[ALPS03800946] Remove data_between_core_and_vendor_violators

[Detail]
data_between_core_and_vendor_violators is used temporarily. We should
follow Android P SELinux rule to write sepolicy.

[Solution]
Remove data_between_core_and_vendor_violators from files which already
fix SELinux build errors

Change-Id: I5e840fdf6b61d44860429a7e5c7e24c9a48a9c75
CR-Id: ALPS03800946
Feature: Treble
diff --git a/non_plat/factory.te b/non_plat/factory.te
index 6c45166..dd743d9 100644
--- a/non_plat/factory.te
+++ b/non_plat/factory.te
@@ -74,7 +74,6 @@
 
 # Date: WK15.46
 # Purpose: gps factory mode
-####typeattribute factory data_between_core_and_vendor_violators;
 ###allow factory agpsd_data_file:dir search;
 allow factory apk_data_file:dir write;
 #allow factory gps_data_file:dir r_dir_perms;
diff --git a/non_plat/fuelgauged.te b/non_plat/fuelgauged.te
index 76f03d3..c03c59d 100644
--- a/non_plat/fuelgauged.te
+++ b/non_plat/fuelgauged.te
@@ -53,7 +53,6 @@
 # Purpose : For fg daemon can access /data/FG folder
 #file_type_auto_trans(fuelgauged, system_data_file, fuelgauged_file);
 #allow fuelgauged fuelgauged_file:file rw_file_perms;
-#typeattribute fuelgauged data_between_core_and_vendor_violators;
 #allow fuelgauged system_data_file:dir rw_dir_perms;
 
 # Data : WK16.21
diff --git a/non_plat/fuelgauged_nvram.te b/non_plat/fuelgauged_nvram.te
index 42d1737..7ec62dc 100644
--- a/non_plat/fuelgauged_nvram.te
+++ b/non_plat/fuelgauged_nvram.te
@@ -27,7 +27,6 @@
 # Purpose : For fg daemon can access /data/FG folder
 #file_type_auto_trans(fuelgauged_nvram, system_data_file, fuelgauged_nvram_file);
 #allow fuelgauged_nvram fuelgauged_nvram_file:file rw_file_perms;
-#typeattribute fuelgauged_nvram data_between_core_and_vendor_violators;
 #allow fuelgauged_nvram system_data_file:dir rw_dir_perms;
 
 # Data : WK16.21
diff --git a/non_plat/nvram_agent_binder.te b/non_plat/nvram_agent_binder.te
index bb42264..37a752d 100644
--- a/non_plat/nvram_agent_binder.te
+++ b/non_plat/nvram_agent_binder.te
@@ -40,7 +40,6 @@
 allow nvram_agent_binder property_socket:sock_file write;
 allow nvram_agent_binder sysfs:file write;
 #allow nvram_agent_binder self:capability { fowner chown dac_override fsetid };
-#typeattribute nvram_agent_binder data_between_core_and_vendor_violators;
 #remove from Android P
 #allow nvram_agent_binder system_data_file:dir create_file_perms;
 
@@ -71,4 +70,4 @@
 # Date : WK18.16
 # Operation: P migration
 # Purpose: Allow nvram_daemon to get tel_switch_prop
-get_prop(nvram_daemon, tel_switch_prop)
\ No newline at end of file
+get_prop(nvram_daemon, tel_switch_prop)
diff --git a/non_plat/nvram_daemon.te b/non_plat/nvram_daemon.te
index b55e5ef..309177d 100644
--- a/non_plat/nvram_daemon.te
+++ b/non_plat/nvram_daemon.te
@@ -70,7 +70,6 @@
 
 # Purpose: for workaround
 # Todo: Remove this policy
-#typeattribute nvram_daemon data_between_core_and_vendor_violators;
 #remove from Android P
 #allow nvram_daemon system_data_file:dir write;
 
@@ -105,4 +104,4 @@
 # Date : WK18.16
 # Operation: P migration
 # Purpose: Allow nvram_daemon to get tel_switch_prop
-get_prop(nvram_daemon, tel_switch_prop)
\ No newline at end of file
+get_prop(nvram_daemon, tel_switch_prop)
diff --git a/plat_private/kisd.te b/plat_private/kisd.te
index 59d6a00..46897b3 100644
--- a/plat_private/kisd.te
+++ b/plat_private/kisd.te
@@ -16,7 +16,6 @@
 init_daemon_domain(kisd)
 
 allow kisd tee_device:chr_file {read write open ioctl};
-#typeattribute kisd data_between_core_and_vendor_violators;
 allow kisd provision_file:dir {read write open ioctl add_name search remove_name};
 allow kisd provision_file:file {create read write open getattr unlink};
 allow kisd system_file:file {execute_no_trans};
diff --git a/prebuilts/api/26.0/plat_private/kisd.te b/prebuilts/api/26.0/plat_private/kisd.te
index 0b9efbb..46897b3 100755
--- a/prebuilts/api/26.0/plat_private/kisd.te
+++ b/prebuilts/api/26.0/plat_private/kisd.te
@@ -16,7 +16,6 @@
 init_daemon_domain(kisd)
 
 allow kisd tee_device:chr_file {read write open ioctl};
-typeattribute kisd data_between_core_and_vendor_violators;
 allow kisd provision_file:dir {read write open ioctl add_name search remove_name};
 allow kisd provision_file:file {create read write open getattr unlink};
 allow kisd system_file:file {execute_no_trans};