Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- FAILED: /root/havoc/out/target/product/dipper/obj/ETC/sepolicy_neverallows_intermediates/sepolicy_neverallows
- /bin/bash -c "(ASAN_OPTIONS=detect_leaks=0 /root/havoc/out/host/linux-x86/bin/checkpolicy -M -c 30 -o /root/havoc/out/target/product/dipper/obj/ETC/sepolicy_neverallows_intermediates/sepolicy_neverallows.tmp /root/havoc/out/target/product/dipper/obj/ETC/sepolicy_neverallows_intermediates/policy.conf ) && (/root/havoc/out/host/linux-x86/bin/sepolicy-analyze /root/havoc/out/target/product/dipper/obj/ETC/sepolicy_neverallows_intermediates/sepolicy_neverallows.tmp neverallow -w -f /root/havoc/out/target/product/dipper/obj/ETC/sepolicy_neverallows_intermediates/policy_2.conf || ( echo \"\" 1>&2; echo \"sepolicy-analyze failed. This is most likely due to the use\" 1>&2; echo \"of an expanded attribute in a neverallow assertion. Please fix\" 1>&2; echo \"the policy.\" 1>&2; exit 1 ) ) && (touch /root/havoc/out/target/product/dipper/obj/ETC/sepolicy_neverallows_intermediates/sepolicy_neverallows.tmp ) && (mv /root/havoc/out/target/product/dipper/obj/ETC/sepolicy_neverallows_intermediates/sepolicy_neverallows.tmp /root/havoc/out/target/product/dipper/obj/ETC/sepolicy_neverallows_intermediates/sepolicy_neverallows )"
- device/xiaomi/sdm845-common/sepolicy/vendor/hal_camera_default.te:12:ERROR 'unknown type vendor_camera_prop' at token ';' on line 86272:
- #line 12
- allow hal_camera_default vendor_camera_prop:file { getattr open read map };
- checkpolicy: error(s) encountered while parsing configuration
- [ 39% 46527/116961] build /root/havoc/out/target/product/dipper/obj/ETC/sepolicy.recovery_intermediates/sepolicy
- FAILED: /root/havoc/out/target/product/dipper/obj/ETC/sepolicy.recovery_intermediates/sepolicy
- /bin/bash -c "(ASAN_OPTIONS=detect_leaks=0 /root/havoc/out/host/linux-x86/bin/checkpolicy -M -c 30 -o /root/havoc/out/target/product/dipper/obj/ETC/sepolicy.recovery_intermediates/sepolicy.tmp /root/havoc/out/target/product/dipper/obj/ETC/sepolicy.recovery_intermediates/sepolicy.recovery.conf ) && (/root/havoc/out/host/linux-x86/bin/sepolicy-analyze /root/havoc/out/target/product/dipper/obj/ETC/sepolicy.recovery_intermediates/sepolicy.tmp permissive > /root/havoc/out/target/product/dipper/obj/ETC/sepolicy.recovery_intermediates/sepolicy.permissivedomains ) && (if [ \"userdebug\" = \"user\" -a -s /root/havoc/out/target/product/dipper/obj/ETC/sepolicy.recovery_intermediates/sepolicy.permissivedomains ]; then echo \"==========\" 1>&2; echo \"ERROR: permissive domains not allowed in user builds\" 1>&2; echo \"List of invalid domains:\" 1>&2; cat /root/havoc/out/target/product/dipper/obj/ETC/sepolicy.recovery_intermediates/sepolicy.permissivedomains 1>&2; exit 1; fi ) && (mv /root/havoc/out/target/product/dipper/obj/ETC/sepolicy.recovery_intermediates/sepolicy.tmp /root/havoc/out/target/product/dipper/obj/ETC/sepolicy.recovery_intermediates/sepolicy )"
- device/xiaomi/sdm845-common/sepolicy/vendor/hal_camera_default.te:12:ERROR 'unknown type vendor_camera_prop' at token ';' on line 94238:
- #line 12
- allow hal_camera_default vendor_camera_prop:file { getattr open read map };
- checkpolicy: error(s) encountered while parsing configuration
- FAILED: [W][2019-12-14T22:08:25+0100][802] void cmdline::logParams(nsjconf_t *)():250 Process will be UID/EUID=0 in the global user namespace, and will have user root-level access to files
- [W][2019-12-14T22:08:25+0100][802] void cmdline::logParams(nsjconf_t *)():260 Process will be GID/EGID=0 in the global user namespace, and will have group root-level access to files
- 23:16:29 ninja failed with: exit status 1
- #### failed to build some targets (01:11:00 (hh:mm:ss)) ####
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement