diff --git a/app.te b/app.te
index 9a00b11b76f461b87ca25f3e92598172c79a0c0e..0ac69f66ff243b6f9e31d2c608d72096b71a88d9 100644
--- a/app.te
+++ b/app.te
@@ -167,10 +167,6 @@ allow appdomain usbaccessory_device:chr_file { read write getattr };
 allow appdomain dalvikcache_data_file:file execute;
 allow appdomain dalvikcache_data_file:lnk_file r_file_perms;
 
-# /data/dalvik-cache/profiles
-allow appdomain dalvikcache_profiles_data_file:dir { search getattr };
-allow appdomain dalvikcache_profiles_data_file:file rw_file_perms;
-
 # Allow any app to read shared RELRO files.
 allow appdomain shared_relro_file:dir search;
 allow appdomain shared_relro_file:file r_file_perms;
diff --git a/domain.te b/domain.te
index d986ad442ca3533b7540ddda1d3c0d5281c01347..ba12ccd2a1b211a87310182223f93a00f1f48313 100644
--- a/domain.te
+++ b/domain.te
@@ -296,7 +296,6 @@ neverallow { domain -install_recovery -recovery } recovery_block_device:blk_file
 neverallow { domain -servicemanager } *:binder set_context_mgr;
 
 # Only authorized processes should be writing to files in /data/dalvik-cache
-# (excluding /data/dalvik-cache/profiles, which is labeled differently)
 neverallow {
   domain
   -init # TODO: limit init to relabelfrom for files
diff --git a/file.te b/file.te
index 1a92ac6db2b15eccefba1321da90f731f58a73cd..efd42b460e9b1ef55610b4d275149f4b2d640894 100644
--- a/file.te
+++ b/file.te
@@ -77,8 +77,6 @@ type apk_private_data_file, file_type, data_file_type;
 type apk_private_tmp_file, file_type, data_file_type, mlstrustedobject;
 # /data/dalvik-cache
 type dalvikcache_data_file, file_type, data_file_type;
-# /data/dalvik-cache/profiles
-type dalvikcache_profiles_data_file, file_type, data_file_type, mlstrustedobject;
 # /data/resource-cache
 type resourcecache_data_file, file_type, data_file_type;
 # /data/local - writable by shell
diff --git a/file_contexts b/file_contexts
index bce2e8b2931200ab4531ba22cebeabe2a23c66b2..f6dcd26ef395e117307bb92089706cd275414d7d 100644
--- a/file_contexts
+++ b/file_contexts
@@ -232,7 +232,6 @@
 /data/gps(/.*)?		u:object_r:gps_data_file:s0
 /data/resource-cache(/.*)? u:object_r:resourcecache_data_file:s0
 /data/dalvik-cache(/.*)? u:object_r:dalvikcache_data_file:s0
-/data/dalvik-cache/profiles(/.*)? u:object_r:dalvikcache_profiles_data_file:s0
 /data/adb(/.*)?		u:object_r:adb_data_file:s0
 /data/anr(/.*)?		u:object_r:anr_data_file:s0
 /data/app(/.*)?                       u:object_r:apk_data_file:s0
diff --git a/installd.te b/installd.te
index a8cb8d459f8d603c2bf503da807ca758e1971b86..21cd4f0b3212f72d3cc0d22d66b7d5d9628c90c5 100644
--- a/installd.te
+++ b/installd.te
@@ -59,10 +59,6 @@ allow installd install_data_file:file create_file_perms;
 allow installd dalvikcache_data_file:dir create_dir_perms;
 allow installd dalvikcache_data_file:file create_file_perms;
 
-# Create /data/dalvik-cache/profiles.
-allow installd dalvikcache_profiles_data_file:dir rw_dir_perms;
-allow installd dalvikcache_profiles_data_file:file create_file_perms;
-
 # Create files under /data/resource-cache.
 allow installd resourcecache_data_file:dir rw_dir_perms;
 allow installd resourcecache_data_file:file create_file_perms;
diff --git a/system_server.te b/system_server.te
index 21da6514327a76cc71bbd383c6e5383d12befee1..0fe1147a4041a0e5a08c4748c33071d8512e55be 100644
--- a/system_server.te
+++ b/system_server.te
@@ -209,10 +209,6 @@ allow system_server anr_data_file:file create_file_perms;
 allow system_server backup_data_file:dir create_dir_perms;
 allow system_server backup_data_file:file create_file_perms;
 
-# Read from /data/dalvik-cache/profiles
-allow system_server dalvikcache_profiles_data_file:dir rw_dir_perms;
-allow system_server dalvikcache_profiles_data_file:file create_file_perms;
-
 # Write to /data/system/heapdump
 allow system_server heapdump_data_file:dir rw_dir_perms;
 allow system_server heapdump_data_file:file create_file_perms;