Advertisement
Guest User

Error

a guest
Jul 20th, 2019
223
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 13.00 KB | None | 0 0
  1. [ 0% 43/59028] build /home/ikaros/havoc/out/target/product/whyred/obj/ETC/sepolicy_neverallows_intermediates/sepolicy_neverallows FAILED: /home/ikaros/havoc/out/target/product/whyred/obj/ETC/sepolicy_neverallows_intermediates/sepolicy_neverallows /bin/bash -c "(rm -f /home/ikaros/havoc/out/target/product/whyred/obj/ETC/sepolicy_neverallows_intermediates/sepolicy_neverallows ) && (ASAN_OPTIONS=detect_leaks=0 /home/ikaros/havoc/out/host/linux-x86/bin/checkpolicy -M -c 30 -o /home/ikaros/havoc/out/target/product/whyred/obj/ETC/sepolicy_neverallows_intermediates/sepolicy_neverallows /home/ikaros/havoc/out/target/product/whyred/obj/ETC/sepolicy_neverallows_intermediates/policy.conf )" libsepol.report_failure: neverallow on line 32 of device/qcom/sepolicy/vendor/common/domain.te (or line 48638 of policy.conf) violated by allow priv_app mnt_vendor_file:dir { search }; libsepol.report_failure: neverallow on line 31 of system/sepolicy/private/domain.te (or line 27974 of policy.conf) violated by allow priv_app sysfs:file { read }; libsepol.report_failure: neverallow on line 31 of system/sepolicy/private/domain.te (or line 27974 of policy.conf) violated by allow system_server sysfs:file { read }; libsepol.report_failure: neverallow on line 235 of system/sepolicy/private/app_neverallows.te (or line 26385 of policy.conf) violated by allow untrusted_app_27 hal_memtrack_hwservice:hwservice_manager { find }; libsepol.report_failure: neverallow on line 193 of system/sepolicy/private/app_neverallows.te (or line 26325 of policy.conf) violated by allow untrusted_app_27 hal_memtrack_hwservice:hwservice_manager { find }; libsepol.report_failure: neverallow on line 1433 of system/sepolicy/public/domain.te (or line 12264 of policy.conf) violated by allow priv_app mnt_vendor_file:dir { search }; libsepol.report_failure: neverallow on line 1400 of system/sepolicy/public/domain.te (or line 12235 of policy.conf) violated by allow time_daemon time_daemon:capability { dac_read_search }; libsepol.report_failure: neverallow on line 1392 of system/sepolicy/public/domain.te (or line 12185 of policy.conf) violated by allow time_daemon time_daemon:capability { dac_override }; libsepol.report_failure: neverallow on line 1320 of system/sepolicy/public/domain.te (or line 12079 of policy.conf) violated by allow hal_power_default debugfs:file { read open }; libsepol.report_failure: neverallow on line 898 of system/sepolicy/public/domain.te (or line 11554 of policy.conf) violated by allow vendor_init system_data_file:dir { write setattr }; libsepol.report_failure: neverallow on line 870 of system/sepolicy/public/domain.te (or line 11527 of policy.conf) violated by allow vendor_init tombstone_data_file:dir { search }; libsepol.report_failure: neverallow on line 870 of system/sepolicy/public/domain.te (or line 11527 of policy.conf) violated by allow vendor_init media_rw_data_file:dir { setattr }; libsepol.report_failure: neverallow on line 523 of system/sepolicy/public/domain.te (or line 10880 of policy.conf) violated by allow system_server default_android_hwservice:hwservice_manager { find }; libsepol.check_assertions: 13 neverallow failures occurred Error while expanding policy /home/ikaros/havoc/out/host/linux-x86/bin/checkpolicy: loading policy configuration from /home/ikaros/havoc/out/target/product/whyred/obj/ETC/sepolicy_neverallows_intermediates/policy.conf [ 0% 44/59028] build /home/ikaros/havoc/out/target/product/whyred/obj/ETC/sepolicy.recovery_intermediates/sepolicy FAILED: /home/ikaros/havoc/out/target/product/whyred/obj/ETC/sepolicy.recovery_intermediates/sepolicy /bin/bash -c "(ASAN_OPTIONS=detect_leaks=0 /home/ikaros/havoc/out/host/linux-x86/bin/checkpolicy -M -c 30 -o /home/ikaros/havoc/out/target/product/whyred/obj/ETC/sepolicy.recovery_intermediates/sepolicy.tmp /home/ikaros/havoc/out/target/product/whyred/obj/ETC/sepolicy.recovery_intermediates/sepolicy.recovery.conf ) && (/home/ikaros/havoc/out/host/linux-x86/bin/sepolicy-analyze /home/ikaros/havoc/out/target/product/whyred/obj/ETC/sepolicy.recovery_intermediates/sepolicy.tmp permissive > /home/ikaros/havoc/out/target/product/whyred/obj/ETC/sepolicy.recovery_intermediates/sepolicy.permissivedomains ) && (if [ \"userdebug\" = \"user\" -a -s /home/ikaros/havoc/out/target/product/whyred/obj/ETC/sepolicy.recovery_intermediates/sepolicy.permissivedomains ]; then echo \"==========\" 1>&2; echo \"ERROR: permissive domains not allowed in user builds\" 1>&2; echo \"List of invalid domains:\" 1>&2; cat /home/ikaros/havoc/out/target/product/whyred/obj/ETC/sepolicy.recovery_intermediates/sepolicy.permissivedomains 1>&2; exit 1; fi ) && (mv /home/ikaros/havoc/out/target/product/whyred/obj/ETC/sepolicy.recovery_intermediates/sepolicy.tmp /home/ikaros/havoc/out/target/product/whyred/obj/ETC/sepolicy.recovery_intermediates/sepolicy )" libsepol.report_failure: neverallow on line 32 of device/qcom/sepolicy/vendor/common/domain.te (or line 51692 of policy.conf) violated by allow priv_app mnt_vendor_file:dir { search }; libsepol.report_failure: neverallow on line 235 of system/sepolicy/private/app_neverallows.te (or line 27219 of policy.conf) violated by allow untrusted_app_27 hal_memtrack_hwservice:hwservice_manager { find }; libsepol.report_failure: neverallow on line 193 of system/sepolicy/private/app_neverallows.te (or line 27159 of policy.conf) violated by allow untrusted_app_27 hal_memtrack_hwservice:hwservice_manager { find }; libsepol.report_failure: neverallow on line 1433 of system/sepolicy/public/domain.te (or line 11633 of policy.conf) violated by allow priv_app mnt_vendor_file:dir { search }; libsepol.report_failure: neverallow on line 1400 of system/sepolicy/public/domain.te (or line 11595 of policy.conf) violated by allow time_daemon time_daemon:capability { dac_read_search }; libsepol.report_failure: neverallow on line 1392 of system/sepolicy/public/domain.te (or line 11545 of policy.conf) violated by allow time_daemon time_daemon:capability { dac_override }; libsepol.report_failure: neverallow on line 1320 of system/sepolicy/public/domain.te (or line 11462 of policy.conf) violated by allow hal_power_default debugfs:file { read open }; libsepol.report_failure: neverallow on line 523 of system/sepolicy/public/domain.te (or line 10994 of policy.conf) violated by allow system_server default_android_hwservice:hwservice_manager { find }; libsepol.check_assertions: 8 neverallow failures occurred Error while expanding policy /home/ikaros/havoc/out/host/linux-x86/bin/checkpolicy: loading policy configuration from /home/ikaros/havoc/out/target/product/whyred/obj/ETC/sepolicy.recovery_intermediates/sepolicy.recovery.conf [ 0% 46/59028] Building Kernel Config make: Entering directory '/home/ikaros/havoc/kernel/xiaomi/whyred' make[1]: Entering directory '/home/ikaros/havoc/out/target/product/whyred/obj/KERNEL_OBJ' GEN ./Makefile # # configuration written to .config # make[1]: Leaving directory '/home/ikaros/havoc/out/target/product/whyred/obj/KERNEL_OBJ' make: Leaving directory '/home/ikaros/havoc/kernel/xiaomi/whyred' make: Entering directory '/home/ikaros/havoc/kernel/xiaomi/whyred' make[1]: Entering directory '/home/ikaros/havoc/out/target/product/whyred/obj/KERNEL_OBJ' GEN ./Makefile scripts/kconfig/conf --savedefconfig=defconfig Kconfig make[1]: Leaving directory '/home/ikaros/havoc/out/target/product/whyred/obj/KERNEL_OBJ' make: Leaving directory '/home/ikaros/havoc/kernel/xiaomi/whyred' ninja: build stopped: subcommand failed. 22:41:58 ninja failed with: exit status 1
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement