-
Notifications
You must be signed in to change notification settings - Fork 29
Description
[W][2021-06-22T15:58:45+0530][54437] void cmdline::logParams(nsjconf_t *)():260 Process will be GID/EGID=0 in the global user namespace, and will have group root-level access to files
[ 2% 2/92] build out/target/product/blueline/obj/ETC/sepolicy_neverallows_intermediates/sepolicy_neverallows
FAILED: out/target/product/blueline/obj/ETC/sepolicy_neverallows_intermediates/sepolicy_neverallows
/bin/bash -c "(ASAN_OPTIONS=detect_leaks=0 out/host/linux-x86/bin/checkpolicy -M -c 30 -o out/target/product/blueline/obj/ETC/sepolicy_neverallows_intermediates/sepolicy_neverallows.tmp out/target/product/blueline/obj/ETC/sepolicy_neverallows_intermediates/policy.conf ) && (out/host/linux-x86/bin/sepolicy-analyze out/target/product/blueline/obj/ETC/sepolicy_neverallows_intermediates/sepolicy_neverallows.tmp neverallow -w -f out/target/product/blueline/obj/ETC/sepolicy_neverallows_intermediates/policy_2.conf || ( echo "" 1>&2; echo "sepolicy-analyze failed. This is most likely due to the use" 1>&2; echo "of an expanded attribute in a neverallow assertion. Please fix" 1>&2; echo "the policy." 1>&2; exit 1 ) ) && (touch out/target/product/blueline/obj/ETC/sepolicy_neverallows_intermediates/sepolicy_neverallows.tmp ) && (mv out/target/product/blueline/obj/ETC/sepolicy_neverallows_intermediates/sepolicy_neverallows.tmp out/target/product/blueline/obj/ETC/sepolicy_neverallows_intermediates/sepolicy_neverallows )"
system/sepolicy/private/init.te:35:ERROR 'unknown type tcpdump' at token ';' on line 35810:
allow init tcpdump:process transition;
checkpolicy: error(s) encountered while parsing configuration
[ 3% 3/92] build out/target/product/blueline/obj/ETC/sepolicy.recovery_intermediates/sepolicy
FAILED: out/target/product/blueline/obj/ETC/sepolicy.recovery_intermediates/sepolicy
/bin/bash -c "(ASAN_OPTIONS=detect_leaks=0 out/host/linux-x86/bin/checkpolicy -M -c 30 -o out/target/product/blueline/obj/ETC/sepolicy.recovery_intermediates/sepolicy.tmp out/target/product/blueline/obj/ETC/sepolicy.recovery_intermediates/sepolicy.recovery.conf ) && (out/host/linux-x86/bin/sepolicy-analyze out/target/product/blueline/obj/ETC/sepolicy.recovery_intermediates/sepolicy.tmp permissive > out/target/product/blueline/obj/ETC/sepolicy.recovery_intermediates/sepolicy.permissivedomains ) && (if [ "userdebug" = "user" -a -s out/target/product/blueline/obj/ETC/sepolicy.recovery_intermediates/sepolicy.permissivedomains ]; then echo "==========" 1>&2; echo "ERROR: permissive domains not allowed in user builds" 1>&2; echo "List of invalid domains:" 1>&2; cat out/target/product/blueline/obj/ETC/sepolicy.recovery_intermediates/sepolicy.permissivedomains 1>&2; exit 1; fi ) && (mv out/target/product/blueline/obj/ETC/sepolicy.recovery_intermediates/sepolicy.tmp out/target/product/blueline/obj/ETC/sepolicy.recovery_intermediates/sepolicy )"
system/sepolicy/private/init.te:35:ERROR 'unknown type tcpdump' at token ';' on line 37711:
allow init tcpdump:process transition;
checkpolicy: error(s) encountered while parsing configuration
FAILED: [W][2021-06-22T15:58:45+0530][54451] void cmdline::logParams(nsjconf_t *)():250 Process will be UID/EUID=0 in the global user namespace, and will have user root-level access to files
[W][2021-06-22T15:58:45+0530][54451] void cmdline::logParams(nsjconf_t *)():260 Process will be GID/EGID=0 in the global user namespace, and will have group root-level access to files
15:58:46 ninja failed with: exit status 1