Please carefully go through the policy definitions/rules made for the 
fingerprint.
What I understand is your service/daemon is trying to access device 
mmcblk0p24 which you need to provide policy rules.
Interpret your denial message using audit2allow tool that ships with AOSP.
https://source.android.com/security/selinux/validate


On Monday, June 26, 2017 at 5:26:07 PM UTC+2, Pig wrote:
>
> Hi, I'm building AOSP for my Xiaomi device. My fingerprint policy are 
> denied and I'm trying to make it work
>
> [   35.665744] type=1400 audit(1498189086.388:22): avc: denied { 
> execute_no_trans } for pid=3018 comm="init" path="/system/bin/gx_fpd" 
> dev="mmcblk0p24" ino=271 scontext=u:r:init:s0 
> tcontext=u:object_r:system_file:s0 tclass=file permissive=0
>
>
> I was use 
>
> allow init system_file:file execute_no_trans;
>
> for this but I got this when trying to build
>
> libsepol.report_failure: neverallow on line 294 of external/sepolicy/init.te 
> (or line 7687 of policy.conf) violated by allow init system_file:file { 
> execute_no_trans };
> libsepol.check_assertions: 1 neverallow failures occurred
>
>

-- 
-- 
unsubscribe: android-porting+unsubscr...@googlegroups.com
website: http://groups.google.com/group/android-porting

--- 
You received this message because you are subscribed to the Google Groups 
"android-porting" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to android-porting+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to