From 611d71c6710613a69698a80d60de9725a513703d Mon Sep 17 00:00:00 2001 From: Orion Hodson Date: Fri, 27 Aug 2021 17:00:10 +0100 Subject: Fix a few non-inclusive terms Largely based on go/hiddenapi-list-renaming Bug: 161336379 Test: TH Change-Id: Iaa06eed26ab0cb9bb4e2995a148f3251386ad33d --- libnativeloader/library_namespaces.cpp | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'libnativeloader/library_namespaces.cpp') diff --git a/libnativeloader/library_namespaces.cpp b/libnativeloader/library_namespaces.cpp index 585e98a587..f31c4302a4 100644 --- a/libnativeloader/library_namespaces.cpp +++ b/libnativeloader/library_namespaces.cpp @@ -78,7 +78,7 @@ constexpr const char* kSharedNamespaceSuffix = "-shared"; // (http://b/27588281) This is a workaround for apps using custom classloaders and calling // System.load() with an absolute path which is outside of the classloader library search path. // This list includes all directories app is allowed to access this way. -constexpr const char* kWhitelistedDirectories = "/data:/mnt/expand"; +constexpr const char* kAlwaysPermittedDirectories = "/data:/mnt/expand"; constexpr const char* kVendorLibPath = "/vendor/" LIB; constexpr const char* kProductLibPath = "/product/" LIB ":/system/product/" LIB; @@ -216,7 +216,7 @@ Result LibraryNamespaces::Create(JNIEnv* env, uint32_t t // // This part effectively allows such a classloader to access anything // under /data and /mnt/expand - std::string permitted_path = kWhitelistedDirectories; + std::string permitted_path = kAlwaysPermittedDirectories; if (java_permitted_path != nullptr) { ScopedUtfChars path(env, java_permitted_path); -- cgit v1.2.3-59-g8ed1b