Conversation

Replying to
I helped to upstream hidepid=2 in Android a few years ago. It's largely obsoleted now that API 28+ apps each have a unique SELinux MLS context. It's still useful for API < 28 apps since their per-user MLS context allows them to see each other's processes within the same profile.
2
3
Replying to and
Fallout of app developers complaining about needing to use more restricted higher-level OS APIs gated by permissions like developer.android.com/reference/andr: issuetracker.google.com/issues/37091475 There's a hidepid gid option used for internal exceptions but it's too coarse/problematic for a permission.
Replying to and
SELinux is also used to whitelist access to the individual /proc and /sys APIs. I helped push for /proc/net to be unavailable to most apps. It's only available for user authorized VPN service apps now. Only a couple very specific things in /sys are usable and debugfs is banned.
1