diff options
author | 2021-08-27 17:00:10 +0100 | |
---|---|---|
committer | 2021-08-31 18:00:18 +0000 | |
commit | 611d71c6710613a69698a80d60de9725a513703d (patch) | |
tree | 080fec2740d793fc8cf61a5607c31ed51cec1b97 /libnativeloader/library_namespaces.cpp | |
parent | 98f01d1deac3a938e49f0725c58798e38ef59277 (diff) |
Fix a few non-inclusive terms
Largely based on go/hiddenapi-list-renaming
Bug: 161336379
Test: TH
Change-Id: Iaa06eed26ab0cb9bb4e2995a148f3251386ad33d
Diffstat (limited to 'libnativeloader/library_namespaces.cpp')
-rw-r--r-- | libnativeloader/library_namespaces.cpp | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/libnativeloader/library_namespaces.cpp b/libnativeloader/library_namespaces.cpp index 585e98a587..f31c4302a4 100644 --- a/libnativeloader/library_namespaces.cpp +++ b/libnativeloader/library_namespaces.cpp @@ -78,7 +78,7 @@ constexpr const char* kSharedNamespaceSuffix = "-shared"; // (http://b/27588281) This is a workaround for apps using custom classloaders and calling // System.load() with an absolute path which is outside of the classloader library search path. // This list includes all directories app is allowed to access this way. -constexpr const char* kWhitelistedDirectories = "/data:/mnt/expand"; +constexpr const char* kAlwaysPermittedDirectories = "/data:/mnt/expand"; constexpr const char* kVendorLibPath = "/vendor/" LIB; constexpr const char* kProductLibPath = "/product/" LIB ":/system/product/" LIB; @@ -216,7 +216,7 @@ Result<NativeLoaderNamespace*> LibraryNamespaces::Create(JNIEnv* env, uint32_t t // // This part effectively allows such a classloader to access anything // under /data and /mnt/expand - std::string permitted_path = kWhitelistedDirectories; + std::string permitted_path = kAlwaysPermittedDirectories; if (java_permitted_path != nullptr) { ScopedUtfChars path(env, java_permitted_path); |