diff --git a/sepolicy/vendor/file_contexts b/sepolicy/vendor/file_contexts index f17da11..a26e859 100644 --- a/sepolicy/vendor/file_contexts +++ b/sepolicy/vendor/file_contexts @@ -67,7 +67,7 @@ /data/vendor/misc/cutback(/.*)? u:object_r:vendor_radio_data_file:s0 /data/vendor/fpc(/.*)? u:object_r:fingerprint_data_file:s0 /data/vendor/fpc/socket u:object_r:fingerprint_socket:s0 -/data/vendor/.fps(/.*)? u:object_r:fingerprint_data_file:s0 +/data/vendor/\.fps(/.*)? u:object_r:fingerprint_data_file:s0 # Input devices /(vendor|system/vendor)/usr/idc(/.*)? u:object_r:vendor_idc_file:s0 diff --git a/sepolicy/vendor/hal_fingerprint_fpc.te b/sepolicy/vendor/hal_fingerprint_fpc.te index c239cfe..4e7b598 100644 --- a/sepolicy/vendor/hal_fingerprint_fpc.te +++ b/sepolicy/vendor/hal_fingerprint_fpc.te @@ -34,7 +34,7 @@ allow hal_fingerprint_fpc self:netlink_socket create_socket_perms_no_ioctl; allow hal_fingerprint_fpc system_fps_data_file:dir { create_dir_perms }; allow hal_fingerprint_fpc system_fps_data_file:file { create_file_perms }; -allow hal_fingerprint_fpc fingerprintd_data_file:dir rw_dir_perms; +allow hal_fingerprint_fpc fingerprintd_data_file:dir create_dir_perms; allow hal_fingerprint_fpc fingerprintd_data_file:file create_file_perms; allow hal_fingerprint_fpc tee_device:chr_file getattr;