diff --git a/private/property_contexts b/private/property_contexts index 51b9ff8c6f557e45dcafa470bd04b21dc3123276..2e0b2dd3f33bb1a44789d3da45aac6600ca8a56b 100644 --- a/private/property_contexts +++ b/private/property_contexts @@ -65,7 +65,6 @@ ro.device_owner u:object_r:device_logging_prop:s0 # selinux non-persistent properties selinux.restorecon_recursive u:object_r:restorecon_prop:s0 -selinux. u:object_r:security_prop:s0 # default property context * u:object_r:default_prop:s0 diff --git a/public/domain.te b/public/domain.te index 696d3029eb92d5bc2f912af53b6726cc26982860..1dac142959c1f1665eca208ce9f8a6c74c34d8be 100644 --- a/public/domain.te +++ b/public/domain.te @@ -229,9 +229,6 @@ neverallow { domain -recovery } self:capability2 mac_admin; # It is sealed. neverallow * kernel:security load_policy; -# Only init and the system_server shall use the property_service. -neverallow { domain -init -system_server } security_prop:property_service set; - # Only init prior to switching context should be able to set enforcing mode. # init starts in kernel domain and switches to init domain via setcon in # the init.rc, so the setenforce occurs while still in kernel. After diff --git a/public/property.te b/public/property.te index 1ad1dd007e84c4bf24c53b2c0c0495dc5750e882..e4b8d6e434b33c39f4c31a9af72e3d11436cb2d2 100644 --- a/public/property.te +++ b/public/property.te @@ -35,7 +35,6 @@ type powerctl_prop, property_type, core_property_type; type radio_prop, property_type, core_property_type; type restorecon_prop, property_type, core_property_type; type safemode_prop, property_type; -type security_prop, property_type, core_property_type; type shell_prop, property_type, core_property_type; type system_prop, property_type, core_property_type; type system_radio_prop, property_type, core_property_type;