vscode Unable to attach to CoreCLR. Access is denied

本文介绍了使用VSCode进行调试时遇到“Unable to attach to CoreCLR. Access is denied”错误的问题及解决方案。问题由360杀毒软件阻止调试引起,通过关闭杀毒软件即可恢复正常调试。
--------- beginning of crash 02-26 05:15:25.586 root 834 834 F libc : Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 834 (init), pid 834 (init) 02-26 05:15:25.586 root 834 834 I libc : debuggerd_dispatch_pseudothread start. crashing tid: 834 02-26 05:15:25.587 lmkd 795 795 E ANDR-PERF-CLIENT-SYS: perf aidl service doesn't exist 02-26 05:15:25.589 1000 807 807 I hwservicemanager: Loaded APEX Infos from /bootstrap-apex/apex-info-list.xml 02-26 05:15:25.590 root 834 834 I libc : crash_dump pid: 836 02-26 05:15:25.591 1000 807 807 I hwservicemanager: getDeviceHalManifest: Successfully processed VINTF information 02-26 05:15:25.591 1000 807 807 I hwservicemanager: getFrameworkHalManifest: Successfully processed VINTF information 02-26 05:15:25.591 1000 807 807 I hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.2::IServiceManager/default in either framework or device VINTF manifest. 02-26 05:15:25.591 1000 807 807 I hwservicemanager: HIDL is not supported on this device so hwservicemanager is not needed 02-26 05:15:25.592 1000 807 807 W hwservicemanager: Waiting on init to shut this process down. 02-26 05:15:23.427 logd 791 791 I auditd : type=1403 audit(0.0:2): auid=4294967295 ses=4294967295 lsm=selinux res=1 02-26 05:15:23.427 logd 791 791 W auditd : type=1403 audit(0.0:2): auid=4294967295 ses=4294967295 lsm=selinux res=1 02-26 05:15:23.427 logd 791 791 I auditd : type=1404 audit(0.0:3): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 02-26 05:15:23.427 logd 791 791 W auditd : type=1404 audit(0.0:3): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 02-26 05:15:23.487 root 1 1 I auditd : type=1107 audit(0.0:4): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=ro.adb.secure pid=1 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:build_prop:s0 tclass=property_service permissive=0' 02-26 05:15:23.487 root 1 1 W /system/bin/init: type=1107 audit(0.0:4): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=ro.adb.secure pid=1 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:build_prop:s0 tclass=property_service permissive=0' 02-26 05:15:23.487 root 1 1 I auditd : type=1107 audit(0.0:5): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.bt.a2dp_offload_cap pid=1 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=property_service permissive=0' 02-26 05:15:23.487 root 1 1 W /system/bin/init: type=1107 audit(0.0:5): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.bt.a2dp_offload_cap pid=1 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=property_service permissive=0' 02-26 05:15:23.539 root 1 1 I auditd : type=1107 audit(0.0:6): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { read } for property=persist.dbg.keep_debugfs_mounted pid=0 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0' 02-26 05:15:23.539 root 1 1 W /system/bin/init: type=1107 audit(0.0:6): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { read } for property=persist.dbg.keep_debugfs_mounted pid=0 uid=0 gid=0 scontext=u:r:vendor_init:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0' 02-26 05:15:23.543 root 307 307 I auditd : type=1400 audit(0.0:7): avc: denied { read } for comm="init" name="u:object_r:default_prop:s0" dev="tmpfs" ino=197 scontext=u:r:vendor_init:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 02-26 05:15:23.543 root 307 307 W init : type=1400 audit(0.0:7): avc: denied { read } for name="u:object_r:default_prop:s0" dev="tmpfs" ino=197 