Hi all,
I have attached the avc denied log in permissive mode.
hope this will help.
On Tuesday, 28 August 2018 23:17:00 UTC+5:30, Akshay Mhaske wrote:
>
> Hi,
>
> I am trying to port the aosp project to x86 based platform.
> With permissive mode everything is working fine. but I am not able to boot
> with enforcing mode.
>
> I am compiling the aosp source with user build variant. Compilation is
> successful.
>
> But while booting. I am getting following log.
>
> Detecting Android-x86 found at /dev/sda1
> [ 2.125466] sysrq: Sysrq : Emergency Remount R/O
>
> After that its restarting again.
>
>
> Can anyone please help me ?
>
--
--
unsubscribe: android-porting+unsubscr...@googlegroups.com
website: http://groups.google.com/group/android-porting
---
You received this message because you are subscribed to the Google Groups
"android-porting" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to android-porting+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
raven:/ # dmesg | grep "denied"
[ 95.455428] type=1400 audit(1534855885.485:587): avc: denied { ioctl } for
pid=3001 comm="Binder:3001_6" path="/dev/dri/card0" dev="tmpfs" ino=11673
ioctlcmd=0x640b scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0
tclass=chr_file permissive=1
[ 95.464886] type=1400 audit(1534855885.494:588): avc: denied { map } for
pid=3001 comm="Binder:3001_6" path="/dev/dri/card0" dev="tmpfs" ino=11673
scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=chr_file
permissive=1
[ 95.464943] type=1400 audit(1534855885.494:589): avc: denied { read write }
for pid=3001 comm="Binder:3001_6" path="/dev/dri/card0" dev="tmpfs" ino=11673
scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=chr_file
permissive=1
[ 104.694713] type=1400 audit(1534855894.724:590): avc: denied { map } for
pid=3386 comm="HeapTaskDaemon" path="/dev/ashmem" dev="tmpfs" ino=13211
scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:ashmem_device:s0
tclass=chr_file permissive=1
[ 105.533161] type=1400 audit(1534855895.563:591): avc: denied { wake_alarm }
for pid=3001 comm="Binder:3001_8" capability=35 scontext=u:r:system_server:s0
tcontext=u:r:system_server:s0 tclass=capability2 permissive=1
[ 108.764349] type=1400 audit(1534855898.794:592): avc: denied { map } for
pid=2722 comm="adbd"
path="/dev/__properties__/u:object_r:device_logging_prop:s0" dev="tmpfs"
ino=1478 scontext=u:r:adbd:s0 tcontext=u:object_r:device_logging_prop:s0
tclass=file permissive=1
[ 108.764746] type=1400 audit(1534855898.794:593): avc: denied { map } for
pid=3931 comm="sh" path="/system/bin/sh" dev="loop1" ino=427
scontext=u:r:shell:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1
[ 108.764854] type=1400 audit(1534855898.794:594): avc: denied { map } for
pid=3931 comm="sh" path="/system/bin/linker64" dev="loop1" ino=332
scontext=u:r:shell:s0 tcontext=u:object_r:system_file:s0 tclass=file
permissive=1
[ 108.765244] type=1400 audit(1534855898.795:595): avc: denied { map } for
pid=3931 comm="sh" path="/dev/__properties__/properties_serial" dev="tmpfs"
ino=1499 scontext=u:r:shell:s0 tcontext=u:object_r:properties_serial:s0
tclass=file permissive=1
[ 108.766872] type=1400 audit(1534855898.796:596): avc: denied { map } for
pid=3931 comm="sh" path="/dev/__properties__/u:object_r:default_prop:s0"
dev="tmpfs" ino=1472 scontext=u:r:shell:s0 tcontext=u:object_r:default_prop:s0
tclass=file permissive=1
[ 108.767221] type=1400 audit(1534855898.797:597): avc: denied { getattr } for
pid=3931 comm="sh" path="/system/xbin/su" dev="loop1" ino=4820
scontext=u:r:shell:s0 tcontext=u:object_r:su_exec:s0 tclass=file permissive=1
[ 108.767239] type=1400 audit(1534855898.797:598): avc: denied { execute } for
pid=3931 comm="sh" name="su" dev="loop1" ino=4820 scontext=u:r:shell:s0
tcontext=u:object_r:su_exec:s0 tclass=file permissive=1
[ 108.767253] type=1400 audit(1534855898.797:599): avc: denied { read open }
for pid=3931 comm="sh" path="/system/xbin/su" dev="loop1" ino=4820
scontext=u:r:shell:s0 tcontext=u:object_r:su_exec:s0 tclass=file permissive=1
[ 110.534175] type=1400 audit(1534855900.564:603): avc: denied { map } for
pid=3639 comm="viders.calendar" path="/dev/ashmem" dev="tmpfs" ino=13211
scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ashmem_device:s0
tclass=chr_file permissive=1
[ 128.742190] type=1400 audit(1534855918.772:604): avc: denied { map } for
pid=3001 comm="BackgroundDexOp"
path="/data/dalvik-cache/x86_64/system@app@Audio_Recorder@audio_recorder@classes.dex"
dev="sda1" ino=3621512 scontext=u:r:system_server:s0
tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file permissive=1
[ 139.899837] type=1400 audit(1534855929.134:605): avc: denied { map } for
pid=3942 comm="getprop" path="/system/bin/toybox" dev="loop1" ino=457
scontext=u:r:shell:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=