Firefly开源社区

打印 上一主题 下一主题

[Android] rk3399 androind7.1 mipi-dsi驱动 kernel启动失败

50

积分

0

威望

0

贡献

技术小白

积分
50

rk3399 androind7.1 mipi-dsi驱动 kernel启动失败

发表于 2020-2-21 09:45:59      浏览:6699 | 回复:2        打印      只看该作者   [复制链接] 楼主
大神们 帮我分析分析这个问题呗,困扰我半个月了,谢谢大家了。
kernel启动过程中提示“[Wed Jan 22 18:01:22.630 2020] [ffffffc04d114cc0] mali_fence: signaled”,然后init中的所有service被killed掉。启动画面卡在kernel logo中,经调查感觉和kernel/drivers/char/目录的virtd有关。硬件更换过,之前用的Firefly-rk3399开发板,现在是自己组装的硬件,只修改过emmc组件。现在的硬件跑rk3399 linux代码没有问题。出错的log如下:
[Wed Jan 22 18:01:24.809 2020] [    5.456312] init: Untracked pid 296 exited with status 1
[Wed Jan 22 18:01:24.812 2020] [    5.456888] init: Untracked pid 309 exited with status 1
[Wed Jan 22 18:01:26.814 2020] [    7.459679] init: Starting service 'media'...
[Wed Jan 22 18:01:26.818 2020] [    7.460402] init: Starting service 'zygote'...
[Wed Jan 22 18:01:26.818 2020] [    7.461064] init: Starting service 'audioserver'...
[Wed Jan 22 18:01:26.818 2020] [    7.461679] init: Starting service 'cameraserver'...
[Wed Jan 22 18:01:26.819 2020] [    7.462553] init: Starting service 'netd'...
[Wed Jan 22 18:01:26.824 2020] [    7.463300] init: Starting service 'surfaceflinger'...
[Wed Jan 22 18:01:26.824 2020] [    7.465784] init: couldn't write 347 to /dev/cpuset/camera-daemon/tasks: No such file or directory
[Wed Jan 22 18:01:27.011 2020] [    7.656879] type=1400 audit(1358499196.386:79): avc: denied { getattr } for pid=381 comm="sh" path="/system/bin/toybox" dev="mmcblk1p10" ino=444 scontext=u:r:audioserver:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file [    7.659702] type=1400 audit(1358499196.390:80): avc: denied { execute } for pid=381 comm="sh" name="toybox" dev="mmcblk1p10" ino=444 scontext=u:r:audioserver:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1
[Wed Jan 22 18:01:27.021 2020] [    7.659850] type=1400 audit(1358499196.390:81): avc: denied { read open } for pid=381 comm="sh" path="/system/bin/toybox" dev="mmcblk1p10" ino=444 scontext=u:r:audioserver:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1
[Wed Jan 22 18:01:27.022 2020] [    7.660167] type=1400 audit(1358499196.390:82): avc: denied { execute_no_trans } for pid=381 comm="sh" path="/system/bin/toybox" dev="mmcblk1p10" ino=444 scontext=u:r:audioserver:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1
[Wed Jan 22 18:01:27.057 2020] [    7.704608] type=1400 audit(1358499196.433:83): avc: denied { read } for pid=392 comm="vm" scontext=u:r:sudaemon:s0 tcontext=u:r:audioserver:s0 tclass=file permissive=1
[Wed Jan 22 18:01:27.059 2020] [    7.705122] type=1400 audit(1358499196.433:84): avc: denied { search } for pid=392 comm="vm" name="390" dev="proc" ino=9773 scontext=u:r:sudaemon:s0 tcontext=u:r:audioserver:s0 tclass=dir permissive=1
[Wed Jan 22 18:01:27.062 2020] [    7.705647] type=1400 audit(1358499196.433:85): avc: denied { read } for pid=392 comm="vm" name="exe" dev="proc" ino=9774 scontext=u:r:sudaemon:s0 tcontext=u:r:audioserver:s0 tclass=lnk_file permissive=1
[Wed Jan 22 18:01:27.070 2020] [    7.706740] type=1400 audit(1358499196.436:86): avc: denied { open } for pid=395 comm="vm" path="/proc/385/cmdline" dev="proc" ino=984 scontext=u:r:sudaemon:s0 tcontext=u:r:audioserver:s0 tclass=file permissive=1
