience each thread would have it's > own VM registers, but I am confident that any thread within a process can > discover the values of the DVM registers, at least to the degree they exist > in memory (vs. being optimized away by JIT), for any given build of the DVM > which an exploit author has chosen to study in detail. I'd expect an > exploit author could also preclude the use of JIT in order to make the task > simpler.
Thanks, that clarifies things a bit. > At any rate (and I missed this too when first replying) the question is off > topic for the Kernel group, as Dalvik is not part of the kernel and does > not run in kernel mode. As far as the kernel is concerned, a DVM is just a > random user-mode process. Ok. I suspect 'android-platform' would be a better place, right?
signature.asc
Description: OpenPGP digital signature