/frameworks/base/core/java/android/os/ |
H A D | Trace.java | 91 private static native void nativeSetAppTracingAllowed(boolean allowed); argument 92 private static native void nativeSetTracingEnabled(boolean allowed); argument 165 * Set whether application tracing is allowed for this process. This is intended to be set 170 public static void setAppTracingAllowed(boolean allowed) { argument 171 nativeSetAppTracingAllowed(allowed); 173 // Setting whether app tracing is allowed may change the tags, so we update the cached
|
/frameworks/support/v17/leanback/src/android/support/v17/leanback/widget/ |
H A D | DetailsOverviewRow.java | 88 public void setImageScaleUpAllowed(boolean allowed) { argument 89 mImageScaleUpAllowed = allowed;
|
/frameworks/base/core/jni/ |
H A D | android_os_Trace.cpp | 96 jclass clazz, jboolean allowed) { 97 ALOGV("%s: %d", __FUNCTION__, allowed); 99 atrace_set_debuggable(allowed); 95 android_os_Trace_nativeSetAppTracingAllowed(JNIEnv* env, jclass clazz, jboolean allowed) argument
|
/frameworks/native/cmds/servicemanager/ |
H A D | service_manager.c | 63 bool allowed; local 71 allowed = (result == 0); 74 return allowed; 88 bool allowed; local 105 allowed = check_mac_perms(spid, tctx, perm, name); 107 return allowed;
|
/frameworks/base/core/java/com/android/internal/os/ |
H A D | ZygoteConnection.java | 501 // Duplicate --rlimit arguments are specifically allowed. 690 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 694 if (!allowed) { 754 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 758 if (!allowed) { 789 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 793 if (!allowed) { 823 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 827 if (!allowed) {
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | SystemConfig.java | 292 boolean allowed; 294 allowed = true; 297 allowed = !"true".equals(notLowRam); 302 } else if (allowed) {
|
/frameworks/base/packages/SystemUI/tests/ |
H A D | Android.mk | 35 # sign this with platform cert, so this test is allowed to inject key events into
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/ |
H A D | ApnContext.java | 179 public synchronized void setConcurrentVoiceAndDataAllowed(boolean allowed) { argument 180 mConcurrentVoiceAndDataAllowed = allowed;
|
H A D | DcTracker.java | 737 boolean allowed = 748 if (!allowed && DBG) { 757 reason += " - Concurrent voice and data not allowed"; 766 if (DBG) log("isDataAllowed: not allowed due to" + reason); 768 return allowed; 1413 * @return true if only single DataConnection is allowed
|
/frameworks/base/core/java/android/text/util/ |
H A D | Linkify.java | 150 * what is allowed to match and become a link, and what is not. 374 boolean allowed = true; 377 allowed = matchFilter.acceptMatch(s, start, end); 380 if (allowed) {
|
/frameworks/base/core/java/android/view/ |
H A D | LayoutInflater.java | 103 * Hook to allow clients of the LayoutInflater to restrict the set of Views that are allowed 110 * that are allowed to be inflated. 114 * @return True if this class is allowed to be inflated, or false otherwise 331 * that are allowed to be inflated. 339 * which is not allowed by the {@link Filter}, the {@link #inflate(int, ViewGroup)} call will 343 * @param filter The Filter which restricts the set of Views that are allowed to be inflated. 575 boolean allowed = mFilter.onLoadClass(clazz); 576 if (!allowed) { 588 // New class -- remember whether it is allowed 592 boolean allowed [all...] |
/frameworks/base/media/java/android/mtp/ |
H A D | MtpDatabase.java | 282 boolean allowed = false; 284 for (int i = 0; i < mSubDirectories.length && !allowed; i++) { 290 allowed = true; 293 return allowed;
|
/frameworks/base/core/java/android/app/ |
H A D | DownloadManager.java | 371 private int mAllowedNetworkTypes = ~0; // default to all network types allowed 659 * By default, all network types are allowed. Consider using 673 * allowed. 674 * @param allowed whether to allow a roaming connection to be used 677 public Request setAllowedOverRoaming(boolean allowed) { argument 678 mRoamingAllowed = allowed; 684 * connection. By default, metered networks are allowed.
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | PackageManagerService.java | 2473 + " is not allowed to add to permission tree " 2552 "Not allowed to modify non-dynamic permission " 2603 "Not allowed to modify non-dynamic permission " 5973 boolean allowed = false; 5977 // of nasty edge cases: for example if we allowed a non- 5981 // have allowed apps on the device which aren't compatible 5990 allowed = true; 5991 allowed = true; 5997 allowed = true; 5999 if (allowed) { [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | CommandsInterface.java | 1212 * 4 CLIR temporary mode presentation allowed 1925 * Tells the modem if data is allowed or not. 1927 * @param allowed 1928 * true = allowed, false = not alowed 1933 public void setDataAllowed(boolean allowed, Message result); argument
|
H A D | BaseCommands.java | 859 public void setDataAllowed(boolean allowed, Message response) { argument
|
H A D | RIL.java | 347 "Parcel larger than max bytes allowed! " 713 public void setDataAllowed(boolean allowed, Message result) { argument 718 rr.mParcel.writeInt(allowed ? 1 : 0); 3379 // limit to maximum allowed applications
|
/frameworks/base/core/java/android/service/wallpaper/ |
H A D | WallpaperService.java | 409 public void setFixedSizeAllowed(boolean allowed) { argument 410 mFixedSizeAllowed = allowed;
|
/frameworks/base/services/core/java/com/android/server/accounts/ |
H A D | AccountManagerService.java | 658 * Child users are not allowed to add accounts. Only the accounts that are 1818 "User is not allowed to add an account!"); 1893 "User is not allowed to add an account!"); 3345 ArrayList<Account> allowed = new ArrayList<Account>(); 3371 allowed.add(account); 3381 allowed.add(account); 3385 Account[] filtered = new Account[allowed.size()]; 3386 allowed.toArray(filtered); 3395 * that the package is not allowed to access.
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/ |
H A D | BaseStatusBar.java | 288 // point, so make sure new activity switches are now allowed. 1193 final boolean allowed = 0 != Settings.Secure.getIntForUser( 1200 mUsersAllowingPrivateNotifications.append(userHandle, allowed && allowedByDpm); 1201 return allowed; 1571 // point, so make sure new activity switches are now allowed.
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ActivityManagerService.java | 359 // Maximum number of persisted Uri grants a package is allowed 640 * Which uses have been started, so are allowed to run code. 3226 throw new SecurityException("Isolated process not allowed to call " + caller); 3485 // effectively saying that app switches are allowed at this point. 3542 // The caller is not allowed to change the data. 4301 // ask watcher if this is allowed 6480 + " is not allowed to send as package " + packageName; 6574 + " is not allowed to cancel packges " 6935 // track if unprotected read/write is allowed; any denied 7099 * if callingUid is not allowed t [all...] |
H A D | ActivityStack.java | 2897 // ask watcher if this is allowed 3543 // ask watcher if this is allowed 3865 void getTasksLocked(List<RunningTaskInfo> list, int callingUid, boolean allowed) { argument 3876 if (!allowed && !task.isHomeTask() && task.effectiveUid != callingUid) {
|
H A D | ActivityStackSupervisor.java | 248 * At that point the system is allowed to actually sleep. 746 void getTasksLocked(int maxNum, List<RunningTaskInfo> list, int callingUid, boolean allowed) { argument 757 stack.getTasksLocked(stackTaskList, callingUid, allowed); 1503 // This is the second allowed switch since we stopped switches, 1506 // user taps a home icon (coming from home so allowed, we hit here 2701 if (DEBUG_TASKS) Slog.d(TAG, "Skipping stack: (new task not allowed) " +
|