Thank you for your answers
It it the "user space" limitation that disallow the "well" defined jump to corrumpt ARM stack ?
Do all core have the same right access ?
Do all core have the same stack ? (well stupid question...)
Corrupt "stack3" then corrupt "stack2" then corrupt "stack1" then corrupt "stack0" (ARM) then "profits" ?
I thought the web browser exploit can make a stack attack ? (what core ?)This means that only the Cafe OS kernel gets direct access to the IPC memory region.
It it the "user space" limitation that disallow the "well" defined jump to corrumpt ARM stack ?
Do all core have the same right access ?
Do all core have the same stack ? (well stupid question...)
Corrupt "stack3" then corrupt "stack2" then corrupt "stack1" then corrupt "stack0" (ARM) then "profits" ?