Conversation

Replying to
Can see where it's enabled here: android.googlesource.com/platform/syste init then gives itself the gid exception, and adb has and exception too: android.googlesource.com/platform/syste Also used to gate access to low-level IPC APIs offering similar information. It's a nice example of how to deploy it.
2
Show replies
Replying to and
Fallout of app developers complaining about needing to use more restricted higher-level OS APIs gated by permissions like developer.android.com/reference/andr: issuetracker.google.com/issues/37091475 There's a hidepid gid option used for internal exceptions but it's too coarse/problematic for a permission.
2
2
Replying to and
SELinux is also used to whitelist access to the individual /proc and /sys APIs. I helped push for /proc/net to be unavailable to most apps. It's only available for user authorized VPN service apps now. Only a couple very specific things in /sys are usable and debugfs is banned.
1