property.te: delete security_prop
This property is never used.
Test: policy compiles
Change-Id: I43ace92950e1221754db28548031fbbfc0437d7a
diff --git a/private/property_contexts b/private/property_contexts
index 51b9ff8..2e0b2dd 100644
--- a/private/property_contexts
+++ b/private/property_contexts
@@ -65,7 +65,6 @@
# selinux non-persistent properties
selinux.restorecon_recursive u:object_r:restorecon_prop:s0
-selinux. u:object_r:security_prop:s0
# default property context
* u:object_r:default_prop:s0
diff --git a/public/domain.te b/public/domain.te
index 696d302..1dac142 100644
--- a/public/domain.te
+++ b/public/domain.te
@@ -229,9 +229,6 @@
# It is sealed.
neverallow * kernel:security load_policy;
-# Only init and the system_server shall use the property_service.
-neverallow { domain -init -system_server } security_prop:property_service set;
-
# Only init prior to switching context should be able to set enforcing mode.
# init starts in kernel domain and switches to init domain via setcon in
# the init.rc, so the setenforce occurs while still in kernel. After
diff --git a/public/property.te b/public/property.te
index 1ad1dd0..e4b8d6e 100644
--- a/public/property.te
+++ b/public/property.te
@@ -35,7 +35,6 @@
type radio_prop, property_type, core_property_type;
type restorecon_prop, property_type, core_property_type;
type safemode_prop, property_type;
-type security_prop, property_type, core_property_type;
type shell_prop, property_type, core_property_type;
type system_prop, property_type, core_property_type;
type system_radio_prop, property_type, core_property_type;