Hi all, I have attached the avc denied log in permissive mode. hope this will help.
On Tuesday, 28 August 2018 23:17:00 UTC+5:30, Akshay Mhaske wrote: > > Hi, > > I am trying to port the aosp project to x86 based platform. > With permissive mode everything is working fine. but I am not able to boot > with enforcing mode. > > I am compiling the aosp source with user build variant. Compilation is > successful. > > But while booting. I am getting following log. > > Detecting Android-x86.... found at /dev/sda1 > [ 2.125466] sysrq: Sysrq : Emergency Remount R/O > > After that its restarting again. > > > Can anyone please help me ? > -- -- unsubscribe: android-porting+unsubscr...@googlegroups.com website: http://groups.google.com/group/android-porting --- You received this message because you are subscribed to the Google Groups "android-porting" group. To unsubscribe from this group and stop receiving emails from it, send an email to android-porting+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.
raven:/ # dmesg | grep "denied" [ 95.455428] type=1400 audit(1534855885.485:587): avc: denied { ioctl } for pid=3001 comm="Binder:3001_6" path="/dev/dri/card0" dev="tmpfs" ino=11673 ioctlcmd=0x640b scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1 [ 95.464886] type=1400 audit(1534855885.494:588): avc: denied { map } for pid=3001 comm="Binder:3001_6" path="/dev/dri/card0" dev="tmpfs" ino=11673 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1 [ 95.464943] type=1400 audit(1534855885.494:589): avc: denied { read write } for pid=3001 comm="Binder:3001_6" path="/dev/dri/card0" dev="tmpfs" ino=11673 scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1 [ 104.694713] type=1400 audit(1534855894.724:590): avc: denied { map } for pid=3386 comm="HeapTaskDaemon" path="/dev/ashmem" dev="tmpfs" ino=13211 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:ashmem_device:s0 tclass=chr_file permissive=1 [ 105.533161] type=1400 audit(1534855895.563:591): avc: denied { wake_alarm } for pid=3001 comm="Binder:3001_8" capability=35 scontext=u:r:system_server:s0 tcontext=u:r:system_server:s0 tclass=capability2 permissive=1 [ 108.764349] type=1400 audit(1534855898.794:592): avc: denied { map } for pid=2722 comm="adbd" path="/dev/__properties__/u:object_r:device_logging_prop:s0" dev="tmpfs" ino=1478 scontext=u:r:adbd:s0 tcontext=u:object_r:device_logging_prop:s0 tclass=file permissive=1 [ 108.764746] type=1400 audit(1534855898.794:593): avc: denied { map } for pid=3931 comm="sh" path="/system/bin/sh" dev="loop1" ino=427 scontext=u:r:shell:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 [ 108.764854] type=1400 audit(1534855898.794:594): avc: denied { map } for pid=3931 comm="sh" path="/system/bin/linker64" dev="loop1" ino=332 scontext=u:r:shell:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=1 [ 108.765244] type=1400 audit(1534855898.795:595): avc: denied { map } for pid=3931 comm="sh" path="/dev/__properties__/properties_serial" dev="tmpfs" ino=1499 scontext=u:r:shell:s0 tcontext=u:object_r:properties_serial:s0 tclass=file permissive=1 [ 108.766872] type=1400 audit(1534855898.796:596): avc: denied { map } for pid=3931 comm="sh" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=1472 scontext=u:r:shell:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 108.767221] type=1400 audit(1534855898.797:597): avc: denied { getattr } for pid=3931 comm="sh" path="/system/xbin/su" dev="loop1" ino=4820 scontext=u:r:shell:s0 tcontext=u:object_r:su_exec:s0 tclass=file permissive=1 [ 108.767239] type=1400 audit(1534855898.797:598): avc: denied { execute } for pid=3931 comm="sh" name="su" dev="loop1" ino=4820 scontext=u:r:shell:s0 tcontext=u:object_r:su_exec:s0 tclass=file permissive=1 [ 108.767253] type=1400 audit(1534855898.797:599): avc: denied { read open } for pid=3931 comm="sh" path="/system/xbin/su" dev="loop1" ino=4820 scontext=u:r:shell:s0 tcontext=u:object_r:su_exec:s0 tclass=file permissive=1 [ 110.534175] type=1400 audit(1534855900.564:603): avc: denied { map } for pid=3639 comm="viders.calendar" path="/dev/ashmem" dev="tmpfs" ino=13211 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ashmem_device:s0 tclass=chr_file permissive=1 [ 128.742190] type=1400 audit(1534855918.772:604): avc: denied { map } for pid=3001 comm="BackgroundDexOp" path="/data/dalvik-cache/x86_64/system@app@Audio_Recorder@audio_recorder....@classes.dex" dev="sda1" ino=3621512 scontext=u:r:system_server:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file permissive=1 [ 139.899837] type=1400 audit(1534855929.134:605): avc: denied { map } for pid=3942 comm="getprop" path="/system/bin/toybox" dev="loop1" ino=457 scontext=u:r:shell:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 [ 141.778435] type=1400 audit(1534855931.013:606): avc: denied { setgid } for pid=3943 comm="su" capability=6 scontext=u:r:shell:s0 tcontext=u:r:shell:s0 tclass=capability permissive=1 [ 141.778631] type=1400 audit(1534855931.013:607): avc: denied { setuid } for pid=3943 comm="su" capability=7 scontext=u:r:shell:s0 tcontext=u:r:shell:s0 tclass=capability permissive=1 [ 168.126224] type=1400 audit(1534855957.361:608): avc: denied { map } for pid=2722 comm="adbd" path="/dev/__properties__/u:object_r:debug_prop:s0" dev="tmpfs" ino=1488 scontext=u:r:adbd:s0 tcontext=u:object_r:debug_prop:s0 tclass=file permissive=1 raven:/ #