scontext=u:r:vendor_init:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 02-26 05:15:23.543 root 307 307 I auditd : type=1400 audit(0.0:8): avc: denied { read } for comm="init" name="u:object_r:default_prop:s0" dev="tmpfs" ino=197 scontext=u:r:vendor_init:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 02-26 05:15:23.543 root 307 307 W init : type=1400 audit(0.0:8): avc: denied { read } for name="u:object_r:default_prop:s0" dev="tmpfs" ino=197 scontext=u:r:vendor_init:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 02-26 05:15:23.547 root 307 307 I auditd : type=1400 audit(0.0:9): avc: denied { read } for comm="init" name="u:object_r:default_prop:s0" dev="tmpfs" ino=197 scontext=u:r:vendor_init:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 02-26 05:15:23.547 root 307 307 W init : type=1400 audit(0.0:9): avc: denied { read } for name="u:object_r:default_prop:s0" dev="tmpfs" ino=197 scontext=u:r:vendor_init:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 02-26 05:15:23.547 root 307 307 I auditd : type=1400 audit(0.0:10): avc: denied { read } for comm="init" name="u:object_r:default_prop:s0" dev="tmpfs" ino=197 scontext=u:r:vendor_init:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 02-26 05:15:23.547 root 307 307 W init : type=1400 audit(0.0:10): avc: denied { read } for name="u:object_r:default_prop:s0" dev="tmpfs" ino=197 scontext=u:r:vendor_init:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=0 02-26 05:15:25.543 1000 807 807 I auditd : type=1400 audit(0.0:17): avc: denied { read } for comm="hwservicemanage" name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=493 scontext=u:r:hwservicemanager:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=0 02-26 05:15:25.543 1000 807 807 W hwservicemanage: type=1400 audit(0.0:17): avc: denied { read } for name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=493 scontext=u:r:hwservicemanager:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=0 02-26 05:15:25.543 1000 807 807 I auditd : type=1400 audit(0.0:18): avc: denied { read } for comm="hwservicemanage" name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=493 scontext=u:r:hwservicemanager:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=0 02-26 05:15:25.543 1000 807 807 W hwservicemanage: type=1400 audit(0.0:18): avc: denied { read } for name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=493 scontext=u:r:hwservicemanager:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=0 02-26 05:15:25.624 root 836 836 W libc : Access denied finding property "persist.vendor.track.malloc.enable" 02-26 05:15:25.624 root 836 836 W libc : Access denied finding property "persist.vendor.fd.monitor.enable" 02-26 05:15:25.636 root 836 836 I crash_dump64: crash_dump start 02-26 05:15:25.639 root 836 836 I crash_dump64: Fork in crash_dump. child pid: 891 02-26 05:15:25.641 root 891 891 F crash_dump64: crash_dump.cpp:805] failed to attach to thread 834: Permission denied 02-26 05:15:25.635 root 891 891 I auditd : type=1400 audit(0.0:19): avc: denied { ptrace } for comm="crash_dump64" scontext=u:r:crash_dump:s0 tcontext=u:r:init:s0 tclass=process permissive=0 02-26 05:15:25.635 root 891 891 W crash_dump64: type=1400 audit(0.0:19): avc: denied { ptrace } for scontext=u:r:crash_dump:s0 tcontext=u:r:init:s0 tclass=process permissive=0 02-26 05:15:25.645 root 891 891 E libc : failed to connect to tombstoned: No such file or directory 02-26 05:15:25.645 root 891 891 E crash_dump64: failed to connected to tombstoned to report failure 02-26 05:15:25.647 root 834 834 F libc : Crash due to signal: crash_dump helper failed to exec, or was killed 02-26 05:15:25.650 root 1 1 I libc : kill: send 9 to pid -834 02-26 05:15:25.650 root 1 1 I libc : debug pid reuse, real pid -834 02-26 05:15:25.674 root 1 1 I libc : kill: send 9 to pid -894 02-26 05:15:25.674 root 1 1 I libc : debug pid reuse, real pid -894 02-26 05:15:25.693 root 1 1 I libc : kill: send 9 to pid -895 02-26 05:15:25.693 root 1 1 I libc : debug pid reuse, real pid -895 02-26 05:15:25.715 root 1 1 W libc : Unable to set property "ro.secureboot.lockstate" to "unknown": PROP_ERROR_READ_ONLY_PROPERTY (0xb) 02-26 05:15:25.802 1000 911 911 I QSEECOM_SERVICE: Registering QSEECom HAL service 02-26 05:15:25.807 1000 911 911 W vendor.qti.hardware.qseecom@1.0-service: Thread Pool max thread count is 0. Cannot cache binder as linkToDeath cannot be implemented. serviceName: vendor.qti.hardware.qseecom.IQSEECom/default 02-26 05:15:25.807 1000 911 911 W ProcessState: Extra binder thread started, but 0 threads requested. Do not use *startThreadPool when zero threads are requested. 02-26 05:15:25.807 1000 911 911 I QSEECOM_SERVICE: Registered QSEECom HAL service successfully 02-26 05:15:25.836 root 909 909 D QSEECOMD: : qseecomd: Checking if the node /dev/qseecom can be accessed 02-26 05:15:25.831 root 1 1 I auditd : type=1400 audit(0.0:20): avc: denied { ioctl } for comm="init" path="/mnt/vendor/mi_ext" dev="dm-11" ino=38 ioctlcmd=0x125d scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0 02-26 05:15:25.831 root 1 1 W init : type=1400 audit(0.0:20): avc: denied { ioctl } for path="/mnt/vendor/mi_ext" dev="dm-11" ino=38 ioctlcmd=0x125d scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0 02-26 05:15:25.867 root 922 922 W libc : Access denied finding property "persist.vendor.track.malloc.enable" 02-26 05:15:25.867 root 922 922 W libc : Access denied finding property "persist.vendor.fd.monitor.enable" 02-26 05:15:25.863 root 922 922 I auditd : type=1400 audit(0.0:21): avc: denied { read } for comm="miuserfsd" name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=493 scontext=u:r:miuserfsd:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=0 02-26 05:15:25.863 root 922 922 W miuserfsd: type=1400 audit(0.0:21): avc: denied { read } for name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=493 scontext=u:r:miuserfsd:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=0 02-26 05:15:25.863 root 922 922 I auditd : type=1400 audit(0.0:22): avc: denied { read } for comm="miuserfsd" name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=493 scontext=u:r:miuserfsd:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=0 02-26 05:15:25.863 root 922 922 W miuserfsd: type=1400 audit(0.0:22): avc: denied { read } for name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=493 scontext=u:r:miuserfsd:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=0 02-26 05:15:25.877 root 922 927 I MI_USER_FS: Initialize miuserfs 02-26 05:15:25.908 root 1 1 W libc : Unable to set property "ro.boottime.init.fsck.app" to "0": PROP_ERROR_READ_ONLY_PROPERTY (0xb) 02-26 05:15:25.910 root 1 1 W libc : Unable to set property "ro.boottime.init.mount.app" to "0": PROP_ERROR_READ_ONLY_PROPERTY (0xb) 02-26 05:15:25.916 root 1 1 W libc : Unable to set property "ro.boottime.init.fsck.priv-app" to "0": PROP_ERROR_READ_ONLY_PROPERTY (0xb) 02-26 05:15:25.916 root 1 1 W libc : Unable to set property "ro.boottime.init.mount.priv-app" to "0": PROP_ERROR_READ_ONLY_PROPERTY (0xb) 02-26 05:15:25.918 root 1 1 W libc : Unable to set property "ro.boottime.init.fsck.framework" to "0": PROP_ERROR_READ_ONLY_PROPERTY (0xb) 02-26 05:15:25.919 root 1 1 W libc : Unable to set property "ro.boottime.init.mount.framework" to "0": PROP_ERROR_READ_ONLY_PROPERTY (0xb) 02-26 05:15:25.922 root 1 1 W libc : Unable to set property "ro.boottime.init.fsck.sysconfig" to "0":
