Disable JNI native whitelist check

Stack walking technique to be revisited as it breaks with recent LLVM.

Bug: 136276414
Bug: 141662282
Bug: 142857837
Test: atest CtsHiddenApiBlacklistApi27TestCases \
            CtsHiddenApiBlacklistApi28TestCases \
            CtsHiddenApiBlacklistCurrentApiTestCases \
            CtsHiddenApiBlacklistDebugClassTestCases
Change-Id: I69d49bd5b0696a37bc82f7197243e361f4c6ce6e
Merged-In: I69d49bd5b0696a37bc82f7197243e361f4c6ce6e
(cherry picked from commit c1b34d49a0790db878685258dc46c0bfd37e4f37)
diff --git a/runtime/jni/jni_internal.cc b/runtime/jni/jni_internal.cc
index 608cab7..b3ca17f 100644
--- a/runtime/jni/jni_internal.cc
+++ b/runtime/jni/jni_internal.cc
@@ -263,10 +263,13 @@
 // things not rendering correctly. E.g. b/16858794
 static constexpr bool kWarnJniAbort = false;
 
+// Disable native JNI checking pending stack walk re-evaluation (b/136276414).
+static constexpr bool kNativeJniCheckEnabled = false;
+
 template<typename T>
 ALWAYS_INLINE static bool ShouldDenyAccessToMember(T* member, Thread* self)
     REQUIRES_SHARED(Locks::mutator_lock_) {
-  if (IsWhitelistedNativeCaller()) {
+  if (kNativeJniCheckEnabled && IsWhitelistedNativeCaller()) {
     return false;
   }
   return hiddenapi::ShouldDenyAccessToMember(