Hi all,

I have attached the avc denied log in permissive mode.
hope this will help.

On Tuesday, 28 August 2018 23:17:00 UTC+5:30, Akshay Mhaske wrote:
>
> Hi,
>
> I am trying to port the aosp project to x86 based platform.
> With permissive mode everything is working fine. but I am not able to boot 
> with enforcing mode.
>
> I am compiling the aosp source with user build variant. Compilation is 
> successful.
>
> But while booting. I am getting following log.
>
> Detecting Android-x86.... found at /dev/sda1
> [   2.125466] sysrq: Sysrq : Emergency Remount R/O
>
> After that its restarting again.
>
>
> Can anyone please help me ?
>

-- 
-- 
unsubscribe: android-porting+unsubscr...@googlegroups.com
website: http://groups.google.com/group/android-porting

--- 
You received this message because you are subscribed to the Google Groups 
"android-porting" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to android-porting+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
raven:/ # dmesg | grep "denied"
[   95.455428] type=1400 audit(1534855885.485:587): avc: denied { ioctl } for 
pid=3001 comm="Binder:3001_6" path="/dev/dri/card0" dev="tmpfs" ino=11673 
ioctlcmd=0x640b scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 
tclass=chr_file permissive=1
[   95.464886] type=1400 audit(1534855885.494:588): avc: denied { map } for 
pid=3001 comm="Binder:3001_6" path="/dev/dri/card0" dev="tmpfs" ino=11673 
scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=chr_file 
permissive=1
[   95.464943] type=1400 audit(1534855885.494:589): avc: denied { read write } 
for pid=3001 comm="Binder:3001_6" path="/dev/dri/card0" dev="tmpfs" ino=11673 
scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=chr_file 
permissive=1
[  104.694713] type=1400 audit(1534855894.724:590): avc: denied { map } for 
pid=3386 comm="HeapTaskDaemon" path="/dev/ashmem" dev="tmpfs" ino=13211 
scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:ashmem_device:s0 
tclass=chr_file permissive=1
[  105.533161] type=1400 audit(1534855895.563:591): avc: denied { wake_alarm } 
for pid=3001 comm="Binder:3001_8" capability=35 scontext=u:r:system_server:s0 
tcontext=u:r:system_server:s0 tclass=capability2 permissive=1
[  108.764349] type=1400 audit(1534855898.794:592): avc: denied { map } for 
pid=2722 comm="adbd" 
path="/dev/__properties__/u:object_r:device_logging_prop:s0" dev="tmpfs" 
ino=1478 scontext=u:r:adbd:s0 tcontext=u:object_r:device_logging_prop:s0 
tclass=file permissive=1
[  108.764746] type=1400 audit(1534855898.794:593): avc: denied { map } for 
pid=3931 comm="sh" path="/system/bin/sh" dev="loop1" ino=427 
scontext=u:r:shell:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1
[  108.764854] type=1400 audit(1534855898.794:594): avc: denied { map } for 
pid=3931 comm="sh" path="/system/bin/linker64" dev="loop1" ino=332 
scontext=u:r:shell:s0 tcontext=u:object_r:system_file:s0 tclass=file 
permissive=1
[  108.765244] type=1400 audit(1534855898.795:595): avc: denied { map } for 
pid=3931 comm="sh" path="/dev/__properties__/properties_serial" dev="tmpfs" 
ino=1499 scontext=u:r:shell:s0 tcontext=u:object_r:properties_serial:s0 
tclass=file permissive=1
[  108.766872] type=1400 audit(1534855898.796:596): avc: denied { map } for 
pid=3931 comm="sh" path="/dev/__properties__/u:object_r:default_prop:s0" 
dev="tmpfs" ino=1472 scontext=u:r:shell:s0 tcontext=u:object_r:default_prop:s0 
tclass=file permissive=1
[  108.767221] type=1400 audit(1534855898.797:597): avc: denied { getattr } for 
pid=3931 comm="sh" path="/system/xbin/su" dev="loop1" ino=4820 
scontext=u:r:shell:s0 tcontext=u:object_r:su_exec:s0 tclass=file permissive=1
[  108.767239] type=1400 audit(1534855898.797:598): avc: denied { execute } for 
pid=3931 comm="sh" name="su" dev="loop1" ino=4820 scontext=u:r:shell:s0 
tcontext=u:object_r:su_exec:s0 tclass=file permissive=1
[  108.767253] type=1400 audit(1534855898.797:599): avc: denied { read open } 
for pid=3931 comm="sh" path="/system/xbin/su" dev="loop1" ino=4820 
scontext=u:r:shell:s0 tcontext=u:object_r:su_exec:s0 tclass=file permissive=1
[  110.534175] type=1400 audit(1534855900.564:603): avc: denied { map } for 
pid=3639 comm="viders.calendar" path="/dev/ashmem" dev="tmpfs" ino=13211 
scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ashmem_device:s0 
tclass=chr_file permissive=1
[  128.742190] type=1400 audit(1534855918.772:604): avc: denied { map } for 
pid=3001 comm="BackgroundDexOp" 
path="/data/dalvik-cache/x86_64/system@app@Audio_Recorder@audio_recorder....@classes.dex"
 dev="sda1" ino=3621512 scontext=u:r:system_server:s0 
tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file permissive=1
[  139.899837] type=1400 audit(1534855929.134:605): avc: denied { map } for 
pid=3942 comm="getprop" path="/system/bin/toybox" dev="loop1" ino=457 
scontext=u:r:shell:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file 
permissive=1
[  141.778435] type=1400 audit(1534855931.013:606): avc: denied { setgid } for 
pid=3943 comm="su" capability=6 scontext=u:r:shell:s0 tcontext=u:r:shell:s0 
tclass=capability permissive=1
[  141.778631] type=1400 audit(1534855931.013:607): avc: denied { setuid } for 
pid=3943 comm="su" capability=7 scontext=u:r:shell:s0 tcontext=u:r:shell:s0 
tclass=capability permissive=1
[  168.126224] type=1400 audit(1534855957.361:608): avc: denied { map } for 
pid=2722 comm="adbd" path="/dev/__properties__/u:object_r:debug_prop:s0" 
dev="tmpfs" ino=1488 scontext=u:r:adbd:s0 tcontext=u:object_r:debug_prop:s0 
tclass=file permissive=1
raven:/ # 

Reply via email to