diff --git a/private/traced_probes.te b/private/traced_probes.te
index 1d834115739087baf1b3ce124ffd4fe0ce5e0b42..22746e76bb93dcbbade870f68b3404071a236e89 100644
--- a/private/traced_probes.te
+++ b/private/traced_probes.te
@@ -35,27 +35,6 @@ allow traced_probes kmsg_device:chr_file write;
 # Allow traced_probes to list the system partition.
 allow traced_probes system_file:dir { open read };
 
-# ----- Begin of policies for exec(atrace) -----
-# Allow traced_probes to run atrace. atrace pokes at system services to enable
-# their userspace TRACE macros.
-
-allow traced_probes atrace_exec:file rx_file_perms;
-
-# This is needed for: path="/system/bin/linker64"
-# scontext=u:r:atrace:s0 tcontext=u:r:traced_probes:s0 tclass=fd
-allow atrace traced_probes:fd use;
-
-# atrace sets debug.atrace.* properties to tell services to enable their
-# userspace tracing.
-set_prop(traced_probes, debug_prop)
-
-# And then sends them an IPC to tell them to re-read that property.
-binder_use(traced_probes)
-allow traced_probes healthd:binder call;
-allow traced_probes surfaceflinger:binder call;
-get_prop(traced_probes, hwservicemanager_prop)
-# ----- End of policies for exec(atrace) -----
-
 ###
 ### Neverallow rules
 ###