[android-porting] Can I use Passthrough way of implementation in Android Oreo

2018-08-30 Thread Srinivas N
Hi,

Is it mandatory for HIDL to be use Binderizing mode only. or Can I use
Passthrough mode also?
if passthorugh mode is  possible, than where to declare that my module is
using passthrough mode?

Regards,
Srinivas N

-- 
-- 
unsubscribe: android-porting+unsubscr...@googlegroups.com
website: http://groups.google.com/group/android-porting

--- 
You received this message because you are subscribed to the Google Groups 
"android-porting" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to android-porting+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[android-porting] Re: Enforcing mode is not working

2018-08-30 Thread Akshay Mhaske
Hi all,

I have attached the avc denied log in permissive mode.
hope this will help.

On Tuesday, 28 August 2018 23:17:00 UTC+5:30, Akshay Mhaske wrote:
>
> Hi,
>
> I am trying to port the aosp project to x86 based platform.
> With permissive mode everything is working fine. but I am not able to boot 
> with enforcing mode.
>
> I am compiling the aosp source with user build variant. Compilation is 
> successful.
>
> But while booting. I am getting following log.
>
> Detecting Android-x86 found at /dev/sda1
> [   2.125466] sysrq: Sysrq : Emergency Remount R/O
>
> After that its restarting again.
>
>
> Can anyone please help me ?
>

-- 
-- 
unsubscribe: android-porting+unsubscr...@googlegroups.com
website: http://groups.google.com/group/android-porting

--- 
You received this message because you are subscribed to the Google Groups 
"android-porting" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to android-porting+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
raven:/ # dmesg | grep "denied"
[   95.455428] type=1400 audit(1534855885.485:587): avc: denied { ioctl } for 
pid=3001 comm="Binder:3001_6" path="/dev/dri/card0" dev="tmpfs" ino=11673 
ioctlcmd=0x640b scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 
tclass=chr_file permissive=1
[   95.464886] type=1400 audit(1534855885.494:588): avc: denied { map } for 
pid=3001 comm="Binder:3001_6" path="/dev/dri/card0" dev="tmpfs" ino=11673 
scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=chr_file 
permissive=1
[   95.464943] type=1400 audit(1534855885.494:589): avc: denied { read write } 
for pid=3001 comm="Binder:3001_6" path="/dev/dri/card0" dev="tmpfs" ino=11673 
scontext=u:r:system_server:s0 tcontext=u:object_r:device:s0 tclass=chr_file 
permissive=1
[  104.694713] type=1400 audit(1534855894.724:590): avc: denied { map } for 
pid=3386 comm="HeapTaskDaemon" path="/dev/ashmem" dev="tmpfs" ino=13211 
scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:ashmem_device:s0 
tclass=chr_file permissive=1
[  105.533161] type=1400 audit(1534855895.563:591): avc: denied { wake_alarm } 
for pid=3001 comm="Binder:3001_8" capability=35 scontext=u:r:system_server:s0 
tcontext=u:r:system_server:s0 tclass=capability2 permissive=1
[  108.764349] type=1400 audit(1534855898.794:592): avc: denied { map } for 
pid=2722 comm="adbd" 
path="/dev/__properties__/u:object_r:device_logging_prop:s0" dev="tmpfs" 
ino=1478 scontext=u:r:adbd:s0 tcontext=u:object_r:device_logging_prop:s0 
tclass=file permissive=1
[  108.764746] type=1400 audit(1534855898.794:593): avc: denied { map } for 
pid=3931 comm="sh" path="/system/bin/sh" dev="loop1" ino=427 
scontext=u:r:shell:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1
[  108.764854] type=1400 audit(1534855898.794:594): avc: denied { map } for 
pid=3931 comm="sh" path="/system/bin/linker64" dev="loop1" ino=332 
scontext=u:r:shell:s0 tcontext=u:object_r:system_file:s0 tclass=file 
permissive=1
[  108.765244] type=1400 audit(1534855898.795:595): avc: denied { map } for 
pid=3931 comm="sh" path="/dev/__properties__/properties_serial" dev="tmpfs" 
ino=1499 scontext=u:r:shell:s0 tcontext=u:object_r:properties_serial:s0 
tclass=file permissive=1
[  108.766872] type=1400 audit(1534855898.796:596): avc: denied { map } for 
pid=3931 comm="sh" path="/dev/__properties__/u:object_r:default_prop:s0" 
dev="tmpfs" ino=1472 scontext=u:r:shell:s0 tcontext=u:object_r:default_prop:s0 
tclass=file permissive=1
[  108.767221] type=1400 audit(1534855898.797:597): avc: denied { getattr } for 
pid=3931 comm="sh" path="/system/xbin/su" dev="loop1" ino=4820 
scontext=u:r:shell:s0 tcontext=u:object_r:su_exec:s0 tclass=file permissive=1
[  108.767239] type=1400 audit(1534855898.797:598): avc: denied { execute } for 
pid=3931 comm="sh" name="su" dev="loop1" ino=4820 scontext=u:r:shell:s0 
tcontext=u:object_r:su_exec:s0 tclass=file permissive=1
[  108.767253] type=1400 audit(1534855898.797:599): avc: denied { read open } 
for pid=3931 comm="sh" path="/system/xbin/su" dev="loop1" ino=4820 
scontext=u:r:shell:s0 tcontext=u:object_r:su_exec:s0 tclass=file permissive=1
[  110.534175] type=1400 audit(1534855900.564:603): avc: denied { map } for 
pid=3639 comm="viders.calendar" path="/dev/ashmem" dev="tmpfs" ino=13211 
scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ashmem_device:s0 
tclass=chr_file permissive=1
[  128.742190] type=1400 audit(1534855918.772:604): avc: denied { map } for 
pid=3001 comm="BackgroundDexOp" 
path="/data/dalvik-cache/x86_64/system@app@Audio_Recorder@audio_recorder@classes.dex"
 dev="sda1" ino=3621512 scontext=u:r:system_server:s0 
tcontext=u:object_r:dalvikcache_data_file:s0 tclass=file permissive=1
[  139.899837] type=1400 audit(1534855929.134:605): avc: denied { map } for 
pid=3942 comm="getprop" path="/system/bin/toybox" dev="loop1" ino=457 
scontext=u:r:shell:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=