summaryrefslogtreecommitdiff
path: root/annotations/generate_annotated_java_files.py
diff options
context:
space:
mode:
authorBram Bonné <brambonne@google.com>2019-10-25 10:55:31 +0200
committerBram Bonné <brambonne@google.com>2019-10-28 17:16:35 +0100
commitce8d90a38a8706628ef5abef166d2b69e9848d69 (patch)
tree4ff8eb9378a5d0a746f39162f68ca9b5621c50f4 /annotations/generate_annotated_java_files.py
parent4235519958de84cbe09b98aaf1cc45a689110000 (diff)
Limit access to the device's fixed 802.11 MAC address.
This change makes NetworkInterface#getHardwareAddress() return an anonymized MAC (02:00:00:00:00:00) for all interfaces if the process requesting it is a not system process (i.e. if it has a UID >= 10000). Note that this change is not meant to provide any proper security guarantees (indeed, it is part of the app's process, making it easy to circumvent). Instead, we will use it to understand which apps are actually calling the method (as opposed to just referencing it in their code), and to see when apps are breaking across the tester population. Bug: 141455849 Test: atest -c NetworkInterfaceTest Change-Id: Iaa1ed2feb459f6fa2c167713001f525e62a446bf
Diffstat (limited to 'annotations/generate_annotated_java_files.py')
0 files changed, 0 insertions, 0 deletions