[Wed Jan 22 18:01:27.074 2020] [    7.715796] type=1400 audit(1358499196.436:87): avc: denied { execute } for pid=395 comm="vm" name="sh" dev="mmcblk1p10" ino=410 scontext=u:r:sudaemon:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1
[Wed Jan 22 18:01:27.074 2020] [    7.715993] type=1400 audit(1358499196.436:88): avc: denied { read open } for pid=395 comm="vm" path="/system/bin/sh" dev="mmcblk1p10" ino=410 scontext=u:r:sudaemon:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1
[Wed Jan 22 18:01:27.074 2020] [    7.716095] type=1400 audit(1358499196.440:89): avc: denied { execute_no_trans } for pid=395 comm="vm" path="/system/bin/sh" dev="mmcblk1p10" ino=410 scontext=u:r:sudaemon:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1
[Wed Jan 22 18:01:27.078 2020] [    7.716173] type=1400 audit(1358499196.440:90): avc: denied { getattr } for pid=395 comm="sh" path="/system/bin/sh" dev="mmcblk1p10" ino=410 scontext=u:r:sudaemon:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1
[Wed Jan 22 18:01:27.081 2020] [    7.716248] type=1400 audit(1358499196.440:91): avc: denied { getattr } for pid=395 comm="sh" path="/vendor" dev="rootfs" ino=7485 scontext=u:r:sudaemon:s0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file permissive=1
[Wed Jan 22 18:01:27.089 2020] [    7.732268] type=1400 audit(1358499196.450:92): avc: denied { getattr } for pid=395 comm="sh" path="/system/bin/toybox" dev="mmcblk1p10" ino=444 scontext=u:r:sudaemon:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1
[Wed Jan 22 18:01:27.091 2020] [    7.732488] type=1400 audit(1358499196.450:93): avc: denied { execute } for pid=395 comm="sh" name="toybox" dev="mmcblk1p10" ino=444 scontext=u:r:sudaemon:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1
[Wed Jan 22 18:01:27.091 2020] [    7.732585] type=1400 audit(1358499196.450:94): avc: denied { read open } for pid=395 comm="sh" path="/system/bin/toybox" dev="mmcblk1p10" ino=444 scontext=u:r:sudaemon:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1
[Wed Jan 22 18:01:27.094 2020] [    7.732660] type=1400 audit(1358499196.450:95): avc: denied { execute_no_trans } for pid=395 comm="sh" path="/system/bin/toybox" dev="mmcblk1p10" ino=444 scontext=u:r:sudaemon:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1
[Wed Jan 22 18:01:27.103 2020] [    7.737067] init: Untracked pid 392 exited with status 1
[Wed Jan 22 18:01:27.116 2020] [    7.763039] type=1400 audit(1358499196.493:96): avc: denied { write } for pid=407 comm="sh" name="ttyFIQ0" dev="tmpfs" ino=9324 scontext=u:r:sudaemon:s0 tcontext=u:object_r:serial_device:s0 tclass=chr_file permissive=1
[Wed Jan 22 18:01:27.122 2020] [ffffffc04d114cc0] mali_fence: signaled
[Wed Jan 22 18:01:27.124 2020] [    7.767095] init: Untracked pid 405 exited with status 0
[Wed Jan 22 18:01:27.125 2020] [    7.769951] type=1400 audit(1358499196.493:97): avc: denied { open } for pid=407 comm="sh" path="/dev/ttyFIQ0" dev="tmpfs" ino=9324 scontext=u:r:sudaemon:s0 tcontext=u:object_r:serial_device:s0 tclass=chr_file permissive=1
