3 Followers
19 Following
6 Posts
My sheet is a joke

@BednarTildeOne

Hello Michal,

I recently read your excellent write-up, ResourcePoison

I observed what seems like an unusual construction pattern in LoadedApk.java. Specifically, the Shellcode class appears to be constructed twice in the following locations within the file:

- https://cs.android.com/android/platform/superproject/main/+/main:frameworks/base/core/java/android/app/LoadedApk.java;drc=50f34b45baed2ec3a256f1c65df4865d72452768;l=376

- https://cs.android.com/android/platform/superproject/main/+/main:frameworks/base/core/java/android/app/LoadedApk.java;drc=50f34b45baed2ec3a256f1c65df4865d72452768;l=393

I am wondering if this double construction is a result of the Proof-of-Concept (PoC) leveraging an unusual execution flow, or if this behavior is an intentional design (or perhaps an unintentional error) within the Android Open Source Project (AOSP) code itself.