property.te: delete security_prop

This property is never used.

Test: policy compiles
Change-Id: I43ace92950e1221754db28548031fbbfc0437d7a
diff --git a/private/property_contexts b/private/property_contexts
index 51b9ff8..2e0b2dd 100644
--- a/private/property_contexts
+++ b/private/property_contexts
@@ -65,7 +65,6 @@
 
 # selinux non-persistent properties
 selinux.restorecon_recursive   u:object_r:restorecon_prop:s0
-selinux.                       u:object_r:security_prop:s0
 
 # default property context
 *                       u:object_r:default_prop:s0
diff --git a/public/domain.te b/public/domain.te
index 696d302..1dac142 100644
--- a/public/domain.te
+++ b/public/domain.te
@@ -229,9 +229,6 @@
 # It is sealed.
 neverallow * kernel:security load_policy;
 
-# Only init and the system_server shall use the property_service.
-neverallow { domain -init -system_server } security_prop:property_service set;
-
 # Only init prior to switching context should be able to set enforcing mode.
 # init starts in kernel domain and switches to init domain via setcon in
 # the init.rc, so the setenforce occurs while still in kernel. After
diff --git a/public/property.te b/public/property.te
index 1ad1dd0..e4b8d6e 100644
--- a/public/property.te
+++ b/public/property.te
@@ -35,7 +35,6 @@
 type radio_prop, property_type, core_property_type;
 type restorecon_prop, property_type, core_property_type;
 type safemode_prop, property_type;
-type security_prop, property_type, core_property_type;
 type shell_prop, property_type, core_property_type;
 type system_prop, property_type, core_property_type;
 type system_radio_prop, property_type, core_property_type;