最新发布
09-13
Events Back-off restarting failed container loki in pod loki-write-0_logging(8c9644b7-5d39-44dd-8e67-9ad9e3eeeafb) Source kubelet node1 Count 29 Sub-object spec.containers{loki} Last seen 2025-06-08T00:30:02+08:00 Container image "docker.io/grafana/loki:3.5.0" already present on machine Source kubelet node1 Count 5 Sub-object spec.containers{loki} Last seen 2025-06-08T00:26:29+08:00 Created container loki Source kubelet node1 Count 5 Sub-object spec.containers{loki} Last seen 2025-06-08T00:26:29+08:00 Started container loki Source kubelet node1 Count 5 Sub-object spec.containers{loki} Last seen 2025-06-08T00:26:29+08:00 Successfully assigned logging/loki-write-0 to node1 Source <unknown> Count Sub-object Events Back-off restarting failed container loki in pod loki-backend-0_logging(2d691f24-a46a-46a9-8fd0-bc11f4881711) Source kubelet node3 Count 29 Sub-object spec.containers{loki} Last seen 2025-06-08T00:29:57+08:00 Container image "kiwigrid/k8s-sidecar:1.30.3" already present on machine Source kubelet node3 Count 1 Sub-object spec.containers{loki-sc-rules} Last seen 2025-06-08T00:25:00+08:00 Created container loki-sc-rules Source kubelet node3 Count 1 Sub-object spec.containers{loki-sc-rules} Last seen 2025-06-08T00:25:00+08:00 Started container loki-sc-rules Source kubelet node3 Count 1 Sub-object spec.containers{loki-sc-rules} Last seen 2025-06-08T00:25:00+08:00 Container image "docker.io/grafana/loki:3.5.0" already present on machine Source kubelet node3 Count 4 Sub-object spec.containers{loki} Last seen 2025-06-08T00:25:41+08:00 Created container loki Source kubelet node3 Count 4 Sub-object spec.containers{loki} Last seen 2025-06-08T00:25:41+08:00 Started container loki Source kubelet node3 Count 4 Sub-object spec.containers{loki} Last seen 2025-06-08T00:25:41+08:00 Successfully assigned logging/loki-backend-0 to node3 Source <unknown> Count Sub-object Unable to attach or mount volumes: unmounted volumes=[sc-rules-volume kube-api-access-pxm5x config runtime-config tmp data], unattached volumes=[sc-rules-volume kube-api-access-pxm5x config runtime-config tmp data]: error processing PVC logging/data-loki-backend-0: failed to fetch PVC from API server: persistentvolumeclaims "data-loki-backend-0" is forbidden: User "system:node:node3" cannot get resource "persistentvolumeclaims" in API group "" in the namespace "logging": no relationship found between node 'node3' and this object Source kubelet node3 Count 1 Sub-object Last seen 2025-06-08T00:24:57+08:00 Events Back-off restarting failed container loki in pod loki-read-c7585856c-6dgr6_logging(5179e33e-6b29-4bf0-a49e-3b5819d71ff4) Source kubelet node4 Count 29 Sub-object spec.containers{loki} Last seen 2025-06-08T00:30:07+08:00 Container image "docker.io/grafana/loki:3.5.0" already present on machine Source kubelet node4 Count 5 Sub-object spec.containers{loki} Last seen 2025-06-08T00:26:25+08:00 Created container loki Source kubelet node4 Count 5 Sub-object spec.containers{loki} Last seen 2025-06-08T00:26:25+08:00 Started container loki Source kubelet node4 Count 5 Sub-object spec.containers{loki} Last seen 2025-06-08T00:26:25+08:00 Successfully assigned logging/loki-read-c7585856c-6dgr6 to node4 Source <unknown> Count Sub-object
06-09
评论
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值