diff options
| author | Bram Bonné <brambonne@google.com> | 2019-10-25 10:55:31 +0200 |
|---|---|---|
| committer | Bram Bonné <brambonne@google.com> | 2019-10-28 17:16:35 +0100 |
| commit | ce8d90a38a8706628ef5abef166d2b69e9848d69 (patch) | |
| tree | 4ff8eb9378a5d0a746f39162f68ca9b5621c50f4 /annotations/generate_annotated_java_files.py | |
| parent | 4235519958de84cbe09b98aaf1cc45a689110000 (diff) | |
Limit access to the device's fixed 802.11 MAC address.
This change makes NetworkInterface#getHardwareAddress() return an
anonymized MAC (02:00:00:00:00:00) for all interfaces if the process
requesting it is a not system process (i.e. if it has a UID >= 10000).
Note that this change is not meant to provide any proper security
guarantees (indeed, it is part of the app's process, making it easy to
circumvent). Instead, we will use it to understand which apps are
actually calling the method (as opposed to just referencing it in their
code), and to see when apps are breaking across the tester population.
Bug: 141455849
Test: atest -c NetworkInterfaceTest
Change-Id: Iaa1ed2feb459f6fa2c167713001f525e62a446bf
Diffstat (limited to 'annotations/generate_annotated_java_files.py')
0 files changed, 0 insertions, 0 deletions
