Please carefully go through the policy definitions/rules made for the fingerprint. What I understand is your service/daemon is trying to access device mmcblk0p24 which you need to provide policy rules. Interpret your denial message using audit2allow tool that ships with AOSP. https://source.android.com/security/selinux/validate
On Monday, June 26, 2017 at 5:26:07 PM UTC+2, Pig wrote: > > Hi, I'm building AOSP for my Xiaomi device. My fingerprint policy are > denied and I'm trying to make it work > > [ 35.665744] type=1400 audit(1498189086.388:22): avc: denied { > execute_no_trans } for pid=3018 comm="init" path="/system/bin/gx_fpd" > dev="mmcblk0p24" ino=271 scontext=u:r:init:s0 > tcontext=u:object_r:system_file:s0 tclass=file permissive=0 > > > I was use > > allow init system_file:file execute_no_trans; > > for this but I got this when trying to build > > libsepol.report_failure: neverallow on line 294 of external/sepolicy/init.te > (or line 7687 of policy.conf) violated by allow init system_file:file { > execute_no_trans }; > libsepol.check_assertions: 1 neverallow failures occurred > > -- -- unsubscribe: android-porting+unsubscr...@googlegroups.com website: http://groups.google.com/group/android-porting --- You received this message because you are subscribed to the Google Groups "android-porting" group. To unsubscribe from this group and stop receiving emails from it, send an email to android-porting+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.