Searched refs:allowed (Results 1 - 23 of 23) sorted by relevance

/frameworks/base/core/java/android/os/
H A DTrace.java91 private static native void nativeSetAppTracingAllowed(boolean allowed); argument
92 private static native void nativeSetTracingEnabled(boolean allowed); argument
165 * Set whether application tracing is allowed for this process. This is intended to be set
170 public static void setAppTracingAllowed(boolean allowed) { argument
171 nativeSetAppTracingAllowed(allowed);
173 // Setting whether app tracing is allowed may change the tags, so we update the cached
/frameworks/support/v17/leanback/src/android/support/v17/leanback/widget/
H A DDetailsOverviewRow.java88 public void setImageScaleUpAllowed(boolean allowed) { argument
89 mImageScaleUpAllowed = allowed;
/frameworks/base/core/jni/
H A Dandroid_os_Trace.cpp96 jclass clazz, jboolean allowed) {
97 ALOGV("%s: %d", __FUNCTION__, allowed);
99 atrace_set_debuggable(allowed);
95 android_os_Trace_nativeSetAppTracingAllowed(JNIEnv* env, jclass clazz, jboolean allowed) argument
/frameworks/native/cmds/servicemanager/
H A Dservice_manager.c63 bool allowed; local
71 allowed = (result == 0);
74 return allowed;
88 bool allowed; local
105 allowed = check_mac_perms(spid, tctx, perm, name);
107 return allowed;
/frameworks/base/core/java/com/android/internal/os/
H A DZygoteConnection.java501 // Duplicate --rlimit arguments are specifically allowed.
690 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext,
694 if (!allowed) {
754 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext,
758 if (!allowed) {
789 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext,
793 if (!allowed) {
823 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext,
827 if (!allowed) {
/frameworks/base/services/core/java/com/android/server/
H A DSystemConfig.java292 boolean allowed;
294 allowed = true;
297 allowed = !"true".equals(notLowRam);
302 } else if (allowed) {
/frameworks/base/packages/SystemUI/tests/
H A DAndroid.mk35 # sign this with platform cert, so this test is allowed to inject key events into
/frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/
H A DApnContext.java179 public synchronized void setConcurrentVoiceAndDataAllowed(boolean allowed) { argument
180 mConcurrentVoiceAndDataAllowed = allowed;
H A DDcTracker.java737 boolean allowed =
748 if (!allowed && DBG) {
757 reason += " - Concurrent voice and data not allowed";
766 if (DBG) log("isDataAllowed: not allowed due to" + reason);
768 return allowed;
1413 * @return true if only single DataConnection is allowed
/frameworks/base/core/java/android/text/util/
H A DLinkify.java150 * what is allowed to match and become a link, and what is not.
374 boolean allowed = true;
377 allowed = matchFilter.acceptMatch(s, start, end);
380 if (allowed) {
/frameworks/base/core/java/android/view/
H A DLayoutInflater.java103 * Hook to allow clients of the LayoutInflater to restrict the set of Views that are allowed
110 * that are allowed to be inflated.
114 * @return True if this class is allowed to be inflated, or false otherwise
331 * that are allowed to be inflated.
339 * which is not allowed by the {@link Filter}, the {@link #inflate(int, ViewGroup)} call will
343 * @param filter The Filter which restricts the set of Views that are allowed to be inflated.
575 boolean allowed = mFilter.onLoadClass(clazz);
576 if (!allowed) {
588 // New class -- remember whether it is allowed
592 boolean allowed
[all...]
/frameworks/base/media/java/android/mtp/
H A DMtpDatabase.java282 boolean allowed = false;
284 for (int i = 0; i < mSubDirectories.length && !allowed; i++) {
290 allowed = true;
293 return allowed;
/frameworks/base/core/java/android/app/
H A DDownloadManager.java371 private int mAllowedNetworkTypes = ~0; // default to all network types allowed
659 * By default, all network types are allowed. Consider using
673 * allowed.
