- Edited
A short extract:
In the field, I've found that many applications read the ranges from /proc/self/[s]maps to determine what they can access (usually related to obfuscation techniques).
followed by:
It seems that banking apps running on Android are known for this sort of behavior and could run into trouble if guard pages are installed — which is something that the Android runtime might well want to do as a general hardening measure.
but there is fairly substantial discussion following in the lwn.net comments to that article.
Use your browser search function with keyword banking
if you want to quickly grep through the comments.