I have read several articles about the "Android Security Model" (1, 2, 3 and more). I understand the theoretical MAC model of permissions, and most of what is relevant for application development. But there is seemingly very little documentation about extensive low-level details of:
- How permissions are ACTUALLY enforced at system-level. That is, using JNI, what will stop me from directly accessing hardware such as the GPS? (I realize there might be a fallback on linux documentation, unrelated to Android, answering this, or an even more general and classic OS solution to this problem).
- What actually happens on the execution stack and which functions are called when utilizing Android ICC.
Can anybody refer me to an explaination and/or relevant code segments from Android?
//EDIT: To clarify things (because it seems commenters were confused), the question in the title is split here in two seperate (quite different) questions. The first answer here indeed answers the first question, regarding low-level mechanisms that exist in ARM processor (thanks). The second question regarding ICC procedure calls remains unanswered...