diff --git a/private/compat/28.0/28.0.cil b/private/compat/28.0/28.0.cil
index 8bb849a7a15696f2672aef00af2d4e82809986d3..cd8b8134b09c2bac4a1221b76b11c5ededf2507a 100644
--- a/private/compat/28.0/28.0.cil
+++ b/private/compat/28.0/28.0.cil
@@ -6,6 +6,7 @@
 (type i2c_device)
 (type mediacodec)
 (type mediacodec_exec)
+(type mtd_device)
 (type qtaguid_proc)
 (type thermalcallback_hwservice)
 (type untrusted_v2_app)
diff --git a/private/file_contexts b/private/file_contexts
index 571b47cc1bdb7cd3660c6fdb32950b2c88216f55..cde191c18374da26e97b94c6d9f97b7aed381740 100644
--- a/private/file_contexts
+++ b/private/file_contexts
@@ -102,7 +102,6 @@
 /dev/loop-control	u:object_r:loop_control_device:s0
 /dev/mem		u:object_r:kmem_device:s0
 /dev/modem.*		u:object_r:radio_device:s0
-/dev/mtd(/.*)?		u:object_r:mtd_device:s0
 /dev/mtp_usb		u:object_r:mtp_device:s0
 /dev/pmsg0		u:object_r:pmsg_device:s0
 /dev/pn544		u:object_r:nfc_device:s0
diff --git a/public/device.te b/public/device.te
index 7e18095d05795d55c491b0c3ee295100cae1c3fd..36a060b727d805e78ee9add4cb7352669e0770b2 100644
--- a/public/device.te
+++ b/public/device.te
@@ -28,7 +28,6 @@ type input_device, dev_type;
 type kmem_device, dev_type;
 type port_device, dev_type;
 type lowpan_device, dev_type;
-type mtd_device, dev_type;
 type mtp_device, dev_type, mlstrustedobject;
 type nfc_device, dev_type;
 type ptmx_device, dev_type, mlstrustedobject;
diff --git a/public/hal_telephony.te b/public/hal_telephony.te
index 7e6212ccadfdebbf05319faadf8fce26cf4b97c6..9d0f8c0351e9e9a5a348f6c5109f7045c048516f 100644
--- a/public/hal_telephony.te
+++ b/public/hal_telephony.te
@@ -14,7 +14,6 @@ allow hal_telephony_server cgroup:dir create_dir_perms;
 allow hal_telephony_server cgroup:{ file lnk_file } r_file_perms;
 allow hal_telephony_server radio_device:chr_file rw_file_perms;
 allow hal_telephony_server radio_device:blk_file r_file_perms;
-allow hal_telephony_server mtd_device:dir search;
 allow hal_telephony_server efs_file:dir create_dir_perms;
 allow hal_telephony_server efs_file:file create_file_perms;
 allow hal_telephony_server vendor_shell_exec:file rx_file_perms;