674 * @param allowed whether to allow a roaming connection to be used
677 public Request setAllowedOverRoaming(boolean allowed) { argument
678 mRoamingAllowed = allowed;
684 * connection. By default, metered networks are allowed.
/frameworks/base/services/core/java/com/android/server/pm/
H A DPackageManagerService.java2473 + " is not allowed to add to permission tree "
2552 "Not allowed to modify non-dynamic permission "
2603 "Not allowed to modify non-dynamic permission "
5973 boolean allowed = false;
5977 // of nasty edge cases: for example if we allowed a non-
5981 // have allowed apps on the device which aren't compatible
5990 allowed = true;
5991 allowed = true;
5997 allowed = true;
5999 if (allowed) {
[all...]
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DCommandsInterface.java1212 * 4 CLIR temporary mode presentation allowed
1925 * Tells the modem if data is allowed or not.
1927 * @param allowed
1928 * true = allowed, false = not alowed
1933 public void setDataAllowed(boolean allowed, Message result); argument
H A DBaseCommands.java859 public void setDataAllowed(boolean allowed, Message response) { argument
H A DRIL.java347 "Parcel larger than max bytes allowed! "
713 public void setDataAllowed(boolean allowed, Message result) { argument
718 rr.mParcel.writeInt(allowed ? 1 : 0);
3379 // limit to maximum allowed applications
/frameworks/base/core/java/android/service/wallpaper/
H A DWallpaperService.java409 public void setFixedSizeAllowed(boolean allowed) { argument
410 mFixedSizeAllowed = allowed;
/frameworks/base/services/core/java/com/android/server/accounts/
H A DAccountManagerService.java658 * Child users are not allowed to add accounts. Only the accounts that are
1818 "User is not allowed to add an account!");
1893 "User is not allowed to add an account!");
3345 ArrayList<Account> allowed = new ArrayList<Account>();
3371 allowed.add(account);
3381 allowed.add(account);
3385 Account[] filtered = new Account[allowed.size()];
3386 allowed.toArray(filtered);
3395 * that the package is not allowed to access.
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/
H A DBaseStatusBar.java288 // point, so make sure new activity switches are now allowed.
1193 final boolean allowed = 0 != Settings.Secure.getIntForUser(
1200 mUsersAllowingPrivateNotifications.append(userHandle, allowed && allowedByDpm);
1201 return allowed;
1571 // point, so make sure new activity switches are now allowed.
/frameworks/base/services/core/java/com/android/server/am/
H A DActivityManagerService.java359 // Maximum number of persisted Uri grants a package is allowed
640 * Which uses have been started, so are allowed to run code.
3226 throw new SecurityException("Isolated process not allowed to call " + caller);
3485 // effectively saying that app switches are allowed at this point.
3542 // The caller is not allowed to change the data.
4301 // ask watcher if this is allowed
6480 + " is not allowed to send as package " + packageName;
6574 + " is not allowed to cancel packges "
6935 // track if unprotected read/write is allowed; any denied
7099 * if callingUid is not allowed t
[all...]
H A DActivityStack.java2897 // ask watcher if this is allowed
3543 // ask watcher if this is allowed
3865 void getTasksLocked(List<RunningTaskInfo> list, int callingUid, boolean allowed) { argument
3876 if (!allowed && !task.isHomeTask() && task.effectiveUid != callingUid) {
H A DActivityStackSupervisor.java248 * At that point the system is allowed to actually sleep.
746 void getTasksLocked(int maxNum, List<RunningTaskInfo> list, int callingUid, boolean allowed) { argument
757 stack.getTasksLocked(stackTaskList, callingUid, allowed);
1503 // This is the second allowed switch since we stopped switches,
1506 // user taps a home icon (coming from home so allowed, we hit here
2701 if (DEBUG_TASKS) Slog.d(TAG, "Skipping stack: (new task not allowed) " +

Completed in 616 milliseconds