Please carefully go through the policy definitions/rules made for the
fingerprint.
What I understand is your service/daemon is trying to access device
mmcblk0p24 which you need to provide policy rules.
Interpret your denial message using audit2allow tool that ships with AOSP.
https://source.android.com/security/selinux/validate
On Monday, June 26, 2017 at 5:26:07 PM UTC+2, Pig wrote:
>
> Hi, I'm building AOSP for my Xiaomi device. My fingerprint policy are
> denied and I'm trying to make it work
>
> [ 35.665744] type=1400 audit(1498189086.388:22): avc: denied {
> execute_no_trans } for pid=3018 comm="init" path="/system/bin/gx_fpd"
> dev="mmcblk0p24" ino=271 scontext=u:r:init:s0
> tcontext=u:object_r:system_file:s0 tclass=file permissive=0
>
>
> I was use
>
> allow init system_file:file execute_no_trans;
>
> for this but I got this when trying to build
>
> libsepol.report_failure: neverallow on line 294 of external/sepolicy/init.te
> (or line 7687 of policy.conf) violated by allow init system_file:file {
> execute_no_trans };
> libsepol.check_assertions: 1 neverallow failures occurred
>
>
--
--
unsubscribe: [email protected]
website: http://groups.google.com/group/android-porting
---
You received this message because you are subscribed to the Google Groups
"android-porting" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.