/system/core/debuggerd/tombstoned/ |
D | tombstoned.cpp | 97 static CrashQueue* for_crash(const Crash* crash) { in for_crash() argument 98 return (crash->crash_type == kDebuggerdJavaBacktrace) ? for_anrs() : for_tombstones(); in for_crash() 140 bool maybe_enqueue_crash(Crash* crash) { in maybe_enqueue_crash() argument 142 queued_requests_.push_back(crash); in maybe_enqueue_crash() 149 void maybe_dequeue_crashes(void (*handler)(Crash* crash)) { in maybe_dequeue_crashes() argument 212 static void perform_request(Crash* crash) { in perform_request() argument 215 intercept_manager->GetIntercept(crash->crash_pid, crash->crash_type, &output_fd); in perform_request() 217 if (crash->crash_type == kDebuggerdNativeBacktrace) { in perform_request() 221 std::tie(crash->crash_tombstone_path, output_fd) = CrashQueue::for_crash(crash)->get_output(); in perform_request() 222 crash->crash_tombstone_fd.reset(dup(output_fd.get())); in perform_request() [all …]
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | hal_configstore.te | 7 # fallback path to collect crash data. 42 -anr_data_file # for crash dump collection 43 -tombstone_data_file # for crash dump collection
|
/system/sepolicy/public/ |
D | hal_configstore.te | 7 # fallback path to collect crash data. 42 -anr_data_file # for crash dump collection 43 -tombstone_data_file # for crash dump collection
|
D | te_macros | 525 # Fallback crash handling for processes that can't exec crash_dump (e.g. because of seccomp).
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | hal_configstore.te | 12 # fallback path to collect crash data. 46 -anr_data_file # for crash dump collection 47 -tombstone_data_file # for crash dump collection
|
D | te_macros | 475 # Fallback crash handling for processes that can't exec crash_dump (e.g. because of seccomp).
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | hal_configstore.te | 12 # fallback path to collect crash data. 46 -anr_data_file # for crash dump collection 47 -tombstone_data_file # for crash dump collection
|
D | te_macros | 494 # Fallback crash handling for processes that can't exec crash_dump (e.g. because of seccomp).
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | app.te | 11 # Exception for crash_dump to allow for app crash reporting.
|
D | isolated_app.te | 20 # Google Breakpad (crash reporter for Chrome) relies on ptrace 21 # functionality. Without the ability to ptrace, the crash reporter
|
D | priv_app.te | 17 # webview crash handling depends on self ptrace (b/27697529, b/20150694, b/19277529#comment7)
|
/system/sepolicy/private/ |
D | app.te | 11 # Exception for crash_dump to allow for app crash reporting.
|
D | isolated_app.te | 20 # Google Breakpad (crash reporter for Chrome) relies on ptrace 21 # functionality. Without the ability to ptrace, the crash reporter
|
D | priv_app.te | 17 # webview crash handling depends on self ptrace (b/27697529, b/20150694, b/19277529#comment7)
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | isolated_app.te | 20 # Google Breakpad (crash reporter for Chrome) relies on ptrace 21 # functionality. Without the ability to ptrace, the crash reporter
|
D | priv_app.te | 17 # webview crash handling depends on self ptrace (b/27697529, b/20150694, b/19277529#comment7)
|
/system/core/debuggerd/crasher/ |
D | crasher.cpp | 132 noinline int crash(int a) { in crash() function 254 return crash(42); in do_action()
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | isolated_app.te | 20 # Google Breakpad (crash reporter for Chrome) relies on ptrace 21 # functionality. Without the ability to ptrace, the crash reporter
|
D | priv_app.te | 17 # webview crash handling depends on self ptrace (b/27697529, b/20150694, b/19277529#comment7)
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | isolated_app.te | 20 # Google Breakpad (crash reporter for Chrome) relies on ptrace 21 # functionality. Without the ability to ptrace, the crash reporter
|
D | priv_app.te | 17 # webview crash handling depends on self ptrace (b/27697529, b/20150694, b/19277529#comment7)
|
/system/core/libziparchive/ |
D | Android.bp | 48 // TODO: Fix crash when we enable this option
|
/system/iorap/ |
D | Android.bp | 196 */ // don't use the diag when you want it to crash. 289 */ // don't use the diag when you want it to crash.
|
/system/core/fastboot/fuzzy_fastboot/ |
D | README.md | 285 crash the bootloader. Invalid input MUST be handled gracefully. Using "asserts" 382 …security issues. For example, a buffer overrun might not always trigger a crash or have any notice…
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | te_macros | 465 # Fallback crash handling for processes that can't exec crash_dump (e.g. because of seccomp).
|