diff --git a/private/bug_map b/private/bug_map
index 73cd3b4ca39cb6ba2713f0d9d317c77b7c180cc4..8d646c5d9c7ab1d7106cc158f6ef21628e15c301 100644
--- a/private/bug_map
+++ b/private/bug_map
@@ -1,6 +1,4 @@
 platform_app nfc_data_file dir 74331887
-priv_app sysfs dir 72749888
-priv_app sysfs_android_usb file 72749888
 priv_app system_data_file dir 72811052
 system_server crash_dump process 73128755
 untrusted_app_25 system_data_file dir 72550646
diff --git a/private/priv_app.te b/private/priv_app.te
index b13e3f6b7b42ee60f793815739e92d6e45024a70..709bc7bdbae662487dff61818a0f431c324df3f9 100644
--- a/private/priv_app.te
+++ b/private/priv_app.te
@@ -137,13 +137,15 @@ unix_socket_connect(priv_app, traced_producer, traced)
 # suppress denials for non-API accesses.
 dontaudit priv_app exec_type:file getattr;
 dontaudit priv_app device:dir read;
+dontaudit priv_app net_dns_prop:file read;
 dontaudit priv_app proc:file read;
 dontaudit priv_app proc_interrupts:file read;
 dontaudit priv_app proc_modules:file read;
 dontaudit priv_app proc_stat:file read;
 dontaudit priv_app proc_version:file read;
+dontaudit priv_app sysfs:dir read;
+dontaudit priv_app sysfs_android_usb:file read;
 dontaudit priv_app wifi_prop:file read;
-dontaudit priv_app net_dns_prop:file read;
 
 # allow privileged apps to use UDP sockets provided by the system server but not
 # modify them other than to connect