Untitled

mail@pastecode.io avatar
unknown
plain_text
a year ago
15 kB
8
Indexable
Never
FAILED: //system/sepolicy:sepolicy.recovery Compiling cil files for sepolicy.recovery [common]
Outputs: /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/sepolicy.recovery/android_common/sepolicy
Error: exited with code: 1
Command: /home/masarou/android/aosp-pixelish/out/host/linux-x86/bin/secilc -m -M true -G -c 30 /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/recovery_sepolicy.cil/android_common/recovery_sepolicy.cil -o /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/sepolicy.recovery/android_common/sepolicy_policy -f /dev/null && /home/masarou/android/aosp-pixelish/out/host/linux-x86/bin/sepolicy-analyze /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/sepolicy.recovery/android_common/sepolicy_policy permissive  >  /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/sepolicy.recovery/android_common/sepolicy_permissive && if test -s /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/sepolicy.recovery/android_common/sepolicy_permissive ; then echo -e "==========\nERROR: permissive domains not allowed in user builds\nList of invalid domains:" && cat  /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/sepolicy.recovery/android_common/sepolicy_permissive ; exit 1; fi && cp -f /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/sepolicy.recovery/android_common/sepolicy_policy /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/sepolicy.recovery/android_common/sepolicy && rm -f /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/sepolicy.recovery/android_common/sepolicy_permissive /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/sepolicy.recovery/android_common/sepolicy_policy # hash of input list: cb69508c9d54cc53c5cc62842622a9602575ad0c17a0515cd570bd25ed13ecc1
Output:
neverallow check failed at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/recovery_sepolicy.cil/android_common/recovery_sepolicy.cil:22436 from system/sepolicy/private/domain.te:293
  (neverallow base_typeattr_608 base_typeattr_609 (file (execute)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/recovery_sepolicy.cil/android_common/recovery_sepolicy.cil:39828
      (allow hal_camera_default mnt_vendor_file (file (execute)))

Failed to generate binary
Failed to build policydb



FAILED: //system/sepolicy:precompiled_sepolicy Compiling cil files for precompiled_sepolicy [common]
Outputs: /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/precompiled_sepolicy/android_common/precompiled_sepolicy
Error: exited with code: 1
Command: /home/masarou/android/aosp-pixelish/out/host/linux-x86/bin/secilc -m -M true -G -c 30 /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/plat_sepolicy.cil/android_common/plat_sepolicy.cil /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/apex_sepolicy-33.cil/android_common/apex_sepolicy.cil /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/plat_pub_versioned.cil/android_common/plat_pub_versioned.cil /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/system_ext_sepolicy.cil/android_common/system_ext_sepolicy.cil /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/product_sepolicy.cil/android_common/product_sepolicy.cil /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/odm_sepolicy.cil/android_common/odm_sepolicy.cil /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/plat_mapping_file/android_common/33.0.cil /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/system_ext_mapping_file/android_common/33.0.cil /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/product_mapping_file/android_common/33.0.cil -o /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/precompiled_sepolicy/android_common/precompiled_sepolicy_policy -f /dev/null && /home/masarou/android/aosp-pixelish/out/host/linux-x86/bin/sepolicy-analyze /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/precompiled_sepolicy/android_common/precompiled_sepolicy_policy permissive  >  /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/precompiled_sepolicy/android_common/precompiled_sepolicy_permissive && if test -s /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/precompiled_sepolicy/android_common/precompiled_sepolicy_permissive ; then echo -e "==========\nERROR: permissive domains not allowed in user builds\nList of invalid domains:" && cat  /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/precompiled_sepolicy/android_common/precompiled_sepolicy_permissive ; exit 1; fi && cp -f /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/precompiled_sepolicy/android_common/precompiled_sepolicy_policy /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/precompiled_sepolicy/android_common/precompiled_sepolicy && rm -f /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/precompiled_sepolicy/android_common/precompiled_sepolicy_permissive /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/precompiled_sepolicy/android_common/precompiled_sepolicy_policy # hash of input list: 9f1c03a6fe005cbea31a9243dd44093fbe2a7124331aa076b94547edfdf54b3c
Output:
neverallow check failed at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/plat_pub_versioned.cil/android_common/plat_pub_versioned.cil:10280
  (neverallow base_typeattr_515_33_0 vendor_default_prop_33_0 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8486
      (allow platform_app_33_0 vendor_default_prop_33_0 (file (getattr map open)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8492
      (allow system_app_33_0 vendor_default_prop_33_0 (file (getattr map open)))

