1. allow domain process can use fd
2. allow domain process can write data to file in /data/vendor/aee_exp/
MTK-Commit-Id: 7b021c62aa51a474e12c59a805f97b27b940e357
Change-Id: I286e248c8fd3fe05492753a91806c19ffce0079d
CR-Id: ALPS04864227
Feature: Android Exception Engine(AEE)
[Detail]
libudf.so has been place in both system and vendor,
so dont need these sepolicies anymore.
[Solution]
Remove unused sepolicies of libudf.so
MTK-Commit-Id: 8e79905072cf0855c1c50c679681fd33b936b54f
Change-Id: I051c61e5be725dab8b3375adc6f52882556cc3c1
CR-Id: ALPS04760380
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
Restore the policies accessing files labeled
as proc_xxx or sysfs_xxx, but there are some
exceptions for coredomain process, such as
meta_tst,dump_state,kpoc_charger
MTK-Commit-Id: 7953b5203bb3cac099c3326d330643b4cd73746d
Change-Id: I4b16c09c352891783e837bea370c264966ca6d13
CR-Id: ALPS03825066
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK
[Detail] Google add new neverallows rules on android P,
some rule violate the rules
[Solution] Remove the rules which violate google new rules
MTK-Commit-Id: ff683b4eee0a6dd95ff25fbb6c7d1fc3a79c604d
Change-Id: Iead494212c6adcec234eaef14c83d1f8c7a49deb
CR-Id: ALPS03825066
Feature: [Android Default] SELinux, SEAndroid, and SE-MTK