Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Except they allow nearly everything for regular Android apps since libc lets you access nearly every syscall.

Nothing was meaningfully "clamped down" there. You can't directly syscall some obsolete syscalls anymore, and you can't syscall random numbers, but nearly any actual real syscall is still accessible and nothing indicates that it won't be.

As long as libc can do it so can you, since you & libc are in the same security domain. Or anything else that an NDK library can do in your process, you can go poke at that syscall, too.

It'd almost always be stupid to do that instead of going through the wrappers, but you technically can



Android uses bionic.


Yes, and..? Bionic is Android's libc. libc is just the name of the C standard library, not any particularly C standard library.

You might be confused and thinking of glibc, which is a particular libc implementation.


And as such it is only required to expose ISO C functions.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: