diff --git a/app.te b/app.te
index 48db05d077b62dc6a02c4b2bd4f993a05026c4ba..7a679fdb7bbcbc215fbfbd0d7ba92f80969ac065 100644
--- a/app.te
+++ b/app.te
@@ -205,6 +205,9 @@ allow appdomain console_device:chr_file { read write };
 
 allow { appdomain -isolated_app } ion_device:chr_file rw_file_perms;
 
+# TODO: switch to meminfo service
+allow appdomain proc_meminfo:file r_file_perms;
+
 # For app fuse.
 allow appdomain app_fuse_file:file { getattr read append write };
 
diff --git a/isolated_app.te b/isolated_app.te
index 34fe41c65c81059f3979852dd2389783865ffdd1..124fde92a0637c014fe0f304b3e44462392e00ae 100644
--- a/isolated_app.te
+++ b/isolated_app.te
@@ -9,7 +9,7 @@
 ### additional following rules:
 ###
 
-type isolated_app, domain, domain_deprecated;
+type isolated_app, domain;
 app_domain(isolated_app)
 
 # Access already open app data files received over Binder or local socket IPC.
diff --git a/untrusted_app.te b/untrusted_app.te
index 1c17e3091591306b6497665fc2237478ef582416..a61384bb853d82547dd1da927c7ee26692c03f15 100644
--- a/untrusted_app.te
+++ b/untrusted_app.te
@@ -84,9 +84,6 @@ userdebug_or_eng(`
 # gdbserver for ndk-gdb ptrace attaches to app process.
 allow untrusted_app self:process ptrace;
 
-# TODO: switch to meminfo service
-allow untrusted_app proc_meminfo:file r_file_perms;
-
 # access /proc/net/xt_qtguid/stats
 r_dir_file(untrusted_app, proc_net)