platform BpfLoader: drop support for uprobestats

this has moved to mainline via apex

Test: TreeHugger
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: I77e6ae3248ce1aa1ee20c9ab834516053cac5d16
diff --git a/loader/Loader.cpp b/loader/Loader.cpp
index 09e2e17..89bdb80 100644
--- a/loader/Loader.cpp
+++ b/loader/Loader.cpp
@@ -882,10 +882,6 @@
         BPF_PROG_TYPE_SOCKET_FILTER,
 };
 
-constexpr bpf_prog_type kUprobestatsAllowedProgTypes[] = {
-        BPF_PROG_TYPE_KPROBE,
-};
-
 // see b/162057235. For arbitrary program types, the concern is that due to the lack of
 // SELinux access controls over BPF program attachpoints, we have no way to control the
 // attachment of programs to shared resources (or to detect when a shared resource
@@ -909,13 +905,6 @@
                 .allowedProgTypes = kMemEventsAllowedProgTypes,
                 .allowedProgTypesLength = arraysize(kMemEventsAllowedProgTypes),
         },
-        // uprobestats
-        {
-                .dir = "/system/etc/bpf/uprobestats/",
-                .prefix = "uprobestats/",
-                .allowedProgTypes = kUprobestatsAllowedProgTypes,
-                .allowedProgTypesLength = arraysize(kUprobestatsAllowedProgTypes),
-        },
         // Vendor operating system
         {
                 .dir = "/vendor/etc/bpf/",