Drop fuse_device neverallow rules

The fuse_device neverallow rules are too aggressive and are inhibiting
certain vendor customizations. Drop them for CTS purposes.

These neverallow rules have been changed in master (see commit
45766d4178e443b29fee8cd9c8917847ea3a4cf1), but we're not attempting to
backport that change to avoid introducing new neverallow statements.

Bug: 37496487
Test: compile time assertion removal only. No device changes.
Change-Id: I2fc7d944bf91c2295d53cd41fb0d0aa73627f482
1 file changed
tree: feb299eff34c0087ed8be1f5f4885ea149c07572
  1. tools/
  2. access_vectors
  3. adbd.te
  4. Android.mk
  5. app.te
  6. atrace.te
  7. attributes
  8. audioserver.te
  9. autoplay_app.te
  10. binderservicedomain.te
  11. blkid.te
  12. blkid_untrusted.te
  13. bluetooth.te
  14. bluetoothdomain.te
  15. boot_control_hal.te
  16. bootanim.te
  17. bootstat.te
  18. cameraserver.te
  19. clatd.te
  20. CleanSpec.mk
  21. cppreopts.te
  22. debuggerd.te
  23. device.te
  24. dex2oat.te
  25. dhcp.te
  26. dnsmasq.te
  27. domain.te
  28. domain_deprecated.te
  29. drmserver.te
  30. dumpstate.te
  31. file.te
  32. file_contexts
  33. file_contexts_asan
  34. fingerprintd.te
  35. fs_use
  36. fsck.te
  37. fsck_untrusted.te
  38. gatekeeperd.te
  39. genfs_contexts
  40. global_macros
  41. gpsd.te
  42. hci_attach.te
  43. healthd.te
  44. hostapd.te
  45. idmap.te
  46. init.te
  47. initial_sid_contexts
  48. initial_sids
  49. inputflinger.te
  50. install_recovery.te
  51. installd.te
  52. ioctl_defines
  53. ioctl_macros
  54. isolated_app.te
  55. kernel.te
  56. keys.conf
  57. keystore.te
  58. lmkd.te
  59. logd.te
  60. mac_permissions.xml
  61. mdnsd.te
  62. mediacodec.te
  63. mediadrmserver.te
  64. mediaextractor.te
  65. mediaserver.te
  66. mls
  67. mls_macros
  68. MODULE_LICENSE_PUBLIC_DOMAIN
  69. mtp.te
  70. net.te
  71. netd.te
  72. neverallow_macros
  73. nfc.te
  74. NOTICE
  75. otapreopt_chroot.te
  76. otapreopt_slot.te
  77. perfprofd.te
  78. platform_app.te
  79. policy_capabilities
  80. port_contexts
  81. postinstall.te
  82. postinstall_dexopt.te
  83. ppp.te
  84. preopt2cachename.te
  85. priv_app.te
  86. profman.te
  87. property.te
  88. property_contexts
  89. racoon.te
  90. radio.te
  91. README
  92. recovery.te
  93. recovery_persist.te
  94. recovery_refresh.te
  95. rild.te
  96. roles
  97. runas.te
  98. sdcardd.te
  99. seapp_contexts
  100. security_classes
  101. service.te
  102. service_contexts
  103. servicemanager.te
  104. sgdisk.te
  105. shared_relro.te
  106. shell.te
  107. slideshow.te
  108. su.te
  109. surfaceflinger.te
  110. system_app.te
  111. system_server.te
  112. te_macros
  113. tee.te
  114. toolbox.te
  115. tzdatacheck.te
  116. ueventd.te
  117. uncrypt.te
  118. untrusted_app.te
  119. update_engine.te
  120. update_engine_common.te
  121. update_verifier.te
  122. users
  123. vdc.te
  124. vold.te
  125. watchdogd.te
  126. wpa.te
  127. zygote.te