Home
last modified time | relevance | path

Searched refs:crash (Results 1 – 25 of 31) sorted by relevance

12

/system/core/debuggerd/tombstoned/
Dtombstoned.cpp97 static CrashQueue* for_crash(const Crash* crash) { in for_crash() argument
98 return (crash->crash_type == kDebuggerdJavaBacktrace) ? for_anrs() : for_tombstones(); in for_crash()
140 bool maybe_enqueue_crash(Crash* crash) { in maybe_enqueue_crash() argument
142 queued_requests_.push_back(crash); in maybe_enqueue_crash()
149 void maybe_dequeue_crashes(void (*handler)(Crash* crash)) { in maybe_dequeue_crashes() argument
212 static void perform_request(Crash* crash) { in perform_request() argument
215 intercept_manager->GetIntercept(crash->crash_pid, crash->crash_type, &output_fd); in perform_request()
217 if (crash->crash_type == kDebuggerdNativeBacktrace) { in perform_request()
221 std::tie(crash->crash_tombstone_path, output_fd) = CrashQueue::for_crash(crash)->get_output(); in perform_request()
222 crash->crash_tombstone_fd.reset(dup(output_fd.get())); in perform_request()
[all …]
/system/sepolicy/prebuilts/api/29.0/public/
Dhal_configstore.te7 # fallback path to collect crash data.
42 -anr_data_file # for crash dump collection
43 -tombstone_data_file # for crash dump collection
/system/sepolicy/public/
Dhal_configstore.te7 # fallback path to collect crash data.
42 -anr_data_file # for crash dump collection
43 -tombstone_data_file # for crash dump collection
Dte_macros525 # Fallback crash handling for processes that can't exec crash_dump (e.g. because of seccomp).
/system/sepolicy/prebuilts/api/27.0/public/
Dhal_configstore.te12 # fallback path to collect crash data.
46 -anr_data_file # for crash dump collection
47 -tombstone_data_file # for crash dump collection
Dte_macros475 # Fallback crash handling for processes that can't exec crash_dump (e.g. because of seccomp).
/system/sepolicy/prebuilts/api/28.0/public/
Dhal_configstore.te12 # fallback path to collect crash data.
46 -anr_data_file # for crash dump collection
47 -tombstone_data_file # for crash dump collection
Dte_macros494 # Fallback crash handling for processes that can't exec crash_dump (e.g. because of seccomp).
/system/sepolicy/prebuilts/api/29.0/private/
Dapp.te11 # Exception for crash_dump to allow for app crash reporting.
Disolated_app.te20 # Google Breakpad (crash reporter for Chrome) relies on ptrace
21 # functionality. Without the ability to ptrace, the crash reporter
Dpriv_app.te17 # webview crash handling depends on self ptrace (b/27697529, b/20150694, b/19277529#comment7)
/system/sepolicy/private/
Dapp.te11 # Exception for crash_dump to allow for app crash reporting.
Disolated_app.te20 # Google Breakpad (crash reporter for Chrome) relies on ptrace
21 # functionality. Without the ability to ptrace, the crash reporter
Dpriv_app.te17 # webview crash handling depends on self ptrace (b/27697529, b/20150694, b/19277529#comment7)
/system/sepolicy/prebuilts/api/26.0/private/
Disolated_app.te20 # Google Breakpad (crash reporter for Chrome) relies on ptrace
21 # functionality. Without the ability to ptrace, the crash reporter
Dpriv_app.te17 # webview crash handling depends on self ptrace (b/27697529, b/20150694, b/19277529#comment7)
/system/core/debuggerd/crasher/
Dcrasher.cpp132 noinline int crash(int a) { in crash() function
254 return crash(42); in do_action()
/system/sepolicy/prebuilts/api/27.0/private/
Disolated_app.te20 # Google Breakpad (crash reporter for Chrome) relies on ptrace
21 # functionality. Without the ability to ptrace, the crash reporter
Dpriv_app.te17 # webview crash handling depends on self ptrace (b/27697529, b/20150694, b/19277529#comment7)
/system/sepolicy/prebuilts/api/28.0/private/
Disolated_app.te20 # Google Breakpad (crash reporter for Chrome) relies on ptrace
21 # functionality. Without the ability to ptrace, the crash reporter
Dpriv_app.te17 # webview crash handling depends on self ptrace (b/27697529, b/20150694, b/19277529#comment7)
/system/core/libziparchive/
DAndroid.bp48 // TODO: Fix crash when we enable this option
/system/iorap/
DAndroid.bp196 */ // don't use the diag when you want it to crash.
289 */ // don't use the diag when you want it to crash.
/system/core/fastboot/fuzzy_fastboot/
DREADME.md285 crash the bootloader. Invalid input MUST be handled gracefully. Using "asserts"
382 …security issues. For example, a buffer overrun might not always trigger a crash or have any notice…
/system/sepolicy/prebuilts/api/26.0/public/
Dte_macros465 # Fallback crash handling for processes that can't exec crash_dump (e.g. because of seccomp).

12