neverallow check failed at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/plat_pub_versioned.cil/android_common/plat_pub_versioned.cil:10278
  (neverallow base_typeattr_221_33_0 default_prop_33_0 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8475
      (allow hal_camera_default default_prop_33_0 (file (read getattr map open)))

neverallow check failed at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/plat_pub_versioned.cil/android_common/plat_pub_versioned.cil:6234
  (neverallow base_typeattr_270_33_0 base_typeattr_271_33_0 (file (execute)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8470
      (allow cameraserver_33_0 vendor_file_33_0 (file (read getattr map execute open)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8480
      (allow mediaserver_33_0 vendor_file_33_0 (file (read getattr map execute open)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8487
      (allow platform_app_33_0 vendor_file_33_0 (file (read getattr map execute open)))

neverallow check failed at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/plat_sepolicy.cil/android_common/plat_sepolicy.cil:24249 from system/sepolicy/private/property.te:57
  (neverallow base_typeattr_518 base_typeattr_790 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8486
      (allow platform_app_33_0 vendor_default_prop_33_0 (file (getattr map open)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8492
      (allow system_app_33_0 vendor_default_prop_33_0 (file (getattr map open)))

neverallow check failed at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/plat_sepolicy.cil/android_common/plat_sepolicy.cil:24239 from system/sepolicy/private/property.te:57
  (neverallow base_typeattr_224 base_typeattr_788 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8475
      (allow hal_camera_default default_prop_33_0 (file (read getattr map open)))

neverallow check failed at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/plat_sepolicy.cil/android_common/plat_sepolicy.cil:20156 from system/sepolicy/private/domain.te:508
  (neverallow base_typeattr_677 base_typeattr_678 (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8470
      (allow cameraserver_33_0 vendor_file_33_0 (file (read getattr map execute open)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8480
      (allow mediaserver_33_0 vendor_file_33_0 (file (read getattr map execute open)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8487
      (allow platform_app_33_0 vendor_file_33_0 (file (read getattr map execute open)))

neverallow check failed at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/plat_sepolicy.cil/android_common/plat_sepolicy.cil:20085 from system/sepolicy/private/domain.te:469
  (neverallow base_typeattr_674 vendor_file (file (write create setattr relabelfrom append unlink link rename execute open execute_no_trans)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8470
      (allow cameraserver_33_0 vendor_file_33_0 (file (read getattr map execute open)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8480
      (allow mediaserver_33_0 vendor_file_33_0 (file (read getattr map execute open)))

neverallow check failed at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/plat_sepolicy.cil/android_common/plat_sepolicy.cil:19987 from system/sepolicy/private/domain.te:293
  (neverallow base_typeattr_661 base_typeattr_662 (file (execute)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8476
      (allow hal_camera_default mnt_vendor_file_33_0 (file (execute)))

neverallow check failed at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/plat_sepolicy.cil/android_common/plat_sepolicy.cil:14773 from system/sepolicy/public/property.te:302
  (neverallow base_typeattr_518 vendor_default_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8486
      (allow platform_app_33_0 vendor_default_prop_33_0 (file (getattr map open)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8492
      (allow system_app_33_0 vendor_default_prop_33_0 (file (getattr map open)))

neverallow check failed at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/plat_sepolicy.cil/android_common/plat_sepolicy.cil:14763 from system/sepolicy/public/property.te:232
  (neverallow base_typeattr_224 default_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8475
      (allow hal_camera_default default_prop_33_0 (file (read getattr map open)))

neverallow check failed at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/plat_sepolicy.cil/android_common/plat_sepolicy.cil:8455 from system/sepolicy/public/domain.te:963
  (neverallow base_typeattr_273 base_typeattr_274 (file (execute)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8470
      (allow cameraserver_33_0 vendor_file_33_0 (file (read getattr map execute open)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8480
      (allow mediaserver_33_0 vendor_file_33_0 (file (read getattr map execute open)))
    <root>
    allow at /home/masarou/android/aosp-pixelish/out/soong/.intermediates/system/sepolicy/vendor_sepolicy.cil/android_common/vendor_sepolicy.cil:8487
      (allow platform_app_33_0 vendor_file_33_0 (file (read getattr map execute open)))

Failed to generate binary
Failed to build policydb