[Wed Jan 22 18:01:27.163 2020] [    7.810045] init: Service 'surfaceflinger' (pid 349) killed by signal 6
[Wed Jan 22 18:01:27.165 2020] [    7.810106] init: Service 'surfaceflinger' (pid 349) killing any children in process group
[Wed Jan 22 18:01:27.165 2020] [    7.810150] init: Service 'zygote' is being killed...
[Wed Jan 22 18:01:27.173 2020] [    7.815292] init: Service 'zygote' (pid 345) killed by signal 9
[Wed Jan 22 18:01:27.174 2020] [    7.815345] init: Service 'zygote' (pid 345) killing any children in process group
[Wed Jan 22 18:01:27.174 2020] [    7.815452] init: write_file: Unable to open '/sys/android_power/request_state': No such file or directory
[Wed Jan 22 18:01:27.174 2020] [    7.815593] init: write_file: Unable to write to '/sys/power/state': Invalid argument
[Wed Jan 22 18:01:27.174 2020] [    7.815629] init: Service 'audioserver' is being killed...
[Wed Jan 22 18:01:27.174 2020] [    7.815764] init: Service 'cameraserver' is being killed...
[Wed Jan 22 18:01:27.175 2020] [    7.815808] init: Service 'media' is being killed...
[Wed Jan 22 18:01:27.175 2020] [    7.815863] init: Service 'netd' is being killed...
[Wed Jan 22 18:01:27.175 2020] [    7.817771] init: Service 'netd' (pid 348) killed by signal 9
[Wed Jan 22 18:01:27.175 2020] [    7.817815] init: Service 'netd' (pid 348) killing any children in process group
[Wed Jan 22 18:01:27.178 2020] [    7.818533] init: Service 'audioserver' (pid 346) killed by signal 9
[Wed Jan 22 18:01:27.178 2020] [    7.818640] init: Service 'audioserver' (pid 346) killing any children in process group
[Wed Jan 22 18:01:27.178 2020] [    7.818940] init: Untracked pid 413 killed by signal 9
[Wed Jan 22 18:01:27.179 2020] [    7.819035] init: Untracked pid 418 exited with status 2
[Wed Jan 22 18:01:27.179 2020] [    7.819079] init: Untracked pid 412 killed by signal 9
[Wed Jan 22 18:01:27.181 2020] [    7.819155] init: Untracked pid 410 killed by signal 9
[Wed Jan 22 18:01:27.182 2020] [    7.821161] init: Service 'cameraserver' (pid 347) killed by signal 9
[Wed Jan 22 18:01:27.182 2020] [    7.821198] init: Service 'cameraserver' (pid 347) killing any children in process group
[Wed Jan 22 18:01:27.190 2020] [    7.821775] init: Service 'media' (pid 344) killed by signal 9
[Wed Jan 22 18:01:27.191 2020] [    7.821808] init: Service 'media' (pid 344) killing any children in process group
[Wed Jan 22 18:01:27.191 2020] [    7.826521] type=1400 audit(1358499196.556:98): avc: denied { execute_no_trans } for pid=420 comm="sh" path="/system/xbin/io" dev="mmcblk1p10" ino=2678 scontext=u:r:sudaemon:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=1
[Wed Jan 22 18:01:27.193 2020] [    7.831847] type=1400 audit(1358499196.560:99): avc: denied { execmem } for pid=420 comm="io" scontext=u:r:sudaemon:s0 tcontex
回复

使用道具 举报

50

积分

0

威望

0

贡献

技术小白

积分
50
发表于 2020-2-21 09:54:01        只看该作者  沙发
附件是启动失败的全部log

teraterm2020012202-core-init.zip

50.83 KB, 下载次数: 2, 下载积分: 灯泡 -1 , 经验 -1

回复

使用道具 举报

34

积分

0

威望

0

贡献

技术小白

积分
34
发表于 2020-2-24 11:13:18        只看该作者  板凳
你好,楼主,我也碰到了类似的问题,有解决方案么?同求
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

友情链接 : 爱板网 电子发烧友论坛 云汉电子社区 粤ICP备14022046号-2
快速回复 返回顶